April 15, 2022 is the 7th National Security Education Day for All. In order to further enhance the national security awareness of the whole people and create a strong atmosphere for national security education day for the whole people, the Inner Mongolia Quality and Standardization Institute has successively launched national security knowledge content on Toutiao account, and today the content is the "Confidentiality Law".
[Typical Case]
Case 1. Use WeChat pictures to facilitate information to leak
In October 2017, Xiao, deputy director of the office of a certain unit, reported to the leader in charge of the inspection work outside, found the confidentialist Zhao to check the documents, and took photos of part of the content of a confidential document on his mobile phone, and sent it to the leader in the inspection work outside by WeChat point-to-point. After the case occurred, the relevant departments revoked Xiao's position as deputy director of the office and transferred him from his office position, and gave Zhao, who was responsible for managing confidential documents, and gave him an admonishment and a written inspection to Li, Qin, and Shao, who were responsible for leadership or supervision, and ordered a written inspection.
Case 2: Emergency transmission caused leakage
A department of a certain city party committee issued confidential documents in order to deploy relevant sensitive work and notified 29 townships in the city to send people to sign and collect documents. After receiving the documents from a certain township government cadre Hong, he thought the incident was urgent and it was late at night. He sent the photo to the township government WeChat group that night. After seeing this, group member Yang immediately forwarded it to other WeChat groups. After that, the file was forwarded several times to multiple WeChat groups and Weibo , causing leakage.
Case 3: Reporting work caused leaks
Deputy Director of the office of a certain unit, Xiao Mou, in order to report to the leader in charge of the inspection work outside, found the confidentialist Zhao Mou to check the documents, and took photos of part of the content of a confidential document on his mobile phone, and sent it to the leader in the inspection work outside by point-to-point. After the case occurred, the relevant departments revoked Xiao's position as deputy director of the office and transferred him from his office; Zhao, who was responsible for managing confidential documents, gave him an administrative warning; Li, Qin, and Shao, who were responsible for leadership or supervision, were given a warning and an exhortation to him, and ordered a written inspection.
[Case Analysis]
Such leak cases organized by the confidentiality department often have some kind of "objective factors": urgent business to be done, other communication methods are not smooth, unable to be assigned or reported in person, technical errors, and even the leader's instructions to use WeChat to transmit, etc. In fact, the parties involved ignore confidentiality laws and regulations and are lucky to be the consequences of the leak.
[Confidentiality Tips]
WeChat office caused to leaks violate Article 48, paragraph 7 of the Law of the People's Republic of China on the Protection of State Secrets, "Transfer of State Secrets in the Internet and other public information networks or wired and wireless communications without protection measures". It is an illegal act and if the circumstances are serious, they will be held criminally responsible in accordance with the law. Using WeChat office as a technological progress and development trend is understandable. The problem is not WeChat itself. The real reason for leaks in WeChat office is the lax confidentiality management of government agencies and units, insufficient education and training for cadres and staff, and indifferent awareness of confidentiality. Countermeasures: Organs and units should strengthen confidentiality publicity and education, and convey risk awareness and responsibility awareness to everyone at all levels. Leading cadres should take good care of the staff around them and remind them frequently that cadres and staff should not only ensure that they do not use WeChat to transmit secrets, but also report them to the relevant departments in a timely manner when they find such situations. In principle, it is not recommended to use WeChat office. Work groups formed due to work needs should be strictly limited to well-known general information, and the dissemination of all state secrets and work secrets is prohibited. Confidential persons are prohibited from using WeChat office. Combining the entire process management of confidential carriers with confidentiality management of smartphone use, eliminating the hidden dangers of digitization of confidential documents from the source.
"National Security Education Day"
Knowledge answer 1
1. Single choice
1. The "Conservation of State Secrets" Law clearly stipulates that confidential state secrets are ( ) state secrets, and leakage will cause ( ) damage to national security and interests, and secret state secrets are ( ) state secrets, and leakage will cause damage to national security and interests.
A. Important, serious, general
B. Extremely important, general, serious
C. Important, particularly serious, general
D. Most important, serious, general
2. The "Conservation of State Secrets" stipulates that if the confidentiality period of state secrets is over, ( ).
A. Adjust
B. Report the superior unit
C. Officially disclose
D. Decrypt
D. Decrypt
3. According to the provisions of the State Secret Law, confidential personnel ( ) shall implement decryption period management. During the decryption period, confidential personnel shall, in accordance with the regulations ( ) confidentiality obligation , shall not violate the regulations ( ) and shall not disclose state secrets in any way.
A. Leave the post and resign, perform, employment
B. Take office, perform, leak
C. Leave the post and resign, no longer perform, leave the country
D. Take office, strictly perform, leave the country
4. If the meeting or other activities are held in charge of state secrets, the organizer shall ( ) and propose ( ) to the participants ( ).
A. Adopt confidentiality technology to conduct confidentiality investigations, specific confidentiality agreement
B. Take confidentiality measures to conduct confidentiality education, specific confidentiality requirements
C. It is not held publicly, confidentiality training , confidentiality requirements
D. Hold in secret places, conduct personal belongings inspections, confidentiality agreement
5. The confidentiality period for state secrets, unless otherwise specified, the top secret level shall not exceed ( ) years, the confidential level shall not exceed ( ) years, and the secret level shall not exceed ( ) years, and the secret level shall not exceed ( ) years, and the secret level shall not exceed ( ) years. )Year.
A. Twenty, ten, five
B. Thirty, twenty, ten
C. Thirty, fifteen, ten
D. Fifty, thirty, fifteen
D. Fifty, thirty, fifteen htmlhttps://www. ml2
2. Judgment question
1.Science and technology , if it may damage the security and interests of the country in the fields of politics, economy, national defense, diplomacy, etc. after disclosure, it shall be determined as a state secret. ( )
2. The Law on Conservation of State Secrets clearly stipulates that any act that endangers the security of state secrets must be pursued by law. ( )
3. According to the "Law on Conservation of State Secrets", central state organs manage or guide the confidentiality work of this system within their powers. ( )
4. According to the provisions of the Law on Conservation of State Secrets, the specific scope of state secrets and their secret levels shall be stipulated by the state confidentiality administrative department in conjunction with diplomacy, public security, national security and other relevant central agencies. ( )
5. According to the provisions of the State Secret Law, the secrets of state secrets are divided into top secrets and confidential levels. ( )
↓↓↓↓
Answer below
Answer: 1.1.A 2.D 3.A 4.B 5.B
2.1.√ 2.√ 3.√ 4.√ 5.×