Article 1 Self-inspection report on rectification of problems existing in confidentiality work
Guided by Theory of Three Represents Theory and Scientific Outlook on Development, the Company thoroughly implemented the requirements of superiors for confidentiality, conscientiously implemented the relevant provisions of the Secrecy Law and its detailed rules, strengthened leadership over confidentiality, paid close attention to the construction and implementation of various systems, and carried out various forms of confidentiality publicity and education. As a result, the political quality and professional quality of our company's security team have been significantly improved, and no state secrets have been lost or leaked throughout the company, ensuring the safety of state secrets in our company. The self-inspection is now reported as follows: 1. Strengthen the study of policy theory and improve the understanding of confidentiality.
The leadership team attaches great importance to the self-construction of the leadership team, earnestly adheres to the learning system of the central group, and timely formulates the implementation measures of the policies and regulations on confidentiality, so that the company's confidentiality work is always consistent with the requirements of its superiors and ensures that the company's confidentiality work is under control. At the beginning of the year, the company put the secrecy work as an important part of the annual work on the agenda of the whole company, and made specific arrangements for the secrecy work in the past year.
Two, optimize and improve the organization, strengthen the leadership of safety work.
In order to strengthen the leadership of secrecy work, the company adjusted the leading group of secrecy work in time according to the change of the leading group and the adjustment of departments, further improved the secrecy organizations at all levels, defined the members of secrecy organizations at all levels, and further strengthened organizational leadership. The leading group of the company insists on bringing the confidentiality work into the annual work plan, and puts it on the important agenda in time according to the changes of the situation and the requirements of superiors. The secrecy leading group organized meetings for many times to study and implement the spirit of superiors, listened to the reports of relevant personnel on secrecy work, carefully analyzed the current secrecy work of the company, determined the key parts of secrecy, and guided the secrecy work of the whole company. In order to strengthen the leadership of the company's confidential work, we have set up confidential staff in all departments that may come into contact with and produce state secrets, so as to ensure that the confidential work will be extended wherever the business work is expanded, so that the confidential work and the company's business work will be deployed and assessed together to ensure that the state secrets and enterprise secrets are in a safe and controllable state.
Three, improve the confidentiality system and facilities, and effectively ensure the safety of confidential documents and materials.
In order to ensure the security of confidential documents, the company specially provides vehicles for full-time personnel to pick up and drop off documents at any time, which eliminates the possibility of documents being leaked during the pick-up and drop-off. Security personnel are equipped with safes or password safe iron cabinets, and departments such as archives, copy rooms, security offices, biotechnology offices and information centers are specially equipped with anti-theft facilities such as security doors and alarms. The company's secrecy system clearly stipulates that computers containing secret information are not allowed to surf the Internet, and issues involving state and enterprise secrets are not allowed to be discussed in mobile communication. At the same time, it also regularly inspects the classified parts of the classified department, conducts a general survey of the computers of the whole company, and formulates the corresponding computer management system. It is strictly forbidden to connect matters involving state secrets to the Internet, and the content that needs to be published online must be strictly examined by the department or organized for identification, and can only be published online after it is confirmed that it does not involve state secrets. In the process of document processing, confidential personnel of the company carefully handle documents involving state secrets to ensure the security of confidential documents in all aspects of document circulation.
Four, strengthen the education of confidential personnel, and effectively improve the ability to use and handle confidential matters under the new situation.
In order to strengthen confidentiality, the company focuses on strengthening the management of confidential documents and educating confidential personnel every year. According to the working characteristics of various departments, combined with the situation, the company pays attention to key departments and personnel, combined with major holiday activities, combined with the enterprise management responsibility system, combined with the recognition of advanced, combined with the investigation and punishment of leaks, earnestly implements the instructions of superiors on confidentiality work and actively does a good job in confidentiality education.
The company actively organizes the members of the secrecy organization to study, holds laws and regulations classes in March every year, focuses on organizing the members of the secrecy organization to study the secrecy law, carefully studies the Confidential Knowledge Reader, and educates the secrecy-related staff in the new period by using typical deeds and cases in secrecy work, so that the members of the secrecy organization have received a comprehensive and systematic education on secrecy knowledge.
In short, under the correct leadership of the superior unit and the care and guidance of the party and government leading group of the company, the company's secrecy work has been carried out smoothly, and various secrecy tasks have been successfully completed, ensuring the safety of state secrets and enterprise secrets, and promoting the enterprise's. Contributed to the healthy development.
Chapter II Self-inspection Report on Rectification of Problems Existing in Confidentiality Work
In order to do a good job in the confidentiality management of confidential documents and materials, our bureau conducted self-inspection one by one in combination with the actual work and compared with the inspection catalogue. Now the self-inspection situation is reported as follows: 1. Implementation of confidentiality work.
The documents received by our bureau are properly handled by designated personnel, ensuring the safety of confidential documents, records and information in the process of transmission and use, without negligence and leakage.
Our bureau has an information room, which adopts the method of separating internal and external networks. At the same time, all computers have installed anti-virus software, regularly upgraded anti-virus, and designated personnel to engage in computer security management. Through self-examination, the computer security work of our bureau has basically achieved the system, management and inspection in place.
Second, the main practices
(1) Attach great importance to and strengthen organizational leadership. The leaders of our bureau attached great importance to it and set up a leading group for confidentiality to strictly implement the confidentiality work. Members of the leading group set an example, consciously learn and master the secrecy system, so as to know the law, understand the law and enforce the law, and truly establish a style of abiding by the law, abiding by the law, prosecuting those who violate the law and prohibiting them among cadres and workers.
(2) Highlight key points and pay close attention to the implementation of the work. Our bureau regularly focuses on major departments and leaders, focusing on illegal outreach of computers and mobile storage media and special trojans, taking preventive measures in time to resolutely cut off all channels through which classified information flows to the Internet.
(three) publicity and education, enhance the sense of confidentiality. In order to strengthen the safety awareness of the secret-related personnel in our bureau, our bureau has adopted various ways and channels to publicize and educate the relevant personnel, forwarded all kinds of secret-related learning documents to the computer rooms of various units, and requested to organize and implement the learning seriously in combination with the actual situation to ensure the safety of computers and their networks.
(4) Improve measures and strictly standardize the system. Strengthening system construction is the guarantee of computer security management. In order to build a scientific and strict prevention system, our bureau has continuously improved various rules and regulations and standardized the security management of computers and their networks. Our bureau has mainly taken the following measures: First, the computer implements the relevant provisions and requirements of the documents of the higher-level secrecy department, and constantly enhances its ability to do a good job in computer security management according to law; The second is to formulate various confidential and non-confidential computer and network management systems in this bureau; The third is to strictly regulate the flow of classified information, and strictly implement the principle that classified information does not go online and online information is not classified.
(five) supervision and inspection, plugging management loopholes. In order to ensure the implementation of various rules and regulations on computer and its network security management, find hidden dangers in computer security work in time and plug management loopholes, our bureau attaches great importance to the supervision and inspection of computer and its network security work, and checks the implementation of computer preventive measures by combining self-examination with spot check, daily inspection with key inspection, and regular inspection with surprise inspection.
Chapter III Self-inspection Report on Rectification of Problems Existing in Confidentiality Work
According to the spirit of the working conference on information system security management in the district, the district court attached great importance to it, and made a careful check in combination with the actual work. The relevant situation is now reported as follows: 1. Strengthen study and raise awareness of safety work.
Quickly implement the spirit of the work conference on information system security management in the whole region, organize the police officers in the whole hospital to seriously study the "People's Republic of China (PRC) Secrecy Law" and the "National Staff Secrecy Code", emphasize the extreme importance of confidentiality work, improve the police officers' understanding of state secrets and trial secrets, and firmly establish the confidentiality consciousness of "no small matter involving secrets, but losing secrets is a major matter". Strengthen the confidentiality education for the personnel who send and receive official documents, archivists and clerks. , strengthen the inspection and supervision of security work, promote all police officers to improve their ideological understanding and enhance their sense of responsibility for security work. At the same time, further clarify the functions of secret-related personnel in receiving and dispatching documents, registering, transmitting, filing and destroying documents, so as to make the secrecy work truly rule-based, well-documented, institutionalized, standardized and scientific.
Two, self-examination and self-correction, eliminate the hidden dangers of leaks.
In accordance with the Measures for the Administration of Confidentiality Work formulated by our hospital, the contents and standards of self-inspection were clarified, and the self-inspection work was uniformly deployed and arranged. According to their respective confidentiality responsibilities, each department conducted a comprehensive and serious self-examination on the confidentiality management of information systems, focused on the possible hidden dangers of leaks, and made serious rectification.
First, strict management and protection of key departments. Archives, offices and other departments are key departments of confidentiality, and the sending and receiving of confidential documents, filing and consulting of archives should be protected. Through self-examination, these departments have sound rules and regulations, can start from every link, have a strong sense of confidentiality, take effective measures and implement them in place. They can strictly control the reading range of confidential documents, encrypted faxes and archived documents, strictly observe the reading discipline, strictly guard against the storage point and confidentiality of confidential documents, and resolutely read the fax documents clearly.
The second is to strengthen the management of classified computers. Confidential computers are mainly used to handle e-government, the sending and receiving of confidential documents and official documents. After regular inspection, it is not infected with harmful viruses such as Trojan horse, so it is dedicated to special planes and does not interact with unclassified media. Strictly implement the confidentiality provisions related to official document processing, and found no violations.
The third is to strictly manage the use of storage media. There are 1 secret USB flash drives, and the secret files are processed directly on the special computer. After inspection, the storage media were not used to move back and forth and confidential information was stored on the media, and the problem of cross-use of mobile storage media was corrected and rectified in time.
The fourth is to strengthen the management of office network use. According to the needs of the work, the network connected by the district court computer is divided into the court system intranet and the Internet, so that the private network is dedicated and accurate, and the Internet connected by non-classified computing does not store or process classified information.
Fifth, pay close attention to cleaning up secret vectors. Secret carriers have been carefully kept and cleaned up in time, and existing problems have been corrected in time.
Third, strengthen supervision and implement the responsibility of confidentiality.
First, a long-term system of confidentiality supervision and inspection, which regularly supervises the confidentiality work of each court room, and promptly urges rectification if the confidentiality work is not in place. Each courtroom should designate a staff member to be responsible for receiving, sending and keeping documents, plugging loopholes and ensuring secret safety.
The second is to adhere to the combination of daily norms and key inspectors. Where the work of the court is done, the confidentiality work will follow up. In the process of implementing confidentiality work, we will assign special personnel to conduct regular inspections on confidentiality work, especially for key departments and key departments involved in confidentiality. Once it is found that the confidentiality provisions are not strictly enforced, it will be ordered to rectify.
The third is to adhere to the combination of accepting supervision and accountability. While strictly managing internal confidentiality, we actively accept the supervision, inspection and guidance of the superior court and the administrative committee of the district working committee. It is stipulated that people and things that have been compromised due to the lack of confidentiality concept and consciousness, serious paralysis of thinking, failure to implement confidentiality management responsibilities, and dereliction of duty of security personnel should be investigated and dealt with together, and the level of confidentiality management has been significantly improved. Since the establishment of the hospital, there has been no loss or leakage.
Fourth, material support, expanding the material basis of confidentiality work.
In addition to personnel in place, confidentiality work should also be in place, and funds should also be in place, so as to better prevent leaks. After increasing the material guarantee of secrecy, the district court actually increased the capital investment in secrecy, equipped with secrecy cabinets, document shredders, installed firewalls, isolation cards, and used private network flash drives, which provided material guarantee for secrecy.