Traditional Culture Encyclopedia - Traditional culture - Basic knowledge of confidentiality
Basic knowledge of confidentiality
(a) What is a state secret?
State secrets are related to the security and interests of the state, determined in accordance with legal procedures, within a certain period of time, only a certain range of people know the matter.
(2) What is a working secret?
Working secrets are generated in the official activities of the state, not a state secret and not suitable for public disclosure of secret matters.
(C) what is a trade secret?
It is not known to the public, can bring economic benefits to the right holder, practical and confidentiality measures taken by the right holder of technical information and business information.
(d) What is a state secret carrier?
It refers to the paper media, magnetic media, CD-ROMs and other types of items that record state secret information in the form of text, data, symbols, graphics, images, sound and so on. There are mainly the following four categories: 1. to text, graphics, symbols to record state secret information on paper media carrier. 2. to magnetic material to record state secret information carrier, such as computer disks (including floppy disks, hard disk), magnetic tapes, audiotapes, videotapes, etc. 3. to electrical and optical signals to record the transmission of state secret information carrier, such as radio waves, optical fibers, etc. 4. containing state secret information on the equipment, equipment, products and other Carrier.
(e) What is the basic policy of confidentiality?
The work of keeping state secrets, the implementation of active prevention, focus, both to ensure state secrets and facilitate the work of the policy.
(6) Who is responsible for confidentiality?
Secrecy work to implement the responsibility of leading cadres. State organs and units involving state secrets should establish confidentiality organizations, determine the full-time or *** confidentiality staff, management of confidentiality work in the unit.
(g) What are the main contents of the confidentiality responsibility system of party and government leading cadres?
1. The main party and government leaders of the unit (system) is responsible for the overall leadership of confidentiality; 2. Party and government leaders in charge of confidentiality bear the responsibility of specific organizational leadership; 3. Leaders in charge of other aspects of work, business work to where the confidentiality of the work to where the management, the study of the deployment and inspection and assessment of the business, at the same time, the confidentiality of the issue of the arrangements made and inspection and assessment.
(H) What are the main contents of confidentiality education?
1. The Party and the State's guidelines and policies on confidentiality; "Secrecy Law" and its supporting regulations, other relevant laws and regulations related to confidentiality content of the study; 2. Basic knowledge of confidentiality; 3. Confidentiality technology, skills training; 4. Leakage of the case of education; 5. Confidentiality of the work of the experience of the introduction of the 6. Practical work of confidentiality issues related to the seminar; 7. Confidentiality of the new technologies, new products The exchange of new technologies and products of confidentiality, etc.
(ix) What are the contents of confidentiality inspection?
1. Organizational leadership of confidentiality; 2. Implementation of the responsibility system for confidentiality of leading cadres; 3. Construction of confidentiality rules and regulations; 4. Confidentiality publicity and education; 5. Confidentiality of the key departments (parts) of the management; 6. Management of state secret documents, information and other items; 7. Confidentiality of major activities and projects; 8. Confidentiality of the technical precautions; 9. Leak investigation and handling work.
2. Confidentiality knowledge know how much
What are the provisions of the state of citizens' confidentiality? 1. China's current Constitution, Article 53 clearly stipulates: Citizens must comply with the provisions of the Constitution and the law of confidentiality; 2. "Confidentiality Law", Article 3 provides: all state organs, armed forces, political parties, social organizations, enterprises and institutions, and citizens have the obligation to keep state secrets; 3. Article 24 of the Secrecy Law provides that the disclosure of state secrets in private dealings and communications is not permitted.
Carrying documents, information and other items belonging to state secrets outside the home shall not violate the secrecy regulations. It is not allowed to talk about state secrets in public **** places; 4. Article 25 of the Law on Secrecy stipulates that confidentiality measures must be taken in the transmission of state secrets in wired wireless communications.
It is not permitted to transmit state secrets using explicit codes or codes that have not been examined and approved by the relevant central authorities. It is not permitted to pass documents, information and other items belonging to state secrets through ordinary post.
What are the 12 serious violations under the Secrecy Law? The Law on Secrecy lists 12 most common and typical serious violations, which lead to failure of secrecy measures, loss of control of state secrets, destruction of the secrecy technology protection system, and serious threat to the security of state secrets. These acts are: 1. connecting classified computers and classified storage devices to the Internet and other public **** information networks; 2. exchanging information between classified information systems and the Internet and other public **** information networks without taking protective measures; 3. using non-classified computers and non-classified storage devices to store and process state secret information; 4. illegally copying, recording and storing state secrets; 5. using the Internet to store state secrets; and 6. illegally copying, recording and storing state secrets; and 7. using the Internet to store state secrets. State secrets; 5. Passing state secrets on the Internet and other public **** information networks or wired and wireless communications that have not taken confidentiality measures; 6. Involving state secrets in private interactions and communications; 7. Unauthorized uninstallation and modification of security technology programs and management procedures of classified information systems; 8. Giving away classified computers and classified storage devices that have not been processed by security technology and have been withdrawn from use, Sell, discard or use for other purposes; 9. Illegal acquisition and possession of state secret carriers; 10. Passing state secret carriers through ordinary postal services, express delivery and other channels without confidentiality measures; 11. Buying, selling, transferring or privately destroying state secret carriers; 12. Mailing, consigning state secret carriers out of the country or without the approval of the competent departments concerned, carrying or passing state secret carriers out of the country.
The Law on Secrecy stipulates that anyone who commits any of the above acts shall be punished in accordance with the law; if the act constitutes a crime, criminal responsibility shall be investigated in accordance with the law; and anyone who commits any of the above acts that do not constitute a crime and are not subject to disciplinary action, shall be dealt with by the secrecy administrative department in accordance with the supervision of the authority or unit in which he or she is employed. How to distinguish between state secrets and working secrets?1. The subject of interest is different.
Working secrets directly involved in the interests of the subject is the relevant state organs, once leaked only to the relevant state organs to fulfill the powers and duties conferred by the state and other local interests in jeopardy; while the state secrets directly involved in the interests of the subject is the state, once leaked will be detrimental to the country's interests as a whole; 2. Determine the way is different. The determination of the work of the secret of the state organs at all levels to determine the main, the central state organs of a few unified provisions or expressly authorized, only from its provisions; the determination of state secrets must be carried out in accordance with the law, must be in the state secrecy department in conjunction with the central state organs concerned to formulate and issue the "state secrets and their classified specific scope of the provisions of" the scope of the operation, shall not be determined arbitrarily; 3. different signs.
Documents, information and other carriers belonging to the work of the secret, can be "internal" as a sign, may not be labeled with the sign of the state secret classification; 4. different management. State organs at all levels of management of working secrets can refer to the management of state secrets, but do not need to be regulated in accordance with legal procedures.
For example, the transmission of state secret documents, information or other items must be transmitted through the machine post, not through the ordinary post; the transmission of secret documents, information or other items, there is no uniform requirement, can be selected by the organs themselves; 5. different applicable laws. Work secrets to protect the legal norms applicable to the State Civil Servants Law, mainly administrative means of legal protection of work secrets; and the protection of state secrets is applicable to the Secrecy Law, not only can use administrative means, but also the use of legal means; 6. different responsibilities.
After the leakage of work secrets, the person responsible for only administrative responsibility, will only be subject to appropriate administrative sanctions; and leakage of state secrets, according to the possible harmful consequences and other circumstances to determine the legal responsibility of the person responsible for. The circumstances are minor, the consequences are not serious, can bear administrative responsibility, the circumstances and consequences are serious, then to bear criminal responsibility; in short, due to the work of the secret and the state secrets of the respective interests involved in the subject is different, once the leakage of the consequences of the harm caused by the scope and extent of the great difference.
Therefore, the protection of work secrets is significantly less than the protection of state secrets. All other differences arise from this.
What are the confidentiality requirements for the use of cell phones? 1. Not in the cell phone calls involving state secret information, not to use the phone to send state secret information, not in the cell phone to store state secret information; 2. Not to carry cell phones and other mobile terminals to participate in classified meetings or enter classified activities, confidential departments and parts of the key departments; 3. Not to use cell phones and other mobile terminals in classified places for recording, Cell phones and other mobile terminals shall not be used as classified information equipment or connected to classified information equipment and carriers; 5. Classified personnel are strictly prohibited from filling in information such as names and addresses of organizations and units when applying for cell phone numbers, registering for cell phone mailboxes or opening other functions, and they shall not store in their cell phones sensitive information such as core classified personnel's work units and positions and shall not activate the remote data synchronization function of mobile phones; 6. The remote data synchronization function of cell phones shall not be activated. 6. The cell phones used by core classified personnel and important classified personnel shall undergo necessary security checks, be equipped with and use special cell phones as far as possible, and shall not use cell phones that have not been licensed to enter the network and cell phones that have opened location services, Internet connection and other functions. 7. The core classified personnel and important classified personnel shall immediately report the malfunctioning of their cell phones or the discovery of abnormalities and have their cell phones repaired at the designated place. The cell phones of core classified personnel and important classified personnel should be reported immediately when they malfunction or abnormalities are found, and repaired at designated locations. Cell phones that cannot be used again should be destroyed according to the classified equipment.
What is the common sense of confidentiality technology to prevent 1. 1 shall not be classified computer and network access to the Internet and other public **** information network; 2. 2 shall not be in the classified computer and non-classified computer.
3. Confidentiality knowledge know how much
What are the provisions of the state of confidentiality of citizens? 1. China's current "Constitution" Article 53 clearly stipulates that: citizens must comply with the Constitution and the law of confidentiality provisions; 2. "Confidentiality Law", Article 3, provides that: all state organs, the armed forces, political parties, social organizations, enterprises and institutions and citizens have the obligation to keep state secrets; 3. Article 24 of the Secrecy Law provides that the disclosure of state secrets in private dealings and communications is not permitted.
Carrying documents, information and other items belonging to state secrets outside the home shall not violate the secrecy regulations. It is not allowed to talk about state secrets in public **** places; 4. Article 25 of the Law on Secrecy stipulates that confidentiality measures must be taken in the transmission of state secrets in wired wireless communications.
It is not permitted to transmit state secrets using explicit codes or codes that have not been examined and approved by the relevant central authorities. It is not permitted to pass documents, information and other items belonging to state secrets through ordinary post.
What are the 12 serious violations under the Secrecy Law? The Law on Secrecy lists 12 most common and typical serious violations, which lead to failure of secrecy measures, loss of control of state secrets, destruction of the secrecy technology protection system, and serious threat to the security of state secrets. These acts are: 1. connecting classified computers and classified storage devices to the Internet and other public **** information networks; 2. exchanging information between classified information systems and the Internet and other public **** information networks without taking protective measures; 3. using non-classified computers and non-classified storage devices to store and process state secret information; 4. illegally copying, recording and storing state secrets; 5. using the Internet to store state secrets; and 6. illegally copying, recording and storing state secrets; and 7. using the Internet to store state secrets. State secrets; 5. Passing state secrets on the Internet and other public **** information networks or wired and wireless communications that have not taken confidentiality measures; 6. Involving state secrets in private interactions and communications; 7. Unauthorized uninstallation and modification of security technology programs and management procedures of classified information systems; 8. Giving away classified computers and classified storage devices that have not been processed by security technology and have been withdrawn from use, Sell, discard or use for other purposes; 9. Illegal acquisition and possession of state secret carriers; 10. Passing state secret carriers through ordinary postal services, express delivery and other channels without confidentiality measures; 11. Buying, selling, transferring or privately destroying state secret carriers; 12. Mailing, consigning state secret carriers out of the country or without the approval of the competent departments concerned, carrying or passing state secret carriers out of the country.
The Law on Secrecy stipulates that anyone who commits any of the above acts shall be punished in accordance with the law; if the act constitutes a crime, criminal responsibility shall be investigated in accordance with the law; and anyone who commits any of the above acts that do not constitute a crime and are not subject to disciplinary action, shall be dealt with by the secrecy administrative department in accordance with the supervision of the authority or unit in which he or she is employed. How to distinguish between state secrets and working secrets?1. The subject of interest is different.
Working secrets directly involved in the interests of the subject is the relevant state organs, once leaked only to the relevant state organs to fulfill the powers and duties conferred by the state and other local interests in jeopardy; while the state secrets directly involved in the interests of the subject is the state, once leaked will be detrimental to the country's interests as a whole; 2. Determine the way is different. The determination of the work of the secret of the state organs at all levels to determine the main, the central state organs of a few unified provisions or expressly authorized, only from its provisions; the determination of state secrets must be carried out in accordance with the law, must be in the state secrecy department in conjunction with the central state organs concerned to formulate and issue the "state secrets and their classified specific scope of the provisions of" the scope of the operation, shall not be determined arbitrarily; 3. different signs.
Documents, information and other carriers belonging to the work of the secret, can be "internal" as a sign, may not be labeled with the sign of the state secret classification; 4. different management. State organs at all levels of management of working secrets can refer to the management of state secrets, but do not need to be regulated in accordance with legal procedures.
For example, the transmission of state secret documents, information or other items must be transmitted through the machine post, not through the ordinary post; the transmission of secret documents, information or other items, there is no uniform requirement, can be selected by the organs themselves; 5. different applicable laws. Work secrets to protect the legal norms applicable to the State Civil Servants Law, mainly administrative means of legal protection of work secrets; and the protection of state secrets is applicable to the Secrecy Law, not only can use administrative means, but also the use of legal means; 6. different responsibilities.
After the leakage of work secrets, the person responsible for only administrative responsibility, will only be subject to appropriate administrative sanctions; and leakage of state secrets, according to the possible harmful consequences and other circumstances to determine the legal responsibility of the person responsible for. The circumstances are minor, the consequences are not serious, can bear administrative responsibility, the circumstances and consequences are serious, then to bear criminal responsibility; in short, due to the work of the secret and the state secrets of the respective interests involved in the subject is different, once the leakage of the consequences of the harm caused by the scope and extent of the great difference.
Therefore, the protection of work secrets is significantly less than the protection of state secrets. All other differences arise from this.
What are the confidentiality requirements for the use of cell phones? 1. Not in the cell phone calls involving state secret information, not to use the phone to send state secret information, not in the cell phone to store state secret information; 2. Not to carry cell phones and other mobile terminals to participate in classified meetings or enter classified activities, confidential departments and parts of the key departments; 3. Not to use cell phones and other mobile terminals in classified places to record, Cell phones and other mobile terminals shall not be used as classified information equipment or connected to classified information equipment and carriers; 5. Classified personnel are strictly prohibited from filling in information such as names and addresses of organizations and units when applying for cell phone numbers, registering for cell phone mailboxes or opening other functions, and they shall not store in their cell phones sensitive information such as core classified personnel's work units and positions and shall not activate the remote data synchronization function of mobile phones; 6. The remote data synchronization function of cell phones shall not be activated. 6. The cell phones used by core classified personnel and important classified personnel shall undergo necessary security checks, be equipped with and use special cell phones as far as possible, and shall not use cell phones that have not been licensed to enter the network and cell phones that have opened location services, Internet connection and other functions. 7. The core classified personnel and important classified personnel shall immediately report the malfunctioning of their cell phones or discovery of abnormalities and have their cell phones repaired at the designated place. The cell phones of core classified personnel and important classified personnel should be reported immediately when they malfunction or abnormalities are found, and repaired at designated locations. Cell phones that cannot be used again should be destroyed according to the classified equipment.
What is the general knowledge of confidentiality technology to prevent 1. classified computers and networks shall not be connected to the Internet and other public **** information networks; 2. classified computers shall not be in the classified computers and non-classified computers.
4. Basic knowledge of confidentiality publicity and education
1. What is the confidentiality law? A: People involved in state secrets in the activities of the various social relations are called confidential relations.
The secrecy law is a general term for the legal norms that regulate the secrecy relationship. 2. When was the Secrecy Law and the Measures for the Implementation of the Secrecy Law promulgated and implemented respectively? Answer: The Law of the People's Republic of China on the Preservation of State Secrets (hereinafter referred to as the "Secrecy Law") was adopted on September 5, 1988 by the Standing Committee of the Seventh National People's Congress at its third meeting, and came into effect on May 1, 1989.
"The Chinese people **** and the implementation of the State Secrets Law" (hereinafter referred to as "Measures for the Implementation of the Secrecy Law") on April 25, 1990 by the State Council approved the issuance of the date of issuance shall come into force.3. What is the role of the Secrecy Law? A: The role of the Secrecy Law has three points: (1) is a legal weapon to protect the security of state secrets; (2) is based on the needs of socialist modernization and construction of the major reform of secrecy; (3) is to improve and perfect the system of secrecy laws and regulations of China's fundamental basis.
4. What is the significance and role of the promulgation and implementation of the Secrecy Law? A: "Secrecy Law" is the first relatively complete since the founding of the country, and the situation of the management of the work of keeping state secrets, its promulgation and implementation, for the adjustment and strengthening of the new period of secrecy work has an extremely important significance and role. First, the Secrecy Law is a legal weapon to protect state secrets, safeguard the security and interests of the state, and combat the criminal behavior of leaking and stealing state secrets.
Its promulgation and implementation provide a legal basis for us to accurately combat the leakage of state secrets and the criminal activities of stealing, spying, bribing, and illegally providing state secrets for institutions, organizations, and personnel outside the country. Secondly, the Secrecy Law is a code of conduct for all organs, organizations and citizens to keep state secrets.
The promulgation, study and publicity of the Secrecy Law and its implementation will help all citizens, especially state officials, to gradually enhance the sense of responsibility for secrecy, and to strengthen the concept of the enemy, the concept of secrecy, the concept of discipline, the concept of the rule of law, and thus gradually form a good social culture of conscientiously keeping state secrets. Thirdly, the Secrecy Law is the basis for the construction of China's secrecy regulations system, which fundamentally stipulates the guidelines, principles and important measures for the construction of China's secrecy legal system.
Fourth, the Secrecy Law is a legal guideline for deepening the reform of China's secrecy work and strengthening the management of secrecy work, and it is a guide for deepening the reform of China's secrecy work. The Law on Secrecy has made principle provisions on the establishment and powers of the secrecy organizations of the state and local *** at all levels and of the competent departments of the central ***, which is of great significance to the improvement of the secrecy management system and the strengthening of secrecy work, and has put the national secrecy work on the track of management according to the law.
5. What is the purpose of formulating the Secrecy Law? A: The purpose of the formulation of the Secrecy Law is: in order to keep state secrets, safeguard the security and interests of the country, and ensure the smooth progress of reform, opening up and socialist construction. 6. What is the working policy of keeping state secrets? What is its main meaning? Answer: Article 4 of the Secrecy Law stipulates that: the work of keeping state secrets, the implementation of active prevention, highlighting the key points, both to ensure state secrets and facilitate the work of the policy.
"Positive prevention", that is, we have to put the foothold of the work of confidentiality and focus on prevention, to save for a rainy day, to guard against the unexpected. Implemented into the specific work is: First, to strengthen the confidentiality of publicity and education work, enhance the confidentiality of all citizens, first of all, the state staff of the legal concept of confidentiality, to improve the conscientiousness of keeping state secrets; second, to establish and improve and strictly implement the confidentiality laws and regulations and confidentiality system; third, to actively develop and utilize the advanced technology of confidentiality, the use of advanced scientific and technological means of preventing leakage of confidentiality and stealing confidentiality; fourth, to establish and improve the mechanism of supervision and inspection, strengthen the Confidentiality supervision and inspection; Fifth, to strengthen the investigation and research of new situations and new issues.
"Highlighting the key points" means that in the secrecy work, on the basis of the full implementation of the Secrecy Law, we should differentiate the situation in terms of classified level, parts and personnel to ensure that the core secrets and the key units and personnel of the key departments (parts) in possession of the state secrets are not a problem. "Both to ensure the state secrets and facilitate the work" is to require us to correctly deal with the relationship between confidentiality and the business work, so that confidentiality and business work.
7. What is the main content of the confidentiality leadership responsibility system? A: The content of the confidentiality responsibility system for leading cadres is mainly the implementation of "who is in charge, who is responsible for; leading cadres to which level of business work, confidentiality work to which level; confidentiality work and business work with the plan, with the layout, with the inspection, with the implementation, with the summary". 8. What is confidentiality education? A: Confidentiality education is to keep state secrets for the direct purpose of all citizens, especially state organs, key departments as the object of the ideological and political education and dissemination of business knowledge on the preservation of state secrets.
It is an integral part of the party and state propaganda and education work, and is the ideological foundation and an important part of the entire confidentiality work. 9. What is a state secret? What are the characteristics? A: State secrets are related to the security of the state in accordance with legal procedures to determine, within a certain period of time is limited to a certain range of people to know the matters.
State secrets have three characteristics: First, the essential features. That is, state secrets must be closely related to the security and interests of the state.
Second, the procedural characteristics. That is, state secrets must be determined in accordance with the procedures prescribed by national laws and regulations.
Third, the temporal and spatial characteristics. That is, state secrets must and can be limited to a certain range of people know within a certain period of time.
10. How are state secrets classified? A: The classification is based on the state secrets once leaked, can or may cause harm to national security and interests of the degree. The degree of harm is different, the classified level is also different.
The more serious the harm caused, the higher the classified level. The Secrecy Law divides state secrets into three levels: top secret, confidential and secret.
(1) "Top Secret" is the most important state secret, the leakage of which will cause the security and interests of the state to suffer particularly serious damage; (2) "Secret" is an important state secret, the leakage of which will cause the security and interests of the state to suffer serious damage; (3) "Secret" is a general state secret, the leakage of which will cause damage to the security and interests of the state. 11. What is a working secret? A: refers to all levels of organs and units in their official activities and internal management does not belong to the state secrets and should not be disclosed to the public matters.
12. what.
- Related articles
- Cloud (forty-two) immortal reverse of the classic comments
- Kneeling for the picture of "Nana" lotus tattoo ... used as an avatar ... the bigger the better.
- How to adjust the brightness of notebook screen?
- Why is there no Liaoning in the "18 provinces of the Han Dynasty"?
- What is the significance of studying ancient poetry for children?
- What is the second fire bus? What type of secondary bus is usually used in automatic fire alarm system?
- Where to look at my world doujinshi levels
- What is brown sugar made of?
- This is a fine tradition of the Chinese nation for five thousand years ... English composition.
- Words that describe taste are