Current location - Education and Training Encyclopedia - Education and training - According to the principle of three synchronizations, what kind of comprehensive operation mechanism should be established and improved?
According to the principle of three synchronizations, what kind of comprehensive operation mechanism should be established and improved?
It is necessary to establish and improve a rapid response mechanism, an efficient unified command mechanism and a public opinion guidance mechanism in accordance with the principles of three synchronizations.

To put it simply, the three synchronizations should be synchronized in three aspects: legal disposal, public opinion guidance and social control, that is, when we deal with crisis events, we should not only solve the events themselves, but also let the people know why this event happened.

Who made it happen? The society is increasingly aware that it is necessary not only to find out the truth, but also to do a good job of dispelling rumors for the public in time. This principle makes us no longer a person immersed in work, but a person who carefully understands events from beginning to end.

We all realize that the network speed is getting faster and faster, the website is getting bigger and bigger, and there are more and more netizens. Therefore, the detection of online public opinion also needs to keep pace with the times and develop continuously, and the "three synchronization principles" came into being.

Only by grasping this point, can we purposefully do a good job in online public opinion monitoring, control the dominance and interpretation of online discourse, and make the best positive guidance for public opinion events.

Operators of key information infrastructure shall perform the following security protection obligations

1. Set up special safety management organization and safety management person in charge, and conduct safety background review for the person in charge and key positions.

2. Conduct network security education, technical training and skill assessment for employees on a regular basis.

3. Disaster recovery backup of important systems and databases.

4, formulate emergency plans for network security incidents, and conduct regular drills.

5. Evaluate the security and risk of the network by yourself.