Ordinary mobile phones have the following shortcomings in security and confidentiality protection: mobile phone networks are public networks facing the public, and the level of security and confidentiality protection is low; therefore, any individual, especially confidential pers

2024/12/1520:00:33 digitals 1077

Ordinary mobile phones have the following defects in security and confidentiality protection:

(1) The mobile phone network is a public network for the public, and the level of security and confidentiality protection is low;

(2) The mobile phone network information platform is a completely open platform and does not have any confidentiality. ;

(3) Communication tools such as mobile phone text messages and WeChat have low confidentiality protection levels, and communication information can easily be monitored and mined. ;

Ordinary mobile phones have the following shortcomings in security and confidentiality protection: mobile phone networks are public networks facing the public, and the level of security and confidentiality protection is low; therefore, any individual, especially confidential pers - DayDayNews

(4) The mobile phone location service function will automatically disclose the whereabouts of mobile phone users;

(5) The mobile phone network is an open wireless network, and communication information can easily be eavesdropped through air signal interception and filtering;

(6) The security of the mobile phone itself Confidentiality protection is also very fragile, and information stored in mobile phones is relatively easy to be stolen by cyberattacks.

Therefore, any individual, especially confidential personnel, should strictly abide by national confidentiality laws and regulations and relevant confidentiality requirements when using ordinary mobile phones.

(1) Do not involve state secrets in calls, send text messages, or send WeChat messages. Do not publish information or remarks involving state secrets on any information platform on the mobile phone network;

(2) No Information involving state secrets may be stored, processed and transmitted on the mobile phone;

(3) The mobile phone shall not be connected to the confidential information system , confidential information equipment or secret carriers, and the work of core confidential personnel shall not be stored on the mobile phone. unit, position, Red machine phone number and other sensitive information;

Ordinary mobile phones have the following shortcomings in security and confidentiality protection: mobile phone networks are public networks facing the public, and the level of security and confidentiality protection is low; therefore, any individual, especially confidential pers - DayDayNews

(4) shall not turn on and use the location service function in confidential official activities;

(5) shall not apply for a mobile phone number, registration When registering a mobile phone email address or activating other functions, fill in information such as the name and address of a confidential unit that is prohibited from being disclosed;

(6) shall not use a mobile phone without network access permission from the national telecommunications management department;

(7) shall not use overseas institutions or overseas personnel Complimentary mobile phone.


Source | Xi’an Confidential Weiyang Procuratorate

digitals Category Latest News