According to the spirit of the document "Notice of the State Secrecy Bureau of xx Municipal Committee of the Communist Party of China on Organizing the Summary and Acceptance of the Sixth Five-year Confidential Legal Publicity and Education" ([20 17] 15) and the specific requirements of the Sixth Five-year Confidential Legal Publicity and Education Summary and Acceptance Quantitative Assessment Scale, the National Development and Reform Commission attached great importance to it, immediately arranged the deployment and paid close attention to the implementation of the work. The self-inspection work is now reported as follows: 1.
Confidentiality is a basic and decisive work for state organs, and it is very important for the development of the work of the party and the state. The National Development and Reform Commission (NDRC) attaches great importance to confidential publicity and education, and incorporates this work into the performance management of the NDRC. In line with the principle of teaching students according to their aptitude, special training and study are conducted for people at different levels of the unit. First, through lectures, visits, demonstrations, and distribution of information. Confidential publicity has become one of the learning contents of the party group meeting, which contributes to the institutionalization and normalization of confidential publicity and education in party member. The second is to use the Committee to conduct centralized publicity and education for cadres at or above the division level, so as to raise the awareness of confidential knowledge of government officials. At the same time, the leaders of the State Secrecy Bureau and relevant experts are invited to conduct confidential knowledge and technical training and education for the cadres and workers of the National Committee to improve the confidentiality awareness and skills of the employees of the Ministry. Third, focus on the special study and training of new employees on confidentiality laws and regulations and confidentiality technology, and play the bridgehead role of confidentiality work. The fourth is to strictly implement the legal study system of party group meetings and Committee meetings, and study the secrecy law and other relevant laws and regulations in several special topics. Fifth, the publicity and education plan on confidentiality legal system in the Sixth Five-Year Plan of xx Development and Reform Commission was formulated, and the study of confidentiality legal knowledge, the implementation of confidentiality discipline, the implementation of confidentiality responsibilities and the performance of confidentiality commitments were included in the annual work assessment to stimulate the enthusiasm of employees in the unit to learn confidentiality knowledge.
Two, the secret personnel of the unit to carry out special education on the legal publicity of confidentiality.
First, the newly hired secret-related personnel shall be given special ideological education and pre-job training on confidentiality technology, with clear organizational rules and disciplines, and a letter of commitment on confidentiality responsibility shall be signed. Organize relevant personnel to conduct on-the-job training irregularly after joining the company. Second, combined with the characteristics of the work of the National Development and Reform Commission, focusing on the supervision of classified posts, establish and improve the confidentiality management and confidentiality review system of project departments that have a significant impact on the work of the National Development and Reform Commission, and designate special personnel to supervise sensitive posts. The third is to educate the off-duty and off-duty secret-related personnel on confidentiality laws and regulations, and at the same time do a good job in handing over the files and materials of the newly-taken-over personnel, and change their accounts and passwords in time to prevent the disclosure of secret-related information. Fourth, actively organize the secret-related personnel of the unit to participate in the professional training of secret-related work at the provincial and state levels, so as to enhance the ideological understanding and professional level of the secret-related personnel.
Three, the use of various forms and channels to carry out publicity and education on the legal system of confidentiality.
The New Secrecy Law puts forward new requirements for the current secrecy work of government organs and units, especially in the context of the Internet era, which requires units to take necessary new measures. Our Committee attaches great importance to the transformation of confidential work methods, constantly innovates publicity methods, strives to broaden publicity channels and effectively changes publicity methods. Specifically, the first is to conduct special training on Internet office security for secret-related personnel and departments to ensure the reliability and security of the office environment. The second is to show both positive and negative materials through special lectures on legal education, so as to improve the vigilance and law-abiding awareness of all staff in the unit. Third, take the anniversary of the promulgation and implementation of the secrecy law, legal publicity day and publicity week as an opportunity to carry out thematic publicity activities to deepen and consolidate the ideological understanding of all employees on secrecy. Fourth, order "Confidentiality Work" and other publications and related teaching materials, carry out periodical use activities, urge secret-related personnel to learn, and improve the theoretical and practical level of confidentiality work. Fifth, use new information forms such as Weibo, WeChat and electronic bulletin to carry out publicity, broaden publicity channels, expand publicity scope, and enhance the flexibility and effectiveness of publicity work.
Fourth, strengthen organizational leadership to ensure the orderly development of confidentiality work.
Department confidential self-inspection report Part II
Heihe Editorial Board Office has always regarded confidentiality as an important work schedule, organized and studied the spirit of relevant documents, fully understood the significance of doing a good job in confidentiality self-examination and self-assessment, incorporated the Working Rules for Confidentiality Self-examination and Self-assessment of Organs and Units (for Trial Implementation) into the contents of confidentiality education, clarified specific requirements, and formed a working mechanism of who is in charge and who is responsible to ensure that confidentiality self-examination and self-assessment work is actively and effectively carried out. First, pay close attention to the implementation of confidentiality responsibilities.
Focusing on the safety management of secret-related personnel, secret vector and secret-related computers, we will continuously strengthen the leadership over safety work, strengthen safety management, strengthen supervision and inspection, and pay close attention to the implementation of various safety measures and safety responsibility system. In accordance with the requirements of the detailed rules, a comprehensive self-examination was carried out. Combined with the actual work of the unit, the "Self-examination and Self-evaluation Standard for Confidentiality Work of Organs and Units" was carefully filled out and graded, involving 8 self-examination contents and 32 actual projects, and the evaluation results met the requirements. Sign a letter of responsibility for the safe use and management of classified equipment. Since the establishment of the network platform organized by the Municipal Party Committee and the connection with the confidential intranet of the Party Committee, in order to do a good job in the use and management of confidential equipment and prevent leakage, our bureau strictly follows the Administrative Measures for the Use of Common Passwords in the Intranet of the Party Committee System of Heilongjiang Province (Trial), adheres to the principle that whoever uses it is responsible, and all users of confidential equipment in each department determine the first responsible person, the second responsible person and the third responsible person respectively according to their positions and frequency of use, and sign the security of confidential equipment.
Second, establish a private network management system.
In order to improve the safety awareness of users of institutional network platform and strengthen the standardization and safety of platform operation, Heihe Editorial Board Office has specially formulated the Management System of Institutional Private Network, which strictly regulates all employees of our office and platform operators of linkage departments, and requires platform operators not to inform others of their login passwords and passwords in any form. Any equipment with storage and memory functions connected to the private network is regarded as classified equipment, and it is forbidden to use the classified equipment connected to the private network for other purposes without permission. This is strictly required.
Third, establish a long-term mechanism to form a normalization of work.
The third part of the departmental confidential self-inspection report
According to the spirit of the Notice of Zhenghe County State Secrecy Bureau on Printing and Distributing the Work Plan of Zhenghe County Secrecy Self-inspection, Self-evaluation and Supervision (Bao Zheng [20 1 7] No.2), our bureau has seriously organized and carried out the self-inspection and self-evaluation of this system in light of the actual situation, and now the work situation is reported as follows:1.Organization, team and system construction of confidentiality work.
(1) organizational construction. In order to implement the target management responsibility system for confidentiality work and ensure the effectiveness of confidentiality work, our bureau has set up a leading group for confidentiality work, with the director as the leader, the deputy director in charge as the deputy leader, the heads of all units and offices as members, and the office responsible for daily work. Our bureau adheres to the principle of who is in charge and who is responsible for confidentiality. By clarifying the scope of responsibility and conducting pressure at different levels, we will implement the requirements of confidentiality work to every post and every cadre and worker, and closely combine confidentiality work with human society business, with the same deployment, requirements and inspections.
(2) Team building. In order to ensure the smooth development of daily security work, two security personnel are specially appointed to take charge of daily inspection and liaison work. Do a good job in the publicity and education of confidentiality for all cadres and workers, organize and study the important spirit of confidentiality laws and regulations and the confidentiality work of higher authorities through various forms, continuously deepen the understanding and application of confidentiality knowledge by cadres and workers, and effectively enhance the confidentiality awareness of cadres and workers.
(3) system construction. Combined with the actual work of the People's Social Security Bureau, the "Zhenghe County People's Social Security Management System" and the "Zhenghe County People's Social Security Bureau's Government Information Disclosure and Confidentiality Review System" were formulated and promulgated, so that all confidentiality work can be followed by rules and evidence. Always put the secrecy work into the important task of organ construction, and link it with performance appraisal, annual appraisal and all kinds of appraisal, and carry out informed criticism on units and individuals whose secrecy work is not in place, with serious accountability, and form a strict secrecy work system.
Second, computer security management
(1) classified management. Classified management of classified computers and computers on the Internet, strict implementation of the Interim Provisions on the Security of Computer Information Systems, and designation of users of each computer as responsible persons and administrators. For important platforms such as salary database and treasury system, special computers are used for cross-network operation, and data entry and access are strictly in accordance with the step-by-step examination and approval system to ensure the security of confidential data. We conscientiously implement the confidentiality provisions that confidential media should not be connected to non-confidential computers, and it is strictly forbidden to store and process confidential information on non-confidential computers.
(2) Regular maintenance. Bureau of security work leading group regularly patrol classified and online computer usage, it is strictly prohibited for classified computers to run online, and requires online computers to regularly antivirus and update software to ensure compliance with the use management regulations. The maintenance, maintenance and elimination of networked computers and classified computers strictly implement the confidentiality system, and set the power-on password as required.
Three. Document production, disclosure and document management
(a) the production of government documents. Drafting, issuing, circulating and publicizing government documents and information in strict accordance with the gradual examination and approval system. The disclosure of government information strictly follows the principle of "who is in charge, who examines, who is open and who is responsible" to prevent the disclosure of personal privacy and state secrets.
(2) File management. In strict accordance with the requirements of archives utilization and management, centralized storage and management of the files of floating personnel and cadres and workers, equipped with full-time archivists, and strengthened the construction of hardware facilities such as archives warehouse and system equipment to ensure that personnel, facilities and funds are in place. Strictly implement the procedures for consulting the borrowed files to ensure the safety of the file information: if the borrower is himself or his relatives, if the procedures are incomplete or the reasons are insufficient.