Traditional Culture Encyclopedia - Photography major - You should know the common sense of secrecy. Article 120.
You should know the common sense of secrecy. Article 120.
You should know the common sense of secrecy. It should be 1. How much confidential common sense should I know?
What are the provisions of the state on the confidentiality of citizens? 1. Article 53 of China's current Constitution clearly stipulates that citizens must abide by the confidentiality provisions in the Constitution and laws; 2. Article 3 of the Secrecy Law stipulates that all state organs, armed forces, political parties, social organizations, enterprises and institutions and citizens have the obligation to keep state secrets; 3. Article 24 of the Secrecy Law stipulates that it is forbidden to disclose state secrets in private contacts and correspondence.
Carrying documents, materials and other articles belonging to state secrets out shall not violate the confidentiality provisions. Don't talk about state secrets in public; Article 25 of the Secrecy Law stipulates that security measures must be taken to transmit state secrets in wired and wireless communication.
State secrets shall not be transmitted in plain codes or passwords that have not been examined and approved by the relevant central departments. Documents, materials and other articles belonging to state secrets are not allowed to be transmitted by ordinary mail.
What are the serious violations of 12 stipulated in the secrecy law? The Secrecy Law lists 12 kinds of the most common and typical serious illegal acts, which lead to the invalidation of secrecy measures, the loss of control of state secrets, the destruction of the technical protection system of secrecy and the serious threat to the security of state secrets. These behaviors are: 1. Connecting classified computers and classified storage devices to the Internet and other public information networks; 2. Failing to take protective measures to exchange information between the classified information system and the Internet and other public information networks; 3. Using unclassified computers or unclassified storage devices to store and process state secret information; 4. illegally copying, recording or storing state secrets; 5. Transmitting state secrets on public information networks such as the Internet or in wired or wireless communication without security measures; 6. Involving state secrets in private contacts and correspondence; 7. Uninstalling or modifying the safety technical regulations and management regulations of classified information systems without authorization; 8. Giving away, selling, discarding or using classified computers and classified storage devices that have not been processed by security technology for other purposes; 9 illegal acquisition and possession of state secret carriers; 10. transmitting the carrier of state secrets through ordinary postal service, express delivery and other channels without confidentiality measures; 1 1. buying, selling, transferring or destroying state secret carriers without permission; 12. Sending a state secret carrier out of the country or carrying or transmitting a state secret carrier out of the country without the approval of the relevant competent department.
The secrecy law stipulates that anyone who commits one of the above acts shall be punished according to law; If the case constitutes a crime, criminal responsibility shall be investigated according to law; If the above acts do not constitute a crime, this punishment is not applicable, and the secrecy administrative department shall urge its organs and units to deal with them. How to distinguish state secrets from work secrets? 1. Different stakeholders.
Working secrets are directly related to the interests of the relevant state organs, and once leaked, it will only harm the local interests of the relevant state organs in fulfilling their functions and responsibilities entrusted by the state; State secrets are directly related to national interests, and once leaked, they will cause damage to the overall interests of the country; 2. The determination method is different. The determination of work secrets is mainly determined by state organs at all levels, and only a few central state organs have unified regulations or explicit authorization, and they will be followed; The determination of state secrets must be carried out in accordance with the law, and it must be operated within the scope of the Provisions on the Specific Scope of State Secrets and Their Classification formulated and issued by the state secrecy department in conjunction with relevant central state organs, and it is not allowed to be determined at will; 3. The signs are different.
Documents, materials and other carriers belonging to work secrets may be marked as "internal", and shall not be marked with signs of state secrets; 4. Different management. The management of work secrets by state organs at all levels can refer to the measures for the administration of state secrets, but it does not need to be standardized according to legal procedures.
For example, the delivery of state secret documents, materials or other items must be delivered by confidential mail, not by ordinary mail; There is no uniform requirement for documents, materials or other articles that convey work secrets, which can be selected by the organs themselves; 5. The applicable laws are different. The applicable legal norm for protecting work secrets is the national civil servant law, which mainly protects work secrets through administrative means. For the protection of state secrets, the secrecy law can be applied not only by administrative means, but also by legal means. 6. Different responsibilities.
After the work secret is leaked, the responsible person will only bear administrative responsibility and will only be subject to corresponding administrative sanctions; Whoever divulges state secrets shall determine the legal responsibility of the responsible person according to the possible harmful consequences. If the circumstances are minor and the consequences are not serious, they can bear administrative responsibility, and if the circumstances are serious and the consequences are serious, they can bear criminal responsibility; In short, due to the different stakeholders involved in work secrets and state secrets, the harmful consequences caused by leaks are quite different in scope and degree.
Therefore, the protection of work secrets is obviously not as good as the protection of state secrets. Other differences come from this.
What are the confidentiality requirements for using mobile phones? 1. Do not involve state secret information in mobile phone calls, send state secret information with mobile phones, or store state secret information in mobile phones; 2. Do not bring mobile terminals such as mobile phones to attend confidential meetings or enter confidential activities or key departments; 3. Do not use mobile terminals such as mobile phones to record, take photos, take videos, make video calls and surf the Internet in confidential places; 4. Mobile terminals such as mobile phones shall not be used as classified information equipment, and shall not be connected with classified information equipment and carriers; 5. When applying for a mobile phone number, registering a mobile phone mailbox or opening other functions, it is strictly forbidden to fill in the information such as the name and address of the institution, or store sensitive information such as the work unit and position of the core secret-related personnel in the mobile phone, or enable the remote data synchronization function of the mobile phone; 6. Conduct necessary security checks on the mobile phones used by core and important secret-related personnel, and try to equip and use special mobile phones. Do not use mobile phones without network access permission and mobile phones with location service, Internet connection and other functions; 7. When the mobile phones of core secret-related personnel and important secret-related personnel fail or find abnormal conditions, they should immediately report and go to the designated place for maintenance. Mobile phones that cannot be restored to use should be destroyed according to the sorting equipment.
What are the common sense of security technology prevention? 1. Do not connect confidential computers and networks to the Internet and other public information networks; 2. It is not the difference between a confidential computer and a non-confidential computer.
2. How much do you know about confidential knowledge?
What are the provisions of the state on the confidentiality of citizens? 1. Article 53 of China's current Constitution clearly stipulates that citizens must abide by the confidentiality provisions in the Constitution and laws; 2. Article 3 of the Secrecy Law stipulates that all state organs, armed forces, political parties, social organizations, enterprises and institutions and citizens have the obligation to keep state secrets; 3. Article 24 of the Secrecy Law stipulates that it is forbidden to disclose state secrets in private contacts and correspondence.
Carrying documents, materials and other articles belonging to state secrets out shall not violate the confidentiality provisions. Don't talk about state secrets in public; Article 25 of the Secrecy Law stipulates that security measures must be taken to transmit state secrets in wired and wireless communication.
State secrets shall not be transmitted in plain codes or passwords that have not been examined and approved by the relevant central departments. Documents, materials and other articles belonging to state secrets are not allowed to be transmitted by ordinary mail.
What are the serious violations of 12 stipulated in the secrecy law? The Secrecy Law lists 12 kinds of the most common and typical serious illegal acts, which lead to the invalidation of secrecy measures, the loss of control of state secrets, the destruction of the technical protection system of secrecy and the serious threat to the security of state secrets. These behaviors are: 1. Connecting classified computers and classified storage devices to the Internet and other public information networks; 2. Failing to take protective measures to exchange information between the classified information system and the Internet and other public information networks; 3. Using unclassified computers or unclassified storage devices to store and process state secret information; 4. illegally copying, recording or storing state secrets; 5. Transmitting state secrets on public information networks such as the Internet or in wired or wireless communication without security measures; 6. Involving state secrets in private contacts and correspondence; 7. Uninstalling or modifying the safety technical regulations and management regulations of classified information systems without authorization; 8. Giving away, selling, discarding or using classified computers and classified storage devices that have not been processed by security technology for other purposes; 9 illegal acquisition and possession of state secret carriers; 10. transmitting the carrier of state secrets through ordinary postal service, express delivery and other channels without confidentiality measures; 1 1. buying, selling, transferring or destroying state secret carriers without permission; 12. Sending a state secret carrier out of the country or carrying or transmitting a state secret carrier out of the country without the approval of the relevant competent department.
The secrecy law stipulates that anyone who commits one of the above acts shall be punished according to law; If the case constitutes a crime, criminal responsibility shall be investigated according to law; If the above acts do not constitute a crime, this punishment is not applicable, and the secrecy administrative department shall urge its organs and units to deal with them. How to distinguish state secrets from work secrets? 1. Different stakeholders.
Working secrets are directly related to the interests of the relevant state organs, and once leaked, it will only harm the local interests of the relevant state organs in fulfilling their functions and responsibilities entrusted by the state; State secrets are directly related to national interests, and once leaked, they will cause damage to the overall interests of the country; 2. The determination method is different. The determination of work secrets is mainly determined by state organs at all levels, and only a few central state organs have unified regulations or explicit authorization, and they will be followed; The determination of state secrets must be carried out in accordance with the law, and it must be operated within the scope of the Provisions on the Specific Scope of State Secrets and Their Classification formulated and issued by the state secrecy department in conjunction with relevant central state organs, and it is not allowed to be determined at will; 3. The signs are different.
Documents, materials and other carriers belonging to work secrets may be marked as "internal", and shall not be marked with signs of state secrets; 4. Different management. The management of work secrets by state organs at all levels can refer to the measures for the administration of state secrets, but it does not need to be standardized according to legal procedures.
For example, the delivery of state secret documents, materials or other items must be delivered by confidential mail, not by ordinary mail; There is no uniform requirement for documents, materials or other articles that convey work secrets, which can be selected by the organs themselves; 5. The applicable laws are different. The applicable legal norm for protecting work secrets is the national civil servant law, which mainly protects work secrets through administrative means. For the protection of state secrets, the secrecy law can be applied not only by administrative means, but also by legal means. 6. Different responsibilities.
After the work secret is leaked, the responsible person will only bear administrative responsibility and will only be subject to corresponding administrative sanctions; Whoever divulges state secrets shall determine the legal responsibility of the responsible person according to the possible harmful consequences. If the circumstances are minor and the consequences are not serious, they can bear administrative responsibility, and if the circumstances are serious and the consequences are serious, they can bear criminal responsibility; In short, due to the different stakeholders involved in work secrets and state secrets, the harmful consequences caused by leaks are quite different in scope and degree.
Therefore, the protection of work secrets is obviously not as good as the protection of state secrets. Other differences come from this.
What are the confidentiality requirements for using mobile phones? 1. Do not involve state secret information in mobile phone calls, send state secret information with mobile phones, or store state secret information in mobile phones; 2. Do not bring mobile terminals such as mobile phones to attend confidential meetings or enter confidential activities or key departments; 3. Do not use mobile terminals such as mobile phones to record, take photos, take videos, make video calls and surf the Internet in confidential places; 4. Mobile terminals such as mobile phones shall not be used as classified information equipment, and shall not be connected with classified information equipment and carriers; 5. When applying for a mobile phone number, registering a mobile phone mailbox or opening other functions, it is strictly forbidden to fill in the information such as the name and address of the institution, or store sensitive information such as the work unit and position of the core secret-related personnel in the mobile phone, or enable the remote data synchronization function of the mobile phone; 6. Conduct necessary security checks on the mobile phones used by core and important secret-related personnel, and try to equip and use special mobile phones. Do not use mobile phones without network access permission and mobile phones with location service, Internet connection and other functions; 7. When the mobile phones of core secret-related personnel and important secret-related personnel fail or find abnormal conditions, they should immediately report and go to the designated place for maintenance. Mobile phones that cannot be restored to use should be destroyed according to the sorting equipment.
What are the common sense of security technology prevention? 1. Do not connect confidential computers and networks to the Internet and other public information networks; 2. It is not the difference between a confidential computer and a non-confidential computer.
3. Basic knowledge of confidential work
1) What is a state secret?
State secrets are matters related to national security and interests, which are determined in accordance with legal procedures and are only known to a certain range of people in a certain period of time.
(2) What is a work secret?
Working secrets are generated in the official activities of the state, which are not state secrets and should not be disclosed publicly.
(3) What is a trade secret?
Refers to the technical information and business information that is not known to the public, can bring economic benefits to the obligee, is practical, and is kept confidential by the obligee.
(4) What is the carrier of state secrets?
Refers to paper media, magnetic media, optical disks and other items. Recording state secret information by means of words, data, symbols, graphics, images, sounds, etc. There are mainly the following four categories: 1. A paper medium carrier that records state secret information with words, figures and symbols. 2. Carriers that use magnetic substances to record state secret information, such as computer disks (including floppy disks and hard disks), magnetic tapes, audio tapes and video tapes. 3. Recording carriers that transmit state secret information by electric signals and optical signals, such as radio waves and optical fibers. 4. Equipment, instruments, products and other carriers containing state secret information.
(5) What is the basic policy of confidentiality?
The policy of keeping state secrets is to actively prevent, highlight key points, ensure state secrets and facilitate all work.
(6) Who is responsible for the confidentiality work?
The leading cadres shall be responsible for the confidentiality work. Organs and units involving state secrets shall establish security organizations, determine full-time or * * * security staff, and manage the security work of their own units.
(7) What are the main contents of the responsibility system for party and government leading cadres?
1. The main leaders of the party and government should take overall leadership responsibility for the confidentiality work of their own units (systems); 2. Party and government leaders in charge of confidentiality work bear specific organizational leadership responsibilities; 3 leaders in charge of other work, where the business work is managed, the confidentiality work will be managed, research and deployment, inspection and assessment of business, and at the same time make arrangements and inspection and assessment of confidentiality issues.
(8) What are the main contents of confidential publicity and education?
1. confidentiality policies of the party and the state; Research on the Confidentiality Law and its supporting laws and regulations, as well as other relevant laws and regulations; 2. Basic knowledge of confidentiality; 3. Safety technology and skills training; 4. Leak case education; 5. Introduction of confidential work experience; 6. Discussion on confidentiality in practical work: 7. Keep the exchange of new technologies and new products confidential.
(9) What are the contents of safety inspection?
1. Organization and leadership of safety work; 2. The implementation of the responsibility system for leading cadres' confidential work; 3. Construction of confidentiality rules and regulations; 4. Confidential publicity and education; 5. Management of confidential key departments (parts); 6. Manage state secret documents, materials and other articles; 7. Confidentiality of major events and projects; 8. Preventive measures for confidential technology; 9. Leak investigation.
4. What do you know about secrecy?
Secrecy is to ensure safety and development.
Anti-eavesdropping, anti-* *, anti-recording, anti-disclosure.
Call, don't talk about secrets, internal affairs, and don't brag.
Computer, internet, careless, revealing secrets.
Send an email, chat on WeChat, don't pass it on, remember.
Press releases shall be strictly controlled, kept confidential and properly kept.
Sea books are also secrets, so be careful not to misplace them.
New technology, the treasure of the enterprise, should be conservative and not leaked.
Trade secrets and new technologies will suffer losses once they are leaked.
When dealing with foreign affairs, abide by the rules, distinguish between inside and outside, and treat them differently.
Pay attention to information, keep it confidential, and politely refuse it.
During the negotiation, do not keep secrets, and it is forbidden to visit places with secrets.
Pay attention to words and deeds, keep secret, sound the alarm, and not be careless.
- Previous article:How to cancel the camera delay of Nikon SLR camera D90?
- Next article:What is photographic perspective and how to adjust it on the camera?
- Related articles
- What are the old brands in Shanghai?
- Who can tell me in detail how many generations of Super Mary are there?
- He Hua photography
- Diy photography slide rail
- Three-day Tour of Wutai Mountain: Random Thoughts on Wutai Mountain
- Chengdu Taobao photography company
- How are the two girls who were printed on the fourth set of twenty-cent yuan in 1980 doing now?
- How to match the words in the sky
- Ranking of Diving Resorts in Southeast Asia Where is the best place for diving in Southeast Asia?
- Excellent composition of college entrance examination 1000 words: taking culture as the topic