As the main form of state secret information, the management of secret-related carriers is a key link in ensuring the security of state secrets. At present, some organs and units have problems such as unclear carrier bases, inadequate daily supervision, and omissions in the implementation of regulations, which can easily lead to leakage of secrets.
Cases of loss of confidentiality
The signature is not registered, and the secret document is gone
The office of a certain municipal party committee found that the municipal party committee of the Communist Youth League failed to clear one secret-level document on time. After investigation, after Fang Mou, director of the Propaganda Department of the Youth League Municipal Committee, signed the above-mentioned documents, he casually put the documents in the pile of materials on the desk, and later due to the relocation and adjustment of the office, the whereabouts of the documents were unknown. After the case occurred, the relevant departments gave Fang X an administrative warning.
After reading, it is not returned, and the secret documents are placed at will
In order to draft the manuscript, Wang, a cadre of the research office of a certain municipal party committee, went to the secret room to borrow two confidential documents, brought them back to the office to read them, and did not return them in time, so he casually inserted the documents into the file rack on his desk, and then disposed of the two confidential documents as garbage when he cleaned up his desk. After the case, Wang was notified of criticism and punished with a warning from the party.
Maintenance is not supervised, and information is out of control
When a confidential mobile hard disk used by Fu X, a seconded person from a certain ministry or commission, failed, he privately handed over the classified mobile hard disk to his comrade-in-arms Lu for maintenance without asking for approval, and did not supervise it. Due to the needs of equipment testing, Lu connected this mobile hard disk to the Internet computer many times, causing the classified information to go out of control. After the case occurred, Fu was given corresponding sanctions.
Full cycle management
Therefore, it is necessary to adhere to the concept of full-cycle management, that is, to take source management and whole-process closed-loop control as the core, strictly control the production, sending and receiving, transmitting, use, preservation, maintenance, destruction and other links, and take corresponding confidentiality management and technical measures to ensure that the trajectory can be recorded, safe and auditable, and the whole process can be traced.
Production
Undertake the printing in the organ, the unit's office, the copy room, or the production room, or entrust the unit with the qualifications to print state secret carriers.
The production site shall take corresponding security and confidentiality measures.
In accordance with the relevant provisions, indicate the level of secrecy and the period of secrecy, indicate the scope of distribution and the number of productions, and arrange the sequence number.
Materials that do not need to be archived, such as waste pages formed during the production process, are destroyed in a timely manner.
Send and receive
Carefully count and check one by one to ensure that the quantity is correct, and there are no missing pages, missing pages, etc.
Detailed number, registration title, document number, secret level, handling situation, distribution scope and other information.
Strictly sign for receipt, sign or seal after counting, and indicate the date of receipt.
Delivery
The package is sealed and marked with the classification level, number and the name of the sending and receiving unit.
It is carried out through confidential transportation, confidential communication, or by assigning a special person.
Transmission abroad is subject to approval in accordance with regulations and is carried out through diplomatic couriers.
use
Determine the scope of knowledge according to the confidentiality level of the carrier, the requirements of the issuing authority, the unit and the needs of the work.
Read and use it in an office that meets the confidentiality requirements, and go through the registration and signature procedures.
Reproduction, excerpts, quotations, and compilations shall be submitted for approval and properly managed in accordance with regulations.
If it is necessary to carry it out due to work, it shall be approved by the head of the organ or unit, and strict confidentiality measures shall be taken.
Save
Choose safe and confidential places and locations, and equip them with necessary confidential facilities and equipment.
When leaving the office, it should be stored in a confidential device.
Regularly check and check, and report problems in a timely manner.
Where it is necessary to archive, it shall be filed in a timely manner in accordance with provisions.
Repairs
The internal specialized and technical personnel of that organ or unit are responsible for implementation.
If it is really necessary for personnel from other units to come to the door for maintenance, a special person should be designated to supervise the whole process.
If it is really necessary to send it out for maintenance, it should be sent to a designated unit that has been reviewed and approved, and the information storage components should be dismantled.
Destruction
Strictly perform the inventory, registration, and approval procedures, and store them in a special place that meets the requirements of safety and confidentiality.
Classified packaging, safe transportation, sent to a special destruction work agency or designated underwriting unit, and sent a special person to supervise the sale on site.
Registration and approval records should be kept for a long time for future reference.
Where it is truly necessary to destroy it by itself due to work, use destruction equipment and methods that meet national secrecy standards.
Originates: the concept of confidentiality.