Current location - Education and Training Encyclopedia - Educational Knowledge - Self-inspection report on confidentiality work
Self-inspection report on confidentiality work
# Report # Introduction Self-inspection report is a report style that a unit or department conducts self-inspection on the problems existing in the implementation of a certain work in a certain period of time. The following is an unorganized self-inspection report on confidentiality. Welcome to read!

The first part of the self-inspection report on confidentiality work

Secrecy Committee of the Municipal Party Committee: According to the requirements of relevant documents of the Secrecy Committee of the Municipal Party Committee of * *, in order to further enhance our confidentiality awareness and prevention awareness, and implement and improve various confidentiality systems and measures, our bureau specially organized a self-inspection. The self-inspection is now reported as follows:

I. Organizational leadership and personnel team building:

In 20** years, according to the criteria for assessing the confidentiality objectives of the Municipal Secrecy Committee and the Regulations on the Classification and Management of Classified Personnel, the deputy director was decided to be in charge of confidentiality and cipher telegram work after research by the bureau party group; The director of the office is the specific supervisor; File part-time password telegram receiving and registering; * * Comrade is responsible for the confidentiality of computer information systems and hardware facilities, so that the division of labor is clear, and the responsibility lies with people. All the above personnel are officially working in our bureau, party member of the Communist Party of China, and their professional quality and political consciousness meet the requirements of confidentiality.

Second, the implementation of rules and regulations and the management of classified personnel:

According to the "Measures for the Administration of the Use of Cipher Telegraph in XX City", the main leaders and leaders in charge of our bureau respectively circulated documents to understand the regulations on the use of Cipher Telegraph, especially the personnel responsible for Cipher Telegraph, and studied them one by one. According to the requirements of the "measures", combined with the actual situation of our bureau, the "measures for the administration of the use of cipher telegrams in * * * * * * *" bureau was formulated and reported to the Municipal Party Committee for examination and filing. In addition, our bureau also pays attention to strengthening the confidentiality education of staff, organizing the study of confidentiality law, and making the confidentiality system implemented.

Three. Management of the use of computer and mobile media in secret vector: Our bureau is not the competent department for examination, but other work is strictly implemented in accordance with the relevant documents of the Municipal Security Committee.

Our bureau installed the secret-related computer of the Security Bureau as required. The current situation is as follows: classified computers are not connected to public information networks such as the Internet; Not infected with Trojan virus, and never used non-confidential mobile storage media; The device is not equipped with wireless devices, such as wireless network cards; I haven't taken the exam in the form of electronic information.

Our non-classified computers are also strictly implemented in accordance with the requirements of the Municipal Security Committee that "the Internet is not classified, classified information and mobile storage media are not processed online, and the confidentiality system is strictly enforced".

Fourth, the existing problems and improvement measures:

Due to the particularity of our business, fewer staff and limited office expenses, we don't have confidential information administrators and hardware facilities for processing information; Second, due to the limited office expenses, the management environment of our confidential places can not meet the requirements of installing protective measures such as iron gates, safes and alarms, but three doors enter our archives from the outside and are kept by iron filing cabinets, which is safe; Third, because our bureau is not the competent examination department, it does not participate in the work of proposition, test paper printing and test paper storage, and does not involve confidentiality requirements. In view of the above problems, in the future work, our bureau will focus on strengthening the study of confidential knowledge of government functionaries, actively participate in the confidential knowledge training organized by the Municipal Security Committee and the Municipal Party Committee's Confidential Bureau, improve the quality of confidential personnel, nip in the bud, and expand the archives with necessary security protection measures to meet the requirements of the confidential information storage environment when funding conditions permit.

Self-inspection Report on Confidentiality Work Part II

In accordance with the requirements of the Administrative Regulations on the Destruction of State Secret Carriers of the Central Office and the State Council and the Notice of the Municipal Secrecy Bureau on Implementing Classified Management of the City's Secrecy Work, the office and archivists of our bureau organized a self-examination of the secrecy work of the organs. The self-inspection is now reported as follows: 1. Strengthen the publicity and education of confidential knowledge and enhance the confidentiality awareness of government officials.

Our bureau has always insisted on confidentiality as the key work to strengthen its own capacity building and improve its ruling level, and has earnestly strengthened its own confidentiality work in strict accordance with the requirements of its superiors for confidentiality work. One is to organize government officials to learn confidential knowledge by means of collective learning. The contents of the study mainly include: People's Republic of China (PRC) Law on Guarding State Secrets, Leading Cadres' Secrecy System, Conference Secrecy Regulations, Official Document Secrecy System and other laws and regulations closely related to the daily work of organs, instructions from superiors on confidentiality, confidentiality rules and regulations and related policies and regulations. The second is to use meetings and major events to pay attention to confidentiality education in work practice. We insist on combining secrecy education with practical work, daily education with education before major events, and attach great importance to enhancing the secrecy awareness of every government official, especially leading cadres, heads of stock offices and secret-related personnel, so that all relevant personnel can know their professional work, which are state secrets, which should be kept secret, how to keep them secret, and what confidentiality rules and regulations exist, which has laid a reliable ideological foundation for the smooth development of our secrecy work.

Two, the establishment of leading institutions, improve the security system, pay close attention to security management.

According to the confidentiality regulations, our bureau has set up a leading group for computer information system security and confidentiality management, with Director Shen as the team leader, Deputy Director Tan as the deputy team leader and other members as the team members, so as to effectively strengthen the leadership of confidentiality work. The leading group consists of an office, the director of which is also the director of the security office, and is responsible for the comprehensive management of the security and confidentiality of the computer information system of this bureau. At the same time, it is clear who is responsible for the confidentiality of each warehouse. The leading group and its office attached great importance to confidentiality, and further improved the confidentiality rules and regulations, such as confidentiality system, confidential personnel management system, computer security system, file security system, post responsibilities of confidential staff, confidential file access system, confidential document handling (management) regulations, and confidential staff management regulations.

Three, strengthen the safety management of key parts of the secret.

1, cipher telegram management. In order to truly be "cautious and confidential", our bureau has listed several key parts, such as document sending and receiving, file management, infrastructure information management, secretarial work and computer system, in combination with the actual work. As the key link of confidentiality work, standardized management has effectively strengthened the prevention of information leakage. Special information equipment such as fax machines and computers shall be managed by special personnel, and the writing, issuance, transmission, batch copying, transmission, reading, storage, archiving and destruction of cipher telegrams shall be handled by special personnel as required. There are no problems such as secret letters being answered publicly, mixed with secret letters, illegal forwarding, extracting, copying and expanding reading scope.

2. Network security management. According to the characteristics of business work, our bureau clearly distinguishes between classified computers and non-classified computers, and there is a special person responsible for classified management. For confidential computers, set the power-on password one by one, regularly kill viruses, and implement physical isolation. There is no illegal access to public information networks such as the Internet, no networking devices such as wireless network cards are installed, and mobile storage media are not used interchangeably between classified computers and networked computers. Manage the number of non-confidential computers, install anti-virus tools, make them have the functions of vulnerability scanning and intrusion protection, and conduct real-time monitoring and regular detection to ensure that they are not infected with viruses. Every mobile storage medium has been registered and numbered, and it insists on not using mobile storage medium to store and process confidential information. When the classified machine, classified software and hard disk fail, the office will contact the professional computer company to send technicians to the site for maintenance directly after finding out the reasons and specific circumstances to ensure that the classified information will not be leaked and stolen. Without the consent of the unit leader, the data on the computer shall not be printed or copied to the personnel of other units. At the same time, according to the regulations, strengthen the confidentiality supervision of press and publication and the provision of information to the outside world. The leadership responsibility system and post responsibility system shall be implemented in the confidential management of all released information. The confidentiality management of information disclosure in each stock room shall be "who announces, who is responsible". The release of warehouse information must be approved by the main person in charge of the warehouse. The overall important information follows the principle of "first review, then disclosure". Important public information must be approved by the leaders in charge of the bureau. No one may make it public without approval.

3. Information management of confidential documents. Strengthen the management of confidential documents and the security measures for printing, keeping, cleaning, filing and destruction of various documents. In particular, the waste manuscript paper produced in the process of drafting documents is not allowed to be thrown casually, burned centrally or destroyed by a confidential shredder. It is not allowed to extract the documents in the circulating folder at will, and it is not allowed to expand the circulating scope of the documents without authorization. After reading the document, you must endorse the name (full name) and time. Generally, documents should not be circulated for more than two days at a time, and urgent documents should be returned immediately after reading, and there should be no arbitrary backlog or extension of time. All kinds of documents issued to leading cadres for private reading must be cleaned up by the end of the year. In the process of making, sending, receiving, transmitting, using, saving and destroying documents, it should be handled in strict accordance with the spirit of relevant documents at higher levels. There are procedures for issuing documents, reviewing and leading the examination and approval. The confidential documents produced by this unit shall comply with the confidentiality and classification standards submitted to the superior secrecy department. In the processing of official documents, we should adhere to the system of sending and receiving documents registration, reading cards by leaders and single signature retention, and the borrowing documents should be registered or signed on the borrowing receipt. Document destruction shall adhere to the system of document cleaning and registration, review by leaders in charge and review and signature by leaders in charge, and the cleaned documents shall be uniformly destroyed by offices and archives. The bureau office is responsible for the collection and unified destruction of documents and newspapers formed by each unit room, even if there is no confidentiality level. For documents and confidential information, there are "iron cabinets, locks, security window, iron gates, security doors" and other defensive measures. Put a seal on the door during the festival.

Four. Existing problems and areas needing improvement

1. The education of secrecy work needs to be continuously strengthened, and corresponding rules and regulations need to be formulated to plug possible loopholes and eliminate hidden dangers, so that secrecy work can be continuously improved along the track of legalization.

2 in addition to the necessary funds and equipment investment, we should also strengthen the professional training of security personnel and improve the quality of security cadres.

Under the leadership of the secrecy bureau of the county party Committee and relevant departments, the secrecy work of our bureau has been gradually standardized, scientific and institutionalized, and there has been no leakage. In the future, we will continue to work hard to consolidate the new achievements, actively explore and study the new situation and new problems of grassroots secrecy work in the new period, and strive to bring secrecy work to a new level.

The third part of the self-inspection report on confidentiality work

According to the spirit of documents such as Ningbao [2016] No.3, the specific requirements of the Detailed Rules for Self-inspection and Self-evaluation of Confidentiality Work of Organs and Units (Trial), and in combination with the relevant provisions of the Provisions on the Responsibility System for Confidentiality of Party and Government Leading Cadres, the Development Zone has earnestly carried out self-inspection of confidentiality work based on reality and the nature of work. The self-inspection is now reported as follows: 1. Strengthen organizational leadership.

The Development Zone conscientiously implements the spirit of the Law of People's Republic of China (PRC) on Guarding State Secrets, focusing on the safety management of secret-related personnel, secret vector and secret-related computers, further strengthening the leadership of safety work, strengthening supervision and inspection, paying close attention to the implementation of various safety measures and safety responsibility system, and putting an end to major leaks.

First, the leading group of the development zone has always put confidentiality on the important agenda and paid close attention to the implementation of the responsibility system. A leading group for confidentiality work was established, with the deputy secretary of the Party Working Committee as the leader and the deputy director as the deputy leader. The members are composed of department heads and secrecy officers, and an office is set up to handle the daily affairs of secrecy work, which provides a strong organizational guarantee for the full implementation of secrecy work.

The second is to strengthen the construction of the security work team, adhere to and improve the security work organization, keep the security work team together, adjust and supplement the security personnel in time, do a good job handover, and ensure the continuity of the work.

Third, adhere to the principle of who is in charge and who is responsible, implement the target responsibility system, incorporate it into one of the contents of the overall target assessment, decompose and implement the target tasks layer by layer, and make arrangements and inspections.

Second, the development of confidentiality work

(A) to strengthen publicity and education

Combined with the actual situation of the development zone, we will carry out the study of confidentiality laws and regulations and the special education on confidentiality.

The first is to sign a confidentiality letter. The person in charge of the development zone, the leaders in charge, the director of the office and the confidential clerk signed the confidentiality letter respectively.

The second is to forward all kinds of confidential learning documents to all departments and directly affiliated units, and ask them to seriously organize learning in combination with the actual situation and do a good job in implementation.

Third, leading cadres and secret-related personnel insist on taking the lead in earnestly studying the relevant provisions of various security work, watching warning films on security education, participating in training courses on security knowledge, actively publicizing security laws and regulations by using the website of the Development Zone and other forms, and strengthening publicity and education on the security legal system for leading cadres, key secret-related personnel and secret-related cadres. Constantly improve the level of managing confidential work according to law.

(2) Improve the system.

First, further improve the confidentiality rules and regulations to ensure the safety of key confidential parts.

Second, adhere to the routine inspection system for the management and use of secret vector in the Development Zone, and rectify the deficiencies and hidden dangers found in the inspection in strict accordance with the requirements.

Third, the computer management system has been formulated, the computer equipment account has been established, the equipment name and model have been registered, and the dynamic management has been strengthened. Designate a special person to be engaged in computer management, and adhere to the principles of "whoever accesses the Internet is responsible" and "Internet information is not classified, and confidential information is not accessed online" to prevent the occurrence of leaks.

So far, there has not been a computer leak accident in the development zone system.

(3) Strict confidentiality management

First, strictly regulate management. All confidential documents shall be properly handled in accordance with the relevant provisions of the Secrecy Law, and the procedures of counting, registration, numbering and issuance shall be strictly implemented during receiving, sending and transmitting. In the use of links, strictly know the scope of personnel, expand the scope of knowledge without authorization. Where audio or video recording is not allowed, the disseminator must declare in advance, and the reproduction of secrets must be approved by the competent leader, and the registration formalities must be completed, so as to ensure the safety of confidential documents, records and information in the process of transmission and use.

The second is to strengthen the confidentiality management of archives. In order to strengthen the security and confidentiality in the circulation of documents and files, the file storage system has been further improved, the receiving, sending, circulation, return and borrowing of documents have been strengthened, and the safety of filing, filing, transfer and destruction of files has been ensured.

The third is to strengthen information submission and approval. Strengthen the examination and approval system for online submission of major information. All major information submitted to various government websites must be signed and confirmed by the leaders in charge, and then submitted to a special person for approval.

Three. Special confidential self-inspection

(1) Information Management of Confidential Documents

1. No confidential documents have been drafted;

2. Follow the principle of "minimizing the scope of knowledge";

3. In the reading management link, there is no out-of-range reading to convey or copy the assembly file information, and the equipment is complete, and the surrounding environment meets the confidentiality requirements;

4. Regular removal and destruction, complete procedures, and regular cleaning of internal materials and electronic documents held by individuals.

(B) Network security management

1, the office network is not classified, and the positioning is accurate;

2. The information published by the portal website has been subject to a confidentiality review system, and there is no problem of illegal publishing;

3. The use and management of classified computers and mobile storage media meet the confidentiality requirements.

(3) secret media management

1, send and receive secret carriers, and strictly perform procedures such as counting, registration, numbering and signature;

2, keep the secret carrier, equipped with the necessary security equipment;

3, destroy the secret carrier, in strict accordance with the way approved by the leaders in charge, and perform the inventory and registration procedures.

(4) Information disclosure and confidentiality review

No classified information was found in the information released to the public by the website of the unit and the government information disclosure system.

Through self-inspection, the safety work, system, management and inspection in the development zone are basically in place. In the future work, we will unremittingly do a good job in the education and management of all personnel, especially those involved in secrets, strengthen professional training and on-the-job training, constantly improve rules and regulations, strengthen the sense of confidentiality, resolutely put an end to the problem of leaking secrets, and ensure the smooth development of all work.

The fourth part of the self-inspection report on confidentiality work

In order to further strengthen the confidentiality work, according to the unified arrangement and deployment of the provincial society, the logistics service center carried out self-examination in accordance with the spirit of the Notice of the Provincial Society on Carrying out the Annual Confidentiality Self-examination and Self-assessment, combined with its own work practice, and found no violation of confidentiality laws and regulations during the self-examination. Now the self-examination and self-evaluation are reported as follows: 1. Attach great importance to it and strengthen organizational leadership.

In order to implement the spirit of the circular, enhance the awareness of cadres and workers on the importance of current secrecy work, and further strengthen the confidentiality awareness of cadres and workers, the leaders of the center attach great importance to it, and focus on strengthening the confidentiality education for secret-related personnel such as logistics centers, commercial hospitals and nurseries. , clear the functions and responsibilities of the secret-related personnel, listen to the work report of the secret-related personnel once every six months, and add professional safes to ensure that no leaks are made.

Second, publicity and education, to implement the responsibility of confidentiality.

The logistics center attaches great importance to this security inspection, earnestly strengthens the leadership of security work, and urges the improvement and implementation of various security measures. At the same time, on the basis of further understanding the purpose, content and requirements of this inspection, organize the secret-related personnel in the logistics center to learn the confidentiality laws and regulations, explain and publicize the importance of their work with cases, designate special personnel to send and receive documents, handle them, and establish a document circulation and receipt system to ensure the normal transmission, safety and filing of documents and materials.

Third, standardize operations and eliminate hidden dangers of leaks.

In order to strengthen the confidentiality of computer information systems, each computer system in the center has installed anti-virus software to prevent virus invasion. At the same time, the operation of the work computer is strictly regulated, and the staff are required to operate in strict accordance with the norms and report the virus in time. Effectively strengthen the management and maintenance of computers that store confidential information, and implement strict management systems for the borrowing, use, storage and destruction of storage media such as USB flash drives and mobile hard disks to ensure the safety of electronic documents.

Through this security inspection, our center will take this security inspection as an opportunity to further establish and improve the security rules and regulations, continuously strengthen the staff's security awareness, strictly regulate the staff's security behavior, strive to improve the security level of software and hardware, effectively implement the security work in all work, and create a good security environment for the party's xx victory.