security management system
Confidentiality responsibility of government staff
1, we should be familiar with the Secrecy Law and its supporting laws and regulations, fulfill the obligation of confidentiality in accordance with the law, and strive to be a model for learning and abiding by the law.
2, should strictly abide by the "national staff ten confidentiality rules".
If you want to know how to copy state secret documents and materials, you must go through the examination and approval procedure, and the copy should be kept properly, just like the original.
4. It is strictly forbidden to carry, mail and sell documents, materials and other articles involving state secrets. If it is really necessary for work, you should go through the formalities at the local security bureau according to the relevant regulations.
5. In foreign exchanges and activities, we should not only be warm and friendly, but also pay attention to the differences between inside and outside. Without approval, we should not provide party and state secrets to foreign personnel.
6. Don't pile secret documents on the desktop. When people leave the office, they should collect secret documents in drawers or cabinets and close the door behind them.
7. Individuals are not allowed to keep secret documents, which should be cleared in time after reading.
8. The waste manuscript paper produced in the process of drafting documents is not allowed to be thrown casually. It should be put into the wastebasket for centralized burning, and it is important to destroy it immediately.
Secretary's duty of confidentiality
1, strictly observe discipline, be loyal to their duties, and conscientiously implement various confidentiality systems and regulations.
2. All secret documents, telegrams, files, materials, publications, audio tapes, video tapes, notes and letters of leading comrades, etc. , must be strictly observed. Confidential parts and ordinary parts should be stored separately; When leaving the post, confidential documents should be placed in the safe, locked and doors and windows closed.
3. When secret documents, coded telegrams and archival materials are collected due to special circumstances, they shall not be opened without permission, and the handover procedures shall be handled in time.
4, received confidential documents should be carefully checked, registered, timely sent to the leadership to read the batch, or properly handled according to the confidentiality provisions.
5, circulating secret documents and materials should strictly implement the sign-in system, according to the prescribed scope of single-line circulation, not horizontal transmission, at any time to register the sales number, timely reminder; Without authorization, it shall not be reproduced, reproduced or quoted publicly.
6. The written draft or multiple copies of secret documents shall be regarded as official documents registered, kept, filed or destroyed.
7, found that the secret is lost or lost, should immediately report to the security department, and pay close attention to find, take remedial measures.
8 speeches, conversations and instructions of leading comrades that have not been made public, as well as the time, place, participants, contents, meeting documents, materials, records, audio and video recordings, etc. If it has not been made public, it shall not be disclosed to the public.
9, regular inspection, cleaning, repel and destroy files. The system of registration, approval and destruction supervision shall be implemented for the destruction of documents. Strictly prevent secret documents, materials and manuscripts from being sold with old newspapers.
10, meeting minutes and related documents should be kept strictly and filed in time.
1 1. When the work is transferred, the documents, telegrams, materials, confidential books and other carriers that are in charge of custody shall be handed over to the personnel designated by the organization for receiving, and shall not be taken away.
Confidentiality responsibility of printing post
1. Any document with confidential information shall not be copied without the signature of the leader. Copying secret documents: top secret documents can only be copied after being approved by the original issuing authority; Confidential and secret copying must be approved by the competent leader of the unit at or above the county level before copying. The number of copies should be strictly controlled, and the copies should be managed as the originals.
2. Strictly keep secret manuscripts, materials and disks containing secret contents.
3. Strictly abide by the confidentiality discipline. The contents of printed and copied confidential documents shall not be disseminated, read by irrelevant personnel, printed and saved without permission.
4. Printed confidential waste pages and wax paper shall be handled in time and shall not be read by irrelevant personnel.
5, printing workshop, printing room, computer room, irrelevant personnel are forbidden to stay, visit, it is forbidden to receive visitors.
Responsibilities of confidential receiving and dispatching post
1. Do a good job in the registration, transmission and management of confidential documents.
2. Carefully check the receipt, timely register, distribute and perform the signing formalities.
3, strictly abide by the provisions of the Ming, Ming complex, secret complex, it is strictly prohibited to mix Ming and secret.
4, the distribution of documents should be sent directly to the relevant confidential, secretarial personnel or leading comrades to sign for it, and no one is required to carry or receive it.
5. The document shall be delivered directly to the receiving unit, and shall not be conveyed by the client. It is forbidden to bring confidential documents into public places.
6. All confidential documents signed by leaders shall be submitted for review and countersigned by leaders; If the relatives are absent, they will be collected by the person designated by the leader.
7. When going out to deliver top secret documents, we should insist on two people walking together, leaving no one behind and people in the documents.
8. Irrelevant personnel are forbidden to stay in the confidential room and the mailroom, and irrelevant personnel are forbidden to read files, letters and other documents.
9. Close the windows and lock the doors when there is no one in the office and after work.
Responsibilities of computer post safety work
1, the computer room should be built in a safe area, and effective safety measures should be taken. According to the electromagnetic radiation and objective environment, shield the computer room, host or internal components, and then open the computer room after passing the test.
2, the computer room to establish and improve the reception system of foreign personnel, personnel entering the computer room for examination and approval and registration system; Each unit should have a leader in charge of office automation, and determine the person in charge of computer application management.
3. Corresponding security measures should be taken for the transmission and storage of all confidential data; The floppy disk information recorded with the file should be properly kept to prevent it from being lost.
4. Without permission, it is forbidden to take the floppy disk containing confidential documents out of the office. If it is really necessary to take it out of the office because of work needs, it must be approved by the leaders and properly kept by special personnel.
5, according to the conditions of confidential personnel equipped with computer staff involving state secrets, computer staff should be vigilant, strictly abide by the confidentiality discipline and relevant rules and regulations, and consciously do a good job in confidentiality.
6. If it is necessary to send the computer with files to the office for maintenance, the relevant contents on the hard disk should be technically processed after copying the confidential files, and external personnel should be invited to the office to maintain the computer with confidential files. It is necessary to obtain the consent of the relevant leaders in advance, do a good job in corresponding technical treatment, and take strict security measures to prevent leaks.
7. Computers joining the wide-area or local-area Internet must use encryption machines, and the Municipal Secrecy Bureau shall organize unified ordering, installation and training. The municipal security bureau is responsible for the maintenance of the security machine, and all units have no right to handle it by themselves. Do not introduce the use technology of the secret machine to the personnel of any irrelevant unit.
8. It is forbidden to play games with computers to prevent "computer virus infection".
9. When transmitting information on the computer network, be clear, ask clearly and answer clearly; Secret documents are transmitted in secret, and secret questions are transmitted in secret. It is strictly forbidden to mix public and secret.
10, the computer room should establish a microcomputer shift system, strictly implement the handover registration, and must not disclose confidential information.
Duty of confidentiality of automobile drivers.
1. Drivers are not allowed to inquire about relevant leaders or ask about matters that are not disclosed at the end of official business. When you come into contact with something that is not suitable for publicity, you should take the initiative to undertake the obligation of confidentiality.
2, senior leading cadres to visit, inspection (test) activities of the route and place of stay shall not be leaked, and take the initiative to do a good job in security.
3. Secret matters known in official contact shall not be spread.
4. When accepting the task of transporting state secret documents, materials and other articles, you should go straight back and refuse irrelevant personnel to ride.
5. The leader leaves the car temporarily, and the driver is not allowed to leave the car when there are documents or other confidential books and periodicals in the car to ensure its safety.
6. After the leader leaves the car, the driver should help to check whether there are any documents left in the car and return them to him immediately after finding them.
7, when the car, without the consent of the leadership personnel are not allowed to ride, the key parts, in addition to the relevant personnel, other personnel are not allowed to follow the car; Drivers are not allowed to set foot in secret parts without permission.
8. The driver shall not transfer or discuss the matters discussed by the bus leaders.
Confidentiality management system for sending, reading and circulating documents
1. Documents submitted according to the instructions of * * * shall be registered. After receiving the instruction from * * *, send it back to the office. Documents shall not be transmitted horizontally between * * * *, and approval shall not be submitted directly to the organizer.
2. All circulated documents should be sent directly, and the person in charge of the documents should register and send them to the readers one by one, and return them after reading. The number of copies shall be counted and shall not be circulated horizontally among readers.
3. Generally, documents should not be circulated for more than two days at a time, and urgent documents should be returned immediately after reading, and there should be no backlog or extension of time.
4. Files in the circulating folder are not allowed to be randomly extracted. If it is necessary for work, it must be approved by the sending and receiving personnel and go through the borrowing procedures. Shall not expand the scope of document circulation without authorization.
5. After reading the document, you must endorse the name (full name) and time.
6, circulated documents must pay attention to save and custody, shall not be defiled or lost.
7. All kinds of documents issued to leading cadres for private reading must be cleared by the end of the year.
Conference security management system
1, for an important meeting with a high degree of confidentiality, you should contact the security department before the meeting to jointly take security measures, and educate the participants on confidentiality and stipulate confidentiality discipline.
2. For meetings involving state secrets, you should choose a meeting place with safe and confidential conditions, and it is strictly forbidden to use wireless microphones to transmit confidential documents and amplify sounds outdoors.
3, where to convey secret documents, must be handled in accordance with the provisions of the document and the superior indicators, shall not be allowed to expand the scope of communication.
4. It is forbidden for irrelevant personnel to enter the meeting place. The list of persons who need to attend the meeting as nonvoting delegates shall be submitted to the responsible comrades of the meeting for approval.
5. Participants are not allowed to record the contents of the meeting that are not allowed to be recorded, and are not allowed to bring a tape recorder into the venue to record.
6. It is strictly prohibited to print and copy the secret documents and materials of the meeting. If it is really necessary to make a copy because of work, it must be approved, marked with classification, and copied at the designated place.
7. The secret documents copied during the meeting must be numbered uniformly, registered and distributed, and the documents sent to the participants must be properly kept and not lost.
8. The participants shall not disclose the secret contents of the meeting in any form, and the news department shall not publicly report the secret matters of the meeting.
9. After the meeting, the venue should be inspected for confidentiality to see if there are any lost documents, materials and notebooks.
◆ With the guiding ideology of "controlling the source, strengthening inspection, clarifying responsibilities, and implementing the system", all departments use anti-virus software approved by the national competent department when installing anti-virus software, and kill viruses in time, instead of using unknown software, floppy disks, CDs, U disks and other carriers. , and do not visit illegal websites, and consciously strictly control and block the source of the virus.
◆ Private network computers must be installed with regional unified anti-virus software and set the power-on password.
◆ Three ways of making government information public are marked on the list of government documents, and whether it is open or not is indicated when drafting documents.
◆ It is forbidden for computers accessing private networks to access public networks such as the Internet at the same time; It is strictly forbidden to use mobile storage devices such as USB flash drives across computers connected to private networks and computers connected to the Internet (extranet), and it is not allowed to exchange data directly without taking protective measures (antivirus, formatting, etc.). ); It is forbidden to mix classified computers and mobile storage devices with non-classified computers and mobile storage devices.