Traditional Culture Encyclopedia - Traditional festivals - Learning Experience on Confidentiality Awareness and Common Sense Education in 2018

Learning Experience on Confidentiality Awareness and Common Sense Education in 2018

2018 on confidentiality awareness and confidentiality common sense education learning experience

On confidentiality awareness and confidentiality common sense education learning experience 1

The "Secrecy Law" has been promulgated and implemented in the past twenty years, for the maintenance of China's national security and interests, and to safeguard the reform and opening up and socialist construction The smooth progress of the cause of socialist construction has played an important role. At present, China's confidentiality work is still facing a serious test, need to pay attention to many aspects of improving confidentiality awareness and do a good job of confidentiality work, in order to protect the reform and opening up to the deepening of the development of socialist and harmonious society and the construction of smooth progress.

First, the current confidentiality work in China is facing a serious test

1, the long-term peace environment so that people forget the concept of the enemy and the awareness of confidentiality

At present, in our society, the phenomenon of weak concept of the legal system of confidentiality still exists, "no confidentiality can be guaranteed", "there is no confidentiality", "there is no confidentiality", "there is no confidentiality", "there is no confidentiality", "there is no confidentiality", "there is no confidentiality". ", "confidentiality is difficult to protect", "confidentiality is useless" of the peace paralysis is still on the market. Some cadres, including leading cadres, do not have a strong sense of confidentiality, lack of political and strategic vision, and do not pay enough attention to confidentiality. Some departments and units of the confidentiality system is not implemented, the management measures are not strict, especially in the management of confidential computers and networks, the lack of effective technical means of prevention, there are leaks of hidden dangers. The duties of some key confidential departments are unclear, and the responsibility for confidentiality has not been realized, especially the serious phenomenon of "dual-use of one machine", with no strict means of isolation, posing a potential threat to network information security. Compared with the past, China's confidential subject diversification, confidential carrier diversification, leakage channel complexity, leakage object significantly more, leakage rate significantly higher, the difficulty of control significantly increased.

2, the changes brought about by the market economy to the confidentiality of many new topics

First, the complexity of the ideological concept. With the deepening of reform and the development of the market economy, a variety of ideological and cultural mutual agitation, people's outlook on life, the world outlook presents complexity and diversity, people's behavior of selectivity, diversity enhancement, confidentiality education, the relevance of the effectiveness of the face of a new test. Secondly, the interest drive is obvious. Some people pursue "gold worship", "hedonism", "extreme individualism", not hesitate to trample on state secrecy laws and regulations and sell state secrets, in order to maximize personal interests and the so-called personal values. The so-called personal value embodiment. Third, the number of subjects involved in secrets has increased. More and more non-public economic units and private enterprises are entering the field of secrets, and the original confidentiality management system has a blind spot. Fourth, personnel mobility has intensified. Some high-tech personnel and classified personnel leave their jobs and jump to foreign enterprises, multinational corporations or immigrants to foreign countries, bringing serious harm to the security of state secrets.

3, the political reform of the original confidentiality management work to bring a new impact

Currently, the Chinese party and government to implement political civilization, open government, sunshine government construction, the confidentiality of the work of a new challenge. Secrecy work to do not contradict the trend and requirements of open government, but also to ensure the safety of state secrets, which requires that we must be from the "secrecy to protect the more the more insurance". Old concepts out of the establishment of "openness as a principle, confidentiality as an exception" to the new concept of confidentiality. Especially in May this year, the implementation of the "Regulations on the Disclosure of Government Information" stipulates that the public government information must be disclosed in the government website and other legal carriers in accordance with the law, of course, shall not be disclosed involving state secrets of government information. To this end, we must actively explore new systems of confidentiality work to adapt to the socialist market economy and international practice, so that the confidentiality of the system constantly adapted to the new requirements of information disclosure, to ensure that the core, to ensure the focus, to ensure the advantages of the implementation of China's open government to play a good role in promoting cooperation.

4, the rapid development of high-tech confidentiality management work is facing new challenges

With the rapid development of high-tech and office automation of the universal application of confidentiality management work needs to be transformed accordingly. First, the static management into dynamic management. In the past, the static management is to control the mouth, control the file, watch the door, and now also control the information, network, a variety of classified media dynamic management. Second, by relying on traditional means of management to rely on scientific and technological means of management. In the past, whether the confidentiality work is done is mainly to see whether the various systems are sound, and now also rely on technical means, the need to form a combination of technical, physical and human defense defense system. Third, by the management of the media confidentiality into a good management of information confidentiality. The original confidential media to paper-based, and now there are CD-ROMs, flash drives, floppy disks, mobile hard drives and other mobile storage media, so we need to manage cell phones, telephones, computers, networks, etc. can store, process and transmit information through various channels. These transformations make our country confidentiality prevention increasingly difficult.

5, hostile forces at home and abroad continue to carry out the division of our country, sabotage activities

hostile forces at home and abroad in order to achieve containment, division, evolution and subversion of our country's purpose, the theft of our country's secret activities are quite rampant. First, the main body of the theft of secrets is diversified. Hostile forces, intelligence organizations, neighboring countries, multinational corporations, etc., in the guise of sightseeing tours, visits and lectures, social surveys, the theft of secrets increased significantly. Secondly, the scope of steganography has expanded. The scope of steganography has expanded from the political and military fields to the economic, scientific and technological, cultural and transportation fields. Third, the diversification of the way of stealing secrets. Hostile forces not only use various means to turn my insiders, but also to joint ventures, cooperative development, academic seminars, cultural exchanges, tourism interviews, etc. as a front to our country to carry out stealing activities. The current national security situation in China is the coexistence of traditional and non-traditional security threats, external security risks and internal security risks are intertwined, and the struggle between steganography and counter-steganography is more acute and complex.

Second, in strict accordance with the provisions of the "Secrecy Law", to take appropriate measures to do a good job of confidentiality

1, good publicity and education

Confidentiality publicity and education is a recurrent, basic work, but also an important element of confidentiality work. First, through continuous, various forms of publicity and education, and constantly enhance the general public's awareness of the enemy, the awareness of confidentiality and comprehensive preventive awareness, so that the general public consciously set up confidentiality vigilance. Secondly, we should focus on the confidentiality education of the leading cadres at all levels, and strengthen the confidentiality education and training of the confidential personnel in the key departments of confidentiality, full-time and part-time confidential cadres in the party and government organs, as well as the national civil servants and computer information system administrators. Third, according to the development of the situation and task changes, study and improve the content and focus of education, targeted, close to the situation, close to the actual publicity and education, so that the confidentiality of publicity and education to keep pace with the times.

2, good team building

Building a high political quality, strong business capacity of the cadres, is an important guarantee of good confidentiality. First, we should care for the confidential cadres from the political, work and life, to do with the cause to keep people, feelings to keep people, appropriate treatment to keep people, and strive to create a strong career, strong beliefs in high-quality confidential cadres. Second, in accordance with the requirements of the professionalization of the confidentiality team, to further strengthen the political theory learning and business training, and constantly enrich the content of learning and training, enhance the effect of learning and training, and comprehensively improve the overall business quality of the confidentiality cadres. Third, the grass-roots confidentiality workers and managers should be seriously in accordance with the work of the higher confidentiality departments and the deployment of the overall requirements of the "security, development", and strive to cultivate rigorous and meticulous, thunder and lightning, the style of hard work, and in the ordinary post efforts to do the work of the peace of mind, careful preparation for the war, sincere collaboration.

3, strengthen system construction

First, the implementation of confidentiality leadership responsibility system. It includes three levels and three principles. "Three levels" are: First, the main leaders of the party and government at all levels of the region, the department's confidentiality work is responsible for the overall leadership; Second, the leadership of the confidentiality work is responsible for the specific organization of the leadership responsibility; Third, the leadership of the other work in charge of the scope of the confidentiality of the business in charge of the work. The "three principles" are: first, who is in charge of confidentiality, who is responsible for; second, what is in charge of business, while leading and managing the confidentiality of the work of the business; third, the business work to which the level of confidentiality of which is managed to which level of confidentiality at the same time.

The second is to explore the establishment of confidentiality management system. Accurately defining state secrets and classification is an important basis and premise for strengthening confidentiality management. In view of the existing problems of broad confidentiality, high classification and arbitrary classification process, we should actively explore the establishment of a practical classification management system to meet the requirements of the development of the situation and prevent the leakage of state secrets due to the inadmissibility of classification. To establish a classified work organization, to strengthen the knowledge of classified learning, to ensure accurate classification according to law.

Third, the establishment of information disclosure confidentiality review system. According to the State Council's "Regulations on the Disclosure of Information", administrative organs should publish government information other than those involving state secrets, commercial secrets and personal privacy. Therefore, in the information disclosure should pay attention to deal with the relationship between disclosure and confidentiality, the establishment of government information released in line with the work of the actual confidentiality review mechanism, standardize the confidentiality review of the work procedures, not only to ensure that the information should be disclosed to the public can be fully open to the community, but also to prevent improper disclosure of the leakage of confidentiality and jeopardize the interests of the State.

Fourth, the implementation of supervision and management and law enforcement inspection system. To strengthen the management of classified carriers, there are secret documents and information on the disk, CD-ROM, USB flash drive, etc., with the same classified paper media documents, the same management; to strengthen the various types of institutions to undertake various types of printing business printing, copying society management and important confidential meetings, major confidential activities of the confidentiality of the management; confidentiality of the unit to do a good job, the confidentiality of the management department should be summarized in a timely manner to promote its experience and practice, to be informed and commended, the lack of attention to the confidentiality of the work. Commendation, the attention is not enough, poor measures, there are problems and refused to rectify the unit, to timely and serious notification of criticism, and urge its rectification.

Fifth, the implementation of the use of high technology to prevent leakage system. To effectively strengthen the computer and its network of confidentiality management, seriously implement the computer and its network security and confidentiality management of the approval and licensing system, and effectively increase the confidentiality of the financial investment. The relevant authorities and the main responsible person to stand in the overall height, raise awareness, willing to invest, so that the level of confidentiality technology to adapt to the reform and opening up and the rapid development of high-tech new situation, and better play the role of "security, development".

On the confidentiality awareness and confidentiality education learning experience 2

April 15 this year for China's first national security education day. All over the country to organize activities in various forms, publicity and education people to improve the protection of national security awareness. Our geosurveying units in the actual work often have to use classified results information and involved in the management of classified results derivatives. As a unit of geological data administrator, combined with many years of practical work experience, on the management of classified data would like to learn through two cases with you to learn from, in order to take warning in the future work, prompting everyone in the future work to recognize the current confidentiality of the grim situation, to prevent the occurrence of classified data cases.

Surveying and mapping geographic information data is related to national security and territorial integrity, since ancient times has been regarded as the state of the art, easily not to be shown to people. In recent years, surveying and mapping geographic information data is more and more rich, the application field is more and more extensive, however, these surveying and mapping results in the people to provide convenience at the same time also to the confidentiality of the work has brought new problems. In practice, surveying and mapping results leakage incidents occur from time to time, and presents a further high trend, a serious threat to national security.

Case 1, a design institute engineer Guo Mou illegal use of the computer connected to the Internet to store, handle 7 confidential, 16 secret level topographic maps. It was found that Guo was involved in the bidding and construction of several projects in China before 2008, and the project A provided him with classified topographic maps as a reference for bidding quotes and program design. Guo violated the confidentiality provisions, unauthorized copy to the computer connected to the Internet storage, processing, and after use as a project data backup archives. After the case, the relevant departments gave Guo a major administrative demerit.

Analysis of the case, GuoMou violation of the use of the computer connected to the Internet storage, processing of classified information, bear direct responsibility. However, the investigation found that most of the confidential topographic maps stored and processed by GuoMou from the project party A, and party A unit did not put forward any confidentiality requirements. According to the Regulations on the Procedures for Approval of the Provision and Use of State Classified Basic Mapping Results and Information, the use of classified basic mapping results should fulfill strict application and approval procedures, and sign a security and confidentiality responsibility statement. However, in practice, some units in the purchase of classified mapping results, not in accordance with the relevant provisions of the strict management of classified carriers, but for the convenience of the work or for other reasons, illegal scanning and copying, and even repeated copying of electronic topographic maps, the leakage of confidentiality is very serious.

Case two of a geological research institute director Xu Mou to increase the unit's economic income, unauthorized decision to sign a cooperation agreement with a foreign company, and to allow the company to repeatedly query, borrowing a large number of geological information, which involves classified topographic maps 48. After the case, the relevant departments to give Xu corresponding party discipline, political discipline.

Analysis of this case is a violation of laws and regulations on confidentiality in economic cooperation, resulting in the leakage of state secrets of the typical case. According to the provisions of Article 30 of the Secrecy Law, organs and units of foreign relations and cooperation need to provide state secrets, should be reported to the relevant competent authorities for approval, and sign a confidentiality agreement with the other party. In this case, Xu Mou weak sense of confidentiality, violation of cooperation with foreign companies, subjective although no leakage of intent, but objectively caused the leakage of classified results, the national security and interests of the serious harm.

Through the analysis of typical cases, combined with the actuality of our units, I think we should do the following aspects of work:

First, to control the source. Strict approval procedures, in the case of mastering the needs of those who need it, to further strengthen the use of confidential mapping results in the process of tracking and inspection and management work, regular clean-up and destruction of confidential results, and gradually clear the bottom line.

Second, to strengthen education. To regularly carry out a variety of forms of confidentiality education for practitioners to promote their recognition of the current serious form of confidentiality, and effectively enhance the awareness of confidentiality, mastery of confidentiality knowledge, and gradually reduce the number of cases of confidentiality violations occurring due to ignorance and fear.

Third, to strengthen the management. The main thing is to grasp the classified personnel, classified carriers, classified places and computer information management.

Fourth, to increase the inspection. Planned and targeted on the use of classified results of the relevant departments to carry out confidentiality checks, seriously investigate and deal with violations of confidentiality laws and regulations, in order to investigate and promote the teaching, in order to investigate and promote change, in order to investigate and promote the prevention. Gradually enhance the overall awareness of confidentiality.