Traditional Culture Encyclopedia - Photography and portraiture - What common sense of confidentiality should employees have?

What common sense of confidentiality should employees have?

1. demonstration of confidential knowledge

2. Hold a lecture on common sense of confidentiality.

Confidential knowledge demonstration 1. Basic knowledge of secrecy work

1) What is a state secret? State secrets are matters related to national security and interests, which are determined in accordance with legal procedures and are only known to a certain range of people in a certain period of time.

(2) What is a work secret? Working secrets are generated in the official activities of the state, which are not state secrets and should not be disclosed publicly. (3) What is a trade secret? Refers to the technical information and business information that is not known to the public, can bring economic benefits to the obligee, is practical, and is kept confidential by the obligee.

(4) What is the carrier of state secrets? Refers to paper media, magnetic media, optical disks and other items. Recording state secret information by means of words, data, symbols, graphics, images, sounds, etc. There are mainly the following four categories: 1. A paper medium carrier that records state secret information with words, figures and symbols.

2. Carriers that use magnetic substances to record state secret information, such as computer disks (including floppy disks and hard disks), magnetic tapes, audio tapes and video tapes. 3. Recording carriers that transmit state secret information by electric signals and optical signals, such as radio waves and optical fibers.

4. Equipment, instruments, products and other carriers containing state secret information. (5) What is the basic policy of confidentiality? The policy of keeping state secrets is to actively prevent, highlight key points, ensure state secrets and facilitate all work.

(6) Who is responsible for the confidentiality work? The leading cadres shall be responsible for the confidentiality work. Organs and units involving state secrets shall establish security organizations, determine full-time or * * * security staff, and manage the security work of their own units.

(7) What are the main contents of the responsibility system for party and government leading cadres? 1. The main leaders of the party and government should take overall leadership responsibility for the confidentiality work of their own units (systems); 2. Party and government leaders in charge of confidentiality work bear specific organizational leadership responsibilities; 3 leaders in charge of other work, where the business work is managed, the confidentiality work will be managed, research and deployment, inspection and assessment of business, and at the same time make arrangements and inspection and assessment of confidentiality issues. (8) What are the main contents of confidential publicity and education? 1. confidentiality policies of the party and the state; Research on the Confidentiality Law and its supporting laws and regulations, as well as other relevant laws and regulations; 2. Basic knowledge of confidentiality; 3. Safety technology and skills training; 4. Leak case education; 5. Introduction of confidential work experience; 6. Discussion on confidentiality in practical work: 7. Keep the exchange of new technologies and new products confidential.

(9) What are the contents of safety inspection? 1. Organization and leadership of safety work; 2. The implementation of the responsibility system for leading cadres' confidential work; 3. Construction of confidentiality rules and regulations; 4. Confidential publicity and education; 5. Management of confidential key departments (parts); 6. Manage state secret documents, materials and other articles; 7. Confidentiality of major events and projects; 8. Preventive measures for confidential technology; 9. Leak investigation.

2. Discuss and exchange materials on how to do a good job in military safety management and common sense of confidentiality.

1. Implement safety work together.

The first mate caught it himself.

These organs work together.

4. Concrete efforts should be made at the grassroots level.

5. Everyone participates in conscious grabbing.

Details are as follows:

1. Insist on collective planning and management, and make concerted efforts to do a good job in safety. First, the Party committee should be fully responsible. All levels should always insist on putting safety work on the important agenda.

The first mate should catch it by himself. Military and political officials at all levels should earnestly shoulder the work of safety and accident prevention.

These organs work together. It is necessary to further establish and improve the information notification system, timely implement the centralized supervision mechanism of departments, and timely report the safety work.

4. Concrete efforts should be made at the grassroots level. All grass-roots units should persist in safety education and always tighten the string of safety; In management, it is necessary to clarify the key objectives, key parts and important links related to safety work.

5. Everyone participates in conscious grabbing. It is necessary to strengthen the regular education of common sense of safety work and lay a solid foundation for officers and men's self-safety awareness.

3. Security technology to prevent common sense content

Common sense of security technology prevention: 1. Do not connect confidential computers and networks to the Internet and other public information networks. 2. Don't cross use mobile storage media such as USB flash drives between confidential computers and non-confidential computers. 3. Don't copy the data on the Internet and other public information networks to unprotected confidential computers and networks. 4. Don't set passwords for confidential computers in violation of regulations. Without authorization, you may not install software or copy other people's files on confidential computers. 6. Don't use wireless peripherals for confidential computers. 7. Do not send classified computers and mobile storage media through ordinary mail channels or illegally hand them over to others for use and storage. 8. Do not take confidential laptops and removable storage media out without authorization. 9. Do not send computers and mobile storage media. Office automation equipment such as fax machines and photocopiers should be maintained by external personnel 10. Office automation equipment such as classified computers that have not been professionally sold shall not be sold, given away or scrapped 1 12. All-in-one machine handling confidential information shall not be connected to the ordinary telephone line of 12. Video and audio input devices shall not be equipped and installed on computers connected to the network in classified places. It is forbidden to bring mobile phones into important confidential places 14, to store and process confidential information on computers connected to public information networks such as the Internet 15, to store and process confidential information on non-confidential office networks 16, to publish confidential information on * * portal websites 17, and to use computers with wireless interconnection function for processing. Personal computers and mobile storage media are not allowed to store and process classified information 19, office automation equipment that has not been tested by security technology is not allowed to be used in classified key departments and parts, and ordinary fax machines, telephones and mobile phones are not allowed to transmit or talk about classified information.

4. How to do a good job of confidentiality under the new situation and strengthen the sense of confidentiality?

Relatively speaking, it is lagging behind in strengthening the confidentiality work of grassroots units.

Strengthening the secrecy work of grass-roots units is the basis for fully implementing the central government's plan to strengthen secrecy work under the new situation. Then, under the new historical conditions, how to improve the scientific security work, the legalization of security management, the modernization of security technology and the professional level of security team, and realize the comprehensive, coordinated and sustainable development of security work in grass-roots units? The author has done some preliminary research and discussion based on the reality of secret management in grass-roots units, and thinks that to strengthen the secret work in grass-roots units, we must focus on strengthening "four kinds of consciousness" and solving "four problems".

First of all, grassroots party and government leaders should have a strong sense of confidentiality, be able to set an example, set an example, strictly abide by confidentiality laws and disciplines, and take the lead in keeping themselves, their staff and their families and children confidential.

Secondly, to give full play to the role of the secrecy committee, party and government leading cadres and directors of the secrecy committee should always take pains to emphasize the secrecy work at various meetings, on different occasions and on the eve of holidays, preach secrecy laws and regulations, and preach some vivid cases of leaking secrets or positive and advanced typical people and things of their own units and other units.

5. Security technology to prevent common sense content

Common sense of security technology prevention: 1. Do not connect confidential computers and networks to the Internet and other public information networks. 2. Don't cross use mobile storage media such as USB flash drives between confidential computers and non-confidential computers. 3. Don't copy the data on the Internet and other public information networks to unprotected confidential computers and networks. 4. Don't set passwords for confidential computers in violation of regulations. Without authorization, you may not install software or copy other people's files on confidential computers. 6. Don't use wireless peripherals for confidential computers. 7. Do not send classified computers and mobile storage media through ordinary mail channels or illegally hand them over to others for use and storage. 8. Do not take confidential laptops and removable storage media out without authorization. 9. Do not send computers and mobile storage media. Office automation equipment such as fax machines and photocopiers should be maintained by external personnel 10. Office automation equipment such as classified computers that have not been professionally sold shall not be sold, given away or scrapped 1 12. All-in-one machine handling confidential information shall not be connected to the ordinary telephone line of 12. Video and audio input devices shall not be equipped and installed on computers connected to the network in classified places. It is forbidden to bring mobile phones into important confidential places 14, to store and process confidential information on computers connected to public information networks such as the Internet 15, to store and process confidential information on non-confidential office networks 16, to publish confidential information on * * portal websites 17, and to use computers with wireless interconnection function for processing. Personal computers and mobile storage media are not allowed to store and process classified information 19, office automation equipment that has not been tested by security technology is not allowed to be used in classified key departments and parts, and ordinary fax machines, telephones and mobile phones are not allowed to transmit or talk about classified information.

6. What do you know about confidentiality?

Secrecy is to ensure safety and development.

Anti-eavesdropping, anti-* *, anti-recording, anti-disclosure.

Call, don't talk about secrets, internal affairs, and don't brag.

Computer, internet, careless, revealing secrets.

Send an email, chat on WeChat, don't pass it on, remember.

Press releases shall be strictly controlled, kept confidential and properly kept.

Sea books are also secrets, so be careful not to misplace them.

New technology, the treasure of the enterprise, should be conservative and not leaked.

Trade secrets and new technologies will suffer losses once they are leaked.

When dealing with foreign affairs, abide by the rules, distinguish between inside and outside, and treat them differently.

Pay attention to information, keep it confidential, and politely refuse it.

During the negotiation, do not keep secrets, and it is forbidden to visit places with secrets.

Pay attention to words and deeds, keep secret, sound the alarm, and not be careless.

7. How to prevent the risk of disclosure, raise the awareness of confidentiality, abide by the confidentiality system and implement the confidentiality measures,

Company secrecy system 1 General Provisions 1. 1 This system is specially formulated to keep company secrets and safeguard the rights and interests of the company.

1.2 Company secrets are determined according to specific procedures, and only known to a certain range of people in a certain period of time, which involve the rights and interests of the company, including but not limited to technical secrets and other business secrets. Technical secrets refer to non-patented technologies and technical information that are not known to the public, can bring economic benefits to enterprises, are practical and are kept secret by enterprises.

Technical secrets include, but are not limited to: technical scheme, engineering design, circuit design, manufacturing method, formula, process flow, technical indicators, computer software, database, research and development records, technical reports, test reports, experimental data, test results, drawings, samples, prototypes, models, molds, operation manuals, technical documents, relevant correspondence, etc. Other business secrets, including but not limited to: customer list, marketing plan, purchasing information, pricing policy, financial information, purchase channels, etc.

1.3 all employees of the company have the obligation to keep company secrets. Managers, technicians, financial personnel, sales personnel, secretaries and other senior staff who are in contact with business secrets of enterprises have a special responsibility to keep company secrets.

1.4 The company keeps secrets and implements the policy of confidentiality and convenience. 2 Determination of confidentiality scope and classification 2. 1 Company secrets include the scope specified in Item 1.2 of this system and the following secret matters: 1) Secret matters in major decisions of the company.

2) The business strategy, business direction, business planning, business projects and business decisions that the company has not yet implemented. 3) Contracts, agreements, opinions, feasibility reports and minutes of major meetings held by the company.

4) the company's financial budget and final accounts report and various financial statements and statistical statements. 5) All kinds of information that the company has not yet entered the market or made public.

6) Personnel files, wages, labor income and data of employees of the company. 7) Other matters that the company thinks should be kept confidential.

Internal documents such as general decisions, resolutions, notices, notices and administrative materials are not confidential. 2.2 Company secrets are classified into "top secret", "secret" and "secret".

Top secret is the most important company secret, and the disclosure will cause particularly serious damage to the company's rights and interests; Confidentiality is an important company secret, and disclosure will cause serious damage to the company's rights and interests; Secrets are general company secrets, and disclosure will damage the rights and interests of the company. 2.3 Determination of the company's secret level: 1) Important decision-making documents and technical materials that directly affect the company's rights and interests during the company's business development are top secret; 2) The company's planning, financial statements, statistical data, minutes of important meetings and company operations are confidential; 3) The company's personnel files, contracts, agreements, employees' wages and incomes, and all kinds of information that have not yet entered the market or been made public are classified as secrets.

2.4 Documents and materials belonging to company secrets shall be classified according to the provisions of this system, and the confidentiality period shall be determined. The confidentiality period is limited to permanent, long-term and short-term, generally corresponding to the classification, and marked outside in special circumstances.

When the confidentiality period expires, the confidentiality will be lifted automatically. 3. Company secrecy measures 3. 1 The office or the deputy general manager in charge shall be responsible for the production, reception, sending, transmission, use, copying, extraction, preservation and destruction of documents, materials and other items belonging to company secrets; Company secrets accessed, processed and transmitted through computer technology shall be kept confidential by the computer department.

3.2 For confidential documents, materials and other items, the following security measures must be taken: 1) Without the approval of the general manager or the competent deputy general manager, it is not allowed to copy or extract; 2) Send, receive, deliver and transport by special personnel, and take necessary safety measures; 3) Keep it in a well-equipped safety device. 3.3 The development, production, transportation, use, preservation, maintenance and destruction of equipment or products that belong to the company's secrets shall be carried out by the special department designated by the company, and corresponding security measures shall be taken.

3.4 In foreign exchange and cooperation, if it is necessary to provide company secrets, it should be approved by the general manager in advance. 3.5 For meetings and other activities involving confidential contents of the company, the host department shall take the following security measures: 1) Select a meeting place with security conditions; 2) according to the needs of the work, limit the scope of participants in the meeting and designate participants involved in confidential matters; 3) Use meeting equipment and manage meeting documents in accordance with confidentiality provisions; 4) Determine whether the contents of the meeting are communicated and the scope of communication.

3.6 It is forbidden to disclose company secrets in private correspondence and letters, to talk about company secrets in public places and to spread company secrets in other ways. 3.7 When employees of the company find that the company secrets have been leaked or may be leaked, they should immediately take remedial measures and report to the General Management Department in time; After receiving the report, the General Management Department shall immediately deal with it.

3.8 The employee shall be dismissed under any of the following circumstances, and compensate for economic losses as appropriate: 1) intentionally or negligently revealing company secrets, resulting in serious consequences or major economic losses; 2) Stealing, spying, buying or illegally providing company secrets to others in violation of this confidentiality system; 3) Use authority to force others to violate confidentiality provisions. 3.9 The Company signed the Agreement on Protecting Employees' Business Secrets with all employees, which was signed in writing and attached.

3. 10 During the validity of the confidentiality contract, employees shall perform the following obligations: 1) Strictly abide by the enterprise confidentiality system to prevent the disclosure of enterprise technical secrets; 2) Do not disclose the technical secrets of the enterprise to others; 3) Without the written consent of the company, the technical secret shall not be used for production and business activities, nor for new research and development: 3. 1 1 Implement a "non-competition" system for senior staff, and restrict the following behaviors of managers, technicians, financial personnel, salesmen, secretaries and other senior staff: 1) Establish a company competing with the company by itself. 2) Working for our company's competitors; 3) * * * in a competitive enterprise; (4) Inducing other employees of the enterprise to resign; 5) luring enterprise customers to leave the enterprise; 6) Other behaviors that compete with enterprises after leaving the company. 3. 12 Cooperation, agency and transaction contracts or agreements involving the company's business secrets shall provide "confidentiality clauses" and impose confidentiality obligations on the other party to the contract.

The "confidentiality clause" shall include the following contents: 1) to express the requirements involved in the contract.

8. What do you know about confidentiality?

What are the provisions of the state on the confidentiality of citizens? 1. Article 53 of China's current Constitution clearly stipulates that citizens must abide by the confidentiality provisions in the Constitution and laws; 2. Article 3 of the Secrecy Law stipulates that all state organs, armed forces, political parties, social organizations, enterprises and institutions and citizens have the obligation to keep state secrets; 3. Article 24 of the Secrecy Law stipulates that it is forbidden to disclose state secrets in private contacts and correspondence.

Carrying documents, materials and other articles belonging to state secrets out shall not violate the confidentiality provisions. Don't talk about state secrets in public; Article 25 of the Secrecy Law stipulates that security measures must be taken to transmit state secrets in wired and wireless communication.

State secrets shall not be transmitted in plain codes or passwords that have not been examined and approved by the relevant central departments. Documents, materials and other articles belonging to state secrets are not allowed to be transmitted by ordinary mail.

What are the serious violations of 12 stipulated in the secrecy law? The Secrecy Law lists 12 kinds of the most common and typical serious illegal acts, which lead to the invalidation of secrecy measures, the loss of control of state secrets, the destruction of the technical protection system of secrecy and the serious threat to the security of state secrets. These behaviors are: 1. Connecting classified computers and classified storage devices to the Internet and other public information networks; 2. Failing to take protective measures to exchange information between the classified information system and the Internet and other public information networks; 3. Using unclassified computers or unclassified storage devices to store and process state secret information; 4. illegally copying, recording or storing state secrets; 5. Transmitting state secrets on public information networks such as the Internet or in wired or wireless communication without security measures; 6. Involving state secrets in private contacts and correspondence; 7. Uninstalling or modifying the safety technical regulations and management regulations of classified information systems without authorization; 8. Giving away, selling, discarding or using classified computers and classified storage devices that have not been processed by security technology for other purposes; 9 illegal acquisition and possession of state secret carriers; 10. transmitting the carrier of state secrets through ordinary postal service, express delivery and other channels without confidentiality measures; 1 1. buying, selling, transferring or destroying state secret carriers without permission; 12. Sending a state secret carrier out of the country or carrying or transmitting a state secret carrier out of the country without the approval of the relevant competent department.

The secrecy law stipulates that anyone who commits one of the above acts shall be punished according to law; If the case constitutes a crime, criminal responsibility shall be investigated according to law; If the above acts do not constitute a crime, this punishment is not applicable, and the secrecy administrative department shall urge its organs and units to deal with them. How to distinguish state secrets from work secrets? 1. Different stakeholders.

Working secrets are directly related to the interests of the relevant state organs, and once leaked, it will only harm the local interests of the relevant state organs in fulfilling their functions and responsibilities entrusted by the state; State secrets are directly related to national interests, and once leaked, they will cause damage to the overall interests of the country; 2. The determination method is different. The determination of work secrets is mainly determined by state organs at all levels, and only a few central state organs have unified regulations or explicit authorization, and they will be followed; The determination of state secrets must be carried out in accordance with the law, and it must be operated within the scope of the Provisions on the Specific Scope of State Secrets and Their Classification formulated and issued by the state secrecy department in conjunction with relevant central state organs, and it is not allowed to be determined at will; 3. The signs are different.

Documents, materials and other carriers belonging to work secrets may be marked as "internal", and shall not be marked with signs of state secrets; 4. Different management. The management of work secrets by state organs at all levels can refer to the measures for the administration of state secrets, but it does not need to be standardized according to legal procedures.

For example, the delivery of state secret documents, materials or other items must be delivered by confidential mail, not by ordinary mail; There is no uniform requirement for documents, materials or other articles that convey work secrets, which can be selected by the organs themselves; 5. The applicable laws are different. The applicable legal norm for protecting work secrets is the national civil servant law, which mainly protects work secrets through administrative means. For the protection of state secrets, the secrecy law can be applied not only by administrative means, but also by legal means. 6. Different responsibilities.

After the work secret is leaked, the responsible person will only bear administrative responsibility and will only be subject to corresponding administrative sanctions; Whoever divulges state secrets shall determine the legal responsibility of the responsible person according to the possible harmful consequences. If the circumstances are minor and the consequences are not serious, they can bear administrative responsibility, and if the circumstances are serious and the consequences are serious, they can bear criminal responsibility; In short, due to the different stakeholders involved in work secrets and state secrets, the harmful consequences caused by leaks are quite different in scope and degree.

Therefore, the protection of work secrets is obviously not as good as the protection of state secrets. Other differences come from this.

What are the confidentiality requirements for using mobile phones? 1. Do not involve state secret information in mobile phone calls, send state secret information with mobile phones, or store state secret information in mobile phones; 2. Do not bring mobile terminals such as mobile phones to attend confidential meetings or enter confidential activities or key departments; 3. Do not use mobile terminals such as mobile phones to record, take photos, take videos, make video calls and surf the Internet in confidential places; 4. Mobile terminals such as mobile phones shall not be used as classified information equipment, and shall not be connected with classified information equipment and carriers; 5. When applying for a mobile phone number, registering a mobile phone mailbox or opening other functions, it is strictly forbidden to fill in the information such as the name and address of the institution, or store sensitive information such as the work unit and position of the core secret-related personnel in the mobile phone, or enable the remote data synchronization function of the mobile phone; 6. Conduct necessary security checks on the mobile phones used by core and important secret-related personnel, and try to equip and use special mobile phones. Do not use mobile phones without network access permission and mobile phones with location service, Internet connection and other functions; 7. When the mobile phones of core secret-related personnel and important secret-related personnel fail or find abnormal conditions, they should immediately report and go to the designated place for maintenance. Mobile phones that cannot be restored to use should be destroyed according to the sorting equipment.

What are the common sense of security technology prevention? 1. Do not connect confidential computers and networks to the Internet and other public information networks; 2. It is not the difference between a confidential computer and a non-confidential computer.

Hold a lecture on common sense of confidentiality 1. Basic knowledge of confidential publicity and education

Open a library member at a minimum of 0.27 yuan, and view the full content > Original publisher: pbycs007 Basic knowledge of training materials confidentiality 1. Confidentiality in daily work (1) The handling of confidential documents and the confidentiality of archives The handling of confidential documents includes the drafting, printing, transmission, carrying, undertaking, use, transfer and destruction of confidential documents.

The confidentiality of archives refers to the confidential management of documents, newspapers, periodicals, teaching materials, charts, photos (including negatives), various data collections, workbooks, etc. 1. Preparation and printing of confidential documents.

The compilation of secret information shall be carried out in places that meet the confidentiality requirements. When drafting the document, the organizer shall put forward opinions on the scope, classification and duration of confidentiality, and report to the issuing leader for approval.

Draft documents should be managed according to text classification. After the contractor completes the preparation, the final version of the document shall be distributed and kept by the confidential personnel.

The copying, printing and lead printing of secret documents must be approved by the leaders who have the power of examination and approval, and the number of copies must be strictly controlled within the company or in designated places. Proofreading and waste pages in the process of document printing should be destroyed in time.

2. Transmission of confidential documents. Send documents, newspapers, publications, etc. Uniformly distributed by specialized personnel.

Secret documents and materials sent to other places shall be delivered through channels with confidentiality measures, and shall not be mailed by ordinary departments, but shall be delivered directly by special personnel. 3. Commitment and use of confidential documents.

The undertaker shall register in time when sending and receiving secret documents. Borrowing documents should be approved by leaders, and borrowing procedures should be handled according to regulations, and irrelevant personnel should not read them.

The secret documents circulated by the organization should be recovered in time and must not be out of control. 4. Transfer of confidential documents.

All secret documents and materials must be stored in the archives after use. Confidential documents and materials that the business department really needs to keep should be kept in a safe confidential cabinet.

Top secret documents should be specially preserved. When handing over confidential documents and materials, the personnel of both parties shall make a face-to-face inventory and sum up the handed-over documents.

2. Always adhere to the party's confidentiality.

There are four requirements for strengthening the party's secrecy awareness and doing a good job in secrecy: first, correctly understand the urgency and necessity of strengthening the education of secrecy awareness and common sense, carry out secrecy education in depth, firmly establish the consciousness of "secrecy is no small matter" and effectively build a defense line for secrecy.

Second, we must adhere to the system as a guarantee, further improve and perfect the security work construction system, continuously enhance the execution and seriousness of the system, and effectively build a defense line for the security system. Third, we must adhere to the bottom line thinking, strengthen regular inspection and supervision, organize supervision and inspection according to law, and effectively build a defense line for classified organizations.

"Legislation is not difficult, and law enforcement is difficult". Fourth, we should strengthen the implementation of responsibilities, keep confidential work in mind and grasp it in our hands, clarify responsibilities and pay close attention to implementation. Leaders at all levels should resolutely put an end to problems such as non-compliance with rules and discipline, and unremittingly ensure that the confidentiality of the NDRC system is implemented and that all confidentiality work is foolproof.

3. Basic knowledge of confidential work

1) What is a state secret? State secrets are matters related to national security and interests, which are determined in accordance with legal procedures and are only known to a certain range of people in a certain period of time.

(2) What is a work secret? Working secrets are generated in the official activities of the state, which are not state secrets and should not be disclosed publicly. (3) What is a trade secret? Refers to the technical information and business information that is not known to the public, can bring economic benefits to the obligee, is practical, and is kept confidential by the obligee.

(4) What is the carrier of state secrets? Refers to paper media, magnetic media, optical disks and other items. Recording state secret information by means of words, data, symbols, graphics, images, sounds, etc. There are mainly the following four categories: 1. A paper medium carrier that records state secret information with words, figures and symbols.

2. Carriers that use magnetic substances to record state secret information, such as computer disks (including floppy disks and hard disks), magnetic tapes, audio tapes and video tapes. 3. Recording carriers that transmit state secret information by electric signals and optical signals, such as radio waves and optical fibers.

4. Equipment, instruments, products and other carriers containing state secret information. (5) What is the basic policy of confidentiality? The policy of keeping state secrets is to actively prevent, highlight key points, ensure state secrets and facilitate all work.

(6) Who is responsible for the confidentiality work? The leading cadres shall be responsible for the confidentiality work. Organs and units involving state secrets shall establish security organizations, determine full-time or * * * security staff, and manage the security work of their own units.

(7) What are the main contents of the responsibility system for party and government leading cadres? 1. The main leaders of the party and government should take overall leadership responsibility for the confidentiality work of their own units (systems); 2. Party and government leaders in charge of confidentiality work bear specific organizational leadership responsibilities; 3 leaders in charge of other work, where the business work is managed, the confidentiality work will be managed, research and deployment, inspection and assessment of business, and at the same time make arrangements and inspection and assessment of confidentiality issues. (8) What are the main contents of confidential publicity and education? 1. confidentiality policies of the party and the state; Research on the Confidentiality Law and its supporting laws and regulations, as well as other relevant laws and regulations; 2. Basic knowledge of confidentiality; 3. Safety technology and skills training; 4. Leak case education; 5. Introduction of confidential work experience; 6. Discussion on confidentiality in practical work: 7. Keep the exchange of new technologies and new products confidential.

(9) What are the contents of safety inspection? 1. Organization and leadership of safety work; 2. The implementation of the responsibility system for leading cadres' confidential work; 3. Construction of confidentiality rules and regulations; 4. Confidential publicity and education; 5. Management of confidential key departments (parts); 6. Manage state secret documents, materials and other articles; 7. Confidentiality of major events and projects; 8. Preventive measures for confidential technology; 9. Leak investigation.