Current location - Quotes Website - Personality signature - Is there any reference for confidential and non-confidential computer confidentiality management systems?
Is there any reference for confidential and non-confidential computer confidentiality management systems?

The secret room is responsible for destroying confidential documents and information (including internal ones);

Confidential documents and information distributed by the municipal party committee and municipal government to various units shall be returned by the confidential rooms of each unit The municipal party committee and municipal government confidentiality rooms shall handle the matter. Confidential documents issued by higher-level authorities to various units shall be reviewed at the end of the year and the opinions of the issuing department shall be sought. If they agree to destroy them themselves, a list shall be made. It must be approved by the unit leader and signed by the person supervising the sale and the person destroying it.

2. The destruction method generally uses a paper shredder. For large quantities, a special car can be sent

to the papermaking factory

. However, contact must be made in advance and confidential documents must be broken in time before the person can leave.

Typing room confidentiality management system

1. This system is applicable to the management of internal typing rooms of party, government agencies, enterprises and institutions.

2. Typists must be familiar with the "Confidentiality Law" and strictly abide by the confidentiality code.

Work seriously and responsibly.

3. Printing of state secret carriers generated by the unit (including state secret documents, materials, charts, speeches, etc., the same below) must be approved by the leader in charge and registered.

4. National secret carriers are not allowed to be reprinted on behalf of the handling unit, except under special circumstances.

If reprinting is required, it must be approved by the leader in charge (must be agreed by the document-producing unit). When reprinting, please register it clearly and manage it according to the original confidential document.

5. The typing room must have three iron (iron doors, iron windows, iron cabinets) and other confidentiality prevention facilities

Computers used to process state secret carriers must be equipped with anti-electromagnetic radiation jammers.

6. Irrelevant personnel are not allowed to enter the typing room, deliver materials or proofreaders.

Personnel are not allowed to read materials unrelated to them at will, and they are not allowed to come into contact with confidential media.

Copy machine confidentiality management system

According to the "Secrecy Law" and the "Secrecy Law" and the "Reproduction of State Secret Carriers in Printing, Copying and Other Industries" by six units including the State Secrets Bureau Interim Management Measures" to formulate this system.

1. This system applies to the management of non-

commercial copy machines within party and government agencies, enterprises and institutions.

2. The copy machine must be specially managed and operated by designated responsible personnel who are thoughtful, loyal and honest, and work conscientiously.

3. Internal copy machines are not allowed to be used to make unauthorized copies of state secret carriers

(including state secret documents, information, charts, etc.). Copying can only be done after approval from the authorized unit.

4. When the representative unit copies the carrier of state secrets, it should first verify the "Certificate of Approval of the Carrier of State Secrets" and verify the name, approver and handler of the entrusting unit. , copy carrier name, confidentiality level, confidentiality period, copy date, number of copies and other items should be registered in detail for future investigation. Anyone who does not hold the "State Secret Carrier Approval Certificate" should be refused to copy.

5. Copying of currency, various securities and reactionary obscene works is not allowed

6. Attention should be paid to confidentiality management of copiers and regular confidentiality inspections

If it is found that the use of copiers in violation of confidentiality regulations has caused leaks, in addition to holding the parties responsible, the relevant parties must also be held accountable Leadership Responsibilities.

Fax Machine Confidentiality Management System

This system is formulated in accordance with the spirit of the "Confidentiality Law" and relevant confidentiality regulations:

1. Fax machines must be designated with good thinking, People with a strong sense of confidentiality and serious and responsible work are dedicated to management and operation.

2. When using fax machines to transmit state secret carriers (referring to confidential documents, secret reports,

information, charts, etc.), encryption devices must be used, and the approval and registration system must be followed.

3. The management and use of fax machines should be included in the confidentiality inspection.

Inspections should be carried out regularly and problems should be solved in a timely manner.

4. Adding other parts to the fax machine or transmitting information overseas must be approved by the leader in charge.

Computer confidentiality management system

1. In accordance with the spirit of the "Secrecy Law" and (Guobaofa [1998] No. 1) document

and other relevant confidentiality laws and regulations, These regulations are formulated to protect the security of computers processing state secrets.

2. Confidential computer operators must master basic knowledge of confidentiality and be familiar with confidentiality regulations.

3. Confidential information and carriers processed by computers (disks, tapes, printed documents, etc.) should be regarded as "three secrets" and should be managed by dedicated personnel.

4. Family confidential information may not be stored, processed, or transmitted in computers that are connected to the Internet

.

5. Computers handling confidential matters must be equipped with video radiation jammers

.

6. When using imported computers to process state secret information,

security technical safety inspections for confidentiality should be carried out.

Communication confidentiality management system

1. In order to safeguard the security of state secrets, these regulations are formulated in accordance with the "Secrecy Law" and relevant confidentiality regulations.

2. State secret documents, materials and emails involving secret information shall be delivered through the confidential communications department and shall not be mailed by ordinary or registered mail.

3. State secret documents and information must not be sent to private individuals (including leaders), but should be sent to the confidentiality room, which will handle the registration procedures.

4. Without taking confidentiality measures, the use of telephones, walkie-talkies, fax machines, mobile phones, etc. shall not involve state secret information.

5. In party and government agencies and important meeting places, communication and office automation equipment (such as mobile phones, computers) and other items purchased from abroad or received as gifts must undergo safety and confidentiality technical inspections before they can be used.

6. It is strictly prohibited to transmit state secret documents and information on fax machines without encryption devices. Faxes sent abroad must be approved by relevant leaders and go through registration procedures.

7. Computers used to process state secrets must be equipped with anti-radiation jammers.