First, what is a state secret?
The "Secrecy Law" has a clear definition of China's state secrets: "State secrets are matters related to national security and interests, determined according to legal procedures, and only known to a certain range of people in a certain period of time."
Matters involving national security and interests can only become legally recognized state secrets after the corresponding procedures for determining the classification are fulfilled. In other words, it has to go through a set of legal confidentiality procedures. The "Secrecy Law" has clear provisions on the determination of state secrets, the classification of confidentiality levels, the determination and change of confidentiality period, decryption and other procedures.
Second, what are the types of state secret carriers?
The form and style of the carrier of state secrets. There are mainly the following categories:
Paper medium carrier. It is a paper document that records state secrets (www.aqjj 120.com) in written form such as words, figures and data. Such as state secret documents, manuscripts, documents, archives, telegrams, letters, drawings and graphic materials. People usually refer to this kind of carrier as state secret documents and materials. State secret documents and materials are the most commonly used and common carriers of state secrets in our practical work.
Magnetic medium carrier. A carrier for recording state secret information with magnetic substances. Such as disks (including floppy disks and hard disks), magnetic tapes, audio tapes and video tapes that record state secret information.
A carrier, such as an optical disc, records and transmits state secret information through optical signals. With the development of information technology, there will be more and more state secret carriers such as magnetic media and optical disks.
Equipment, products and articles containing state secret information. Some of these carriers can directly reflect the attributes of state secrets from the appearance, and some can obtain state secret information through physical or chemical means such as detection and analysis.
3. What are the levels of state secrets? What are the criteria for distinguishing different security levels?
The classification of state secrets in China is divided into three levels; Top secret, secret, secret.
The principles and standards for distinguishing these three grades are:
(1) "Top Secret"-the most important state secret, the disclosure of which will cause particularly serious damage to national security and interests.
(2) "Confidential"-an important state secret, the disclosure of which will seriously damage national security and interests.
(3) "Secret"-a general state secret, the disclosure of which will harm national security and interests.
As can be seen from the above classification standards, the classification of the above three grades is based on the degree of harm caused by leakage.
Top secret-the damage is particularly serious.
Confidential-serious damage consequences.
Secret level-damage consequences.
Once the secret level is determined, it should be managed and controlled in strict accordance with the determined secret level. This is the basic requirement of confidentiality.
4. What are the rules for reading and transmitting state secrets?
(1) The reading and dissemination of state secrets shall be strictly limited within the prescribed scope, and the scope shall not be expanded without authorization.
(2) reading confidential documents must be carried out in places with confidentiality guarantee such as offices or reading rooms;
(3) Reading confidential documents shall be registered and shall not be directly transmitted to others by readers;
(4) Do not circulate confidential documents without authorization;
(5) When spreading confidential content, wireless microphones and other devices without confidentiality guarantee shall not be used;
(six) the personnel who monitor the communication shall abide by the discipline of confidentiality, and if it is necessary to record or video, it shall be approved.
5. What regulations should I abide by when carrying a state secret carrier out?
1. If it is really necessary to carry the state secret carrier with you because of work, it shall be approved by the competent leaders of organs and units, and the secret carrier is always under the effective control of the carrier.
2, carrying a top secret state secret carrier must go out with more than two people.
3. Without approval, it is forbidden to carry state secrets to participate in foreign affairs activities and enter overseas institutions.
4. When an individual goes out on business, in case of emergency, the security of the state secret carrier he carries is threatened, he should immediately ask the nearest security department, public security department or other organs and units for help, and get in touch with the organs and units as soon as possible and report the situation truthfully.
6. What are the provisions for the preservation of state secret carriers?
(1) Where secret carriers are stored, safe and confidential places and locations shall be selected, and necessary security equipment shall be provided. Top secret secret carriers shall be stored in safe and reliable confidential equipment and managed by special personnel.
(2) When employees leave the office, they should store the secret carrier in the confidential equipment.
(3) Secret-related organs and units shall regularly check and inspect the secret vector stored in that year every year, and report to the secrecy department in time when problems are found.
(four) the carrier of state secrets that need to be filed shall be filed in time or handed over to the archives department for safekeeping in accordance with the provisions of the Archives Law.
(5) When keeping confidential documents, the following two situations are not allowed: first, the carrier of state secrets is stored in personal homes; Second, individuals privately keep the carrier of state secrets.
7. What are the circumstances in which individuals keep state secret carriers privately?
Individuals keep state secret carriers privately, which mainly refer to the following three situations:
(1) The carrier of state secrets that should be cleared after reading is not cleared as required;
(two) the state secret carrier received by the secret-related meeting should be handed over to the management of the unit after the meeting but not handed over;
(3) Transfer from the original work unit or retirement or resignation. And the original confidential documents should be returned to the unit but not returned.
8. What is a leak?
Leaking refers to an event that violates confidentiality laws and regulations, makes state secrets known to people who should not know, or exceeds the limited contact range and cannot prove that they are not known to people who should not know.
Nine, classified computer information system networking what technical measures should be taken?
Technical measures such as access control, border protection, identity authentication, data protection, system security monitoring and management should be taken in the networking of classified computer information systems.
X. What technical management measures should be taken to access the classified computer information system?
Access to classified computer information systems should be controlled according to the authority, and it is not allowed to operate beyond the authority. Data without technical security measures shall not be networked.
XI。 What are the rules for identifying confidential information?
The classified information stored, processed, transmitted and output by the classified computer information system shall have corresponding classified identification, and the classified identification shall not be separated from the text.
Twelve, how to manage the computer media that have stored and stored state secret information?
1. Computer media storing state secret information shall be identified according to the highest security level of the stored information and managed according to the files with corresponding security levels.
2, the state secret information stored in the computer information system should take protective measures.
3. Computer media that store state secret information cannot be used at a lower level. The maintenance of the media should ensure that the stored state secret information is not leaked.
4, no longer use the media should be destroyed in time.
Thirteen, what security measures should be taken by the confidential information processing site?
1, confidential information processing sites shall, in accordance with the relevant provisions of the state, keep a corresponding safe distance from the residences of overseas institutions and personnel.
2, confidential information processing sites should be set up according to the degree of confidentiality and the relevant provisions of the control area, without the approval of the management authority, irrelevant personnel are not allowed to enter.
3, confidential information processing sites should be regularly or according to the need for security checks.
4. Corresponding safety measures (www.aqjj 120.com) should be taken to prevent the electromagnetic information from leaking in the processing place of confidential information system.
5. Other physical security requirements of classified information systems shall comply with relevant national confidentiality standards.
14. Who is responsible for the security management of confidential computer information systems?
1. The security management of classified computer information systems shall be under the leadership responsibility system. The leader in charge of the unit that uses the computer information system is responsible for the security work of the computer information system of the unit, and designates relevant institutions and personnel to undertake it specifically.
2. The security agencies of each unit shall assist the leaders of the unit to guide, coordinate, supervise and inspect the security work of classified computer information systems.
Fifteen, how to manage the system administrator of confidential information system?
System security management personnel of classified computer information systems shall undergo rigorous examination, pre-job security training, regular education and assessment, and remain relatively stable.
Sixteen years old. What are the reward and punishment measures for the security management of classified computer information systems?
(1) Reward units and personnel who have made remarkable achievements in the security work of classified computer information systems.
(two) in violation of the "Interim Provisions" of computer information system security management, the security department and security agency shall order it to stop using it, make rectification within a time limit, and use it only after it is accepted by the security department and security agency.
(three) in violation of the "Interim Provisions" of computer information system security management, revealing state secrets, according to the secrecy law and its implementation measures, and shall be investigated for the responsibility of the unit leaders.
Seventeen, classified system integration qualification refers to what?
The qualification of classified system integration refers to the comprehensive ability required to engage in classified system integration engineering, including personnel composition, technical level, management level, technical equipment, service guarantee ability and safety facilities.
Confidential knowledge
What are the rules for mailing or carrying state secret documents, materials and other items abroad?
It is forbidden to post documents, materials and other articles belonging to state secrets out of the country. It is prohibited to illegally carry documents, materials and other articles belonging to state secrets out of the country. Those leaving the country shall be carried by diplomatic couriers or units and personnel approved by the State Secrecy Bureau; If it is impossible to reach the destination by express delivery, or it is difficult to carry by express delivery, and it is really necessary to carry confidential, secret-level state secret documents, materials and other items out of the country, it shall apply to the security department for an Exit Permit for State Secret Carriers.
What is a trade secret?
Trade secrets refer to technical and commercial information that is unknown to the public, can bring economic benefits to the obligee, is practical, and is kept confidential by the obligee.
What's the difference between state secrets and business secrets?
State secrets and commercial secrets have different legal characteristics. The secrecy law discusses the legal characteristics of state secrets: first, it is related to national security and interests; The second is to determine according to legal procedures; Third, things that only a certain range of people know at a certain time. The legal characteristics of trade secrets are described as four points in the Anti-Unfair Competition Law: first, they are not known to the public; Second, it can bring economic benefits to the obligee; Third, practical; Fourth, the obligee has taken confidentiality measures. It can be seen that the two kinds of secrets have different legal characteristics: First, the subjects of rights are different. The right subject of state secrets is the state, and the right subject of business secrets is unspecified individuals and organizations. Second, the procedures are different. There are strict legal procedures for the determination of state secrets, but there are no prescribed procedures for the determination of commercial secrets, as long as the obligee is clear according to its legal characteristics. Third, the levels and signs of secrets are different. State secrets are classified into three levels: top secret, confidential and secret, and have unified and clear signs. There is no hierarchy of trade secrets, and there is no uniform regulation on signs. Fourth, the legal basis for punishment after leaking secrets is different. Anyone who divulges state secrets shall be investigated for legal responsibility in accordance with the secrecy law. Those who disclose business secrets shall be investigated for legal responsibility in accordance with the Anti-Unfair Competition Law and other laws.
What are the principles and procedures for providing information for foreign economic cooperation?
The information provided by foreign economic cooperation should proceed from the overall interests of the country and the reality of foreign economic cooperation, weigh the advantages and disadvantages, and follow the principles of rationality, legality and moderation, which not only protects the security of state secrets, but also helps to ensure and promote the smooth progress of foreign economic cooperation.
The basic procedures for providing information confidentiality in foreign economic cooperation are as follows: first, determine the scope of providing information according to the actual needs of foreign economic cooperation projects; Second, conduct confidential review of the information that has been determined to be provided; Three, the examination belongs to the state secrets, can be technically processed, after technical processing can meet the needs of foreign economic cooperation projects, should be technically processed (including words, charts, data, etc.). ); Fourth, the provision of state secret information must be approved by organs and units with the power of examination and approval; Fifth, when providing state secret information upon approval, the other party is required to undertake confidentiality obligations (contracts, agreements, memorandums, etc.). ) in some form.
Matters that need to be submitted for examination and approval, approval, approval or coordination in the work of providing information to the outside world shall be handled in time by the project organizer, relevant business departments and confidential departments. It is strictly forbidden for individuals or individuals to provide state secret information to the outside world.
What if the unit leaks water?
(1) When a state organ or unit discovers a leak, it shall report it to the superior competent department or the local secrecy bureau within 24 hours after it becomes aware of the leak.
(2) divulging top-secret state secrets; Illegally providing state secrets to overseas organizations, institutions and personnel; If the leaker is a cadre at or above the bureau level, he may report directly to the State Secrecy Bureau.
(3) Criminal units should take remedial measures in time according to the situation and actively cooperate with relevant departments to investigate and deal with it.