Confidentiality work is an activity organized and implemented by specialized state agencies in order to safeguard national security and interests, to control state secrets within a certain scope and time, to prevent leakage or illegal use.

. Confidentiality work policy and system

● What is confidentiality work?

Confidentiality work is an activity organized and implemented by specialized state agencies in order to safeguard national security and interests, control state secrets within a certain range and time, prevent leakage or illegal use, and is organized and implemented by specialized state agencies. From the purpose of the work, confidentiality work includes preventing and cracking down on stealing and leaking secrets; from the work process, confidentiality work runs through the entire process of state secret operation; from the work content, confidentiality work mainly includes publicity and education, legal system construction, guidance and management, technical protection, supervision and inspection, etc.

● What is the policy of confidentiality work?

Confidentiality Law stipulates that the work of keeping state secrets should be implemented to actively prevent, highlight key points, and manage according to law, which not only ensures the security of state secrets, but also facilitates the rational use of information resources.

● What is the leadership system for confidentiality work?

Central Confidentiality Committee is the leadership body of the Party Central Committee for unified leadership of the confidentiality work of the Party and the government and the military. The Party’s confidentiality committees at all levels are special organizations that the Party manages confidentiality. The lower-level confidentiality committee accepts guidance and supervision from the higher-level confidentiality committee.

. Confidentiality work responsibility system

● What are the main confidentiality work responsibility system?

Confidentiality work responsibility system mainly includes: the confidentiality work responsibility system for leading cadres, the confidentiality work responsibility system for organs and units, the confidentiality work responsibility system for confidentiality personnel, and the confidentiality administrative management department work responsibility system.

● What are the responsibilities for confidentiality work of leading cadres?

The main responsibilities for confidentiality work of leading cadres are: fulfilling confidentiality work policies, policies and The Party’s confidentiality discipline , the leadership responsibilities for confidentiality work required and stipulated by confidentiality laws and regulations, consciously accept confidentiality supervision, educate, remind, and urge staff around them to abide by confidentiality requirements and confidentiality discipline.

● What are the responsibilities for confidentiality work of organs and units?

The main responsibilities for confidentiality work of organs and units include: implementing the Party and the State's confidentiality work principles and policies and confidentiality laws and regulations; establishing a confidentiality work organization and designating personnel to be responsible for confidentiality work; providing human, financial and material guarantees; including confidentiality work in the supervision and assessment system; cooperating with the confidentiality administrative department to seriously investigate and punish leaks; guiding and supervising the confidentiality work of subordinate units.

● What are the responsibilities for confidentiality work for confidential personnel?

The main responsibilities for confidentiality work include: strictly abide by confidentiality laws, regulations, rules and regulations; consciously accept confidentiality education and training; keep and use confidential carriers, facilities and equipment in accordance with the law; stop and correct behaviors that violate confidentiality regulations; accept confidentiality supervision and inspection; report hidden dangers or leaks in a timely manner, and actively take remedial measures, etc.

. State Secret

● What is a state secret?

State Secret is a matter that concerns national security and interests, determined in accordance with legal procedures, and is only limited to a certain range of personnel within a certain period of time.

● What are the levels of state secrets?

The secrets of state secrets are divided into three levels: top secret, confidential and secret. Top-secret state secrets are the most important state secrets, and leakage will cause particularly serious damage to national security and interests; confidential state secrets are important state secrets, and leakage will cause serious damage to national security and interests; secret state secrets are general state secrets, and leakage will cause damage to national security and interests.

● What are the basic scope of state secrets?

The basic scope of state secrets includes: secret matters in major decisions in state affairs; secret matters in national defense construction and armed forces activities; secret matters in diplomatic and foreign affairs activities and secret matters in external undertaking of confidentiality obligations ; secret matters in national economic and social development; secret matters in science and technology ; secret matters in maintaining national security activities and tracing secret matters in criminal crimes; other secret matters determined by the state confidentiality administrative department. A secret matter of a political party that may damage the security and interests of the country in the fields of politics, economy, national defense, diplomacy and other fields after being leaked is a state secret.

● What is the principle of determining the scope of state secret knowledge?

There are two basic principles for determining the scope of state secret knowledge. First, work needs principles. Knowing state secrets should not be simply regarded as a political treatment, or the administrative level should be used as the basis for determining the scope of knowledge of state secrets. The second is the principle of minimization. If it can be limited to specific personnel, it will be limited to specific personnel; if it cannot be limited to specific personnel, it will be limited to the agency or unit, and the agency or unit will be limited to specific personnel.

● What is a state secret logo?

State secret logo is a legal text and symbolic logo to indicate that the content carried by the identified items (carriers, equipment, products, etc.) belongs to state secrets, and mark their confidentiality level and confidentiality period. The state secret logo is "confidentiality period", "confidentiality decryption time" or "confidentiality decryption conditions".

● How to determine the confidentiality period of state secrets?

For the state secrets generated, the agency and unit shall determine the specific confidentiality period in accordance with the scope of confidential matters; if the scope of confidential matters does not stipulate the specific confidentiality period, it may be determined within the confidentiality period stipulated in the Confidentiality Law according to work needs; if the confidentiality period cannot be determined, the decryption conditions shall be determined. The confidentiality period for state secrets, unless otherwise specified, shall not exceed 30 years, the confidentiality level shall not exceed 20 years, and the secret level shall not exceed 10 years.

. Secret password work

● What is a Secret password?

Confirm password refers to the activities of organs and units to determine, change and release state secrets in accordance with the law.

How is the right to determine the secret of ?

The right to determine whether a certain matter belongs to a state secret and what level of secret belongs, as well as the power to change and terminate state secret matters, which is divided into two types: legal secret rights and granted secret rights. The statutory right to determine confidentiality refers to the power to determine, change and terminate state secrets directly enjoyed in accordance with the Confidentiality Law. Organs that enjoy legal authority for confidentiality include central state organs, provincial organs, and municipalities and autonomous prefecture-level agencies. The right to determine confidentiality granted refers to the power to determine, change and terminate state secrets obtained through the authorization of confidentiality. Organs and units that do not have the right to determine secrets or do not have the authority to determine the confidentiality level may apply for the right to determine secrets to the relevant central state organs, provincial organs, and municipalities and autonomous prefectures at the level of prefectures in accordance with the law. An agency with legal authority to establish secrets can also take the initiative to issue a confidentiality authorization according to work needs. The right to determine the secret shall be exercised within the scope of authorization and shall be subject to supervision by the authorized authority of the confidentiality. Central state organs, provincial organs and their authorized agencies and units can determine top-secret, confidential and secret state secrets; prefecture-level municipal and autonomous prefecture-level agencies and their authorized agencies and units can determine confidential and secret state secrets. The public security and state security organs shall determine the level of state secrets within their work in accordance with the prescribed authority.

● Who are the responsible persons for determining the secret?

The head of the agency and the unit are the responsible persons for determining the secret of the secret of the agency and the unit, and are responsible for the work of determining the secret.According to work needs, the head of the agency or unit may designate the head of the agency, other heads of the unit, the heads of the internal organization or other staff as the responsible persons for the determination of confidentiality, and clarify the corresponding authority for the determination of confidentiality.

The person responsible for determining confidentiality shall receive the confidentiality training and hold a certificate to work.

● How to determine state secrets?

For the state secret matters arising, the confidentiality level shall be determined in accordance with the scope of confidential matters, and at the same time determine the confidentiality period and scope of knowledge.

● What is the basic procedure for determining state secrets?

The basic procedure for determining state secrets is: when the state secrets are generated, the organizer shall put forward specific opinions on the confidentiality in accordance with the scope of confidentiality matters, and then the person responsible for determining the confidentiality is reviewed and approved.

● Under what circumstances does state secrets need to be changed?

If the laws and regulations based on the state secrets are determined or the scope of confidential matters are changed, or if the degree of damage to national security and interests is significantly changed after the leakage of state secret matters, state secrets should be changed in a timely manner.

● Under what circumstances does state secrets need to be lifted?

Official agencies and units shall regularly review the determined state secrets. If confidentiality laws and regulations or the scope of confidential matters are no longer a state secret after adjustment, or if they will not harm national security and interests after disclosure, and do not need to continue to be kept confidential, they shall be terminated in a timely manner. If the confidentiality period of state secrets has expired and the confidentiality authority or unit has not decided to extend the confidentiality period, the state secret will be decrypted by itself. If a state secret is still within the confidential period, and the confidentiality authority or unit after review, it shall decrypt it in a timely manner: (1) After the confidentiality laws and regulations or the scope of confidential matters of the insurer are adjusted, it will no longer be a state secret; (2) It will not harm national security and interests after disclosure, and there is no need to continue to be confidential.

● How to determine the confidentiality level of "unclear matters"? For unclear matters that comply with the provisions of the Confidentiality Law but do not stipulate the scope of confidentiality matters, they shall be formulated as confidential and secret matters, and shall be reported to the confidentiality administrative department of the province and autonomous region municipality directly under the Central Government for matters that are proposed as top-secret, and shall be reported to the national confidentiality administrative department for confirmation.

● How to determine the confidentiality level of "controversial matters"?

If the authorities and units have different opinions on whether the determined secret matter is a state secret or what confidentiality level belongs to, they may raise objections to the original confidential authority and unit, and the original confidential authority and unit shall make a decision. If an agency or unit fails to handle the original confidentiality or unit or still has objections to the decision made, matters determined to be confidential or secret, they shall be reported to the confidentiality administrative department of the province, autonomous region, or municipality directly under the Central Government; matters determined to be top-secret, they shall be reported to the national confidentiality administrative department for confirmation.

. Confidential personnel

● Who are confidential personnel?

Confidential personnel refer to positions that are produced, managed or frequently contacted and known to state secret matters in daily work, that is, those who work in confidential positions.

● What are the categories of confidential personnel?

Confidential personnel are divided into core confidential personnel, important confidential personnel and general confidential personnel.

● What basic conditions should confidential personnel meet?

Confidential personnel should have certain basic conditions. Specifically: have the nationality of the People's Republic of China; love the motherland, abide by the law; have firm political stance, upright character, loyal and reliable; have the business quality and ability required for confidential positions.

● What are the main confidentiality requirements for confidential personnel to take up their posts?

Appointment and employment of confidential personnel should be carried out by the employer's organization and personnel department in conjunction with the confidentiality work organization to conduct strict pre-appointment review based on the conditions for the confidential personnel's appointment.Confidential personnel should undergo confidentiality education and training (no less than 4 hours a year), master confidentiality knowledge and skills, sign a confidentiality commitment letter, strictly abide by confidentiality rules and regulations, and not disclose state secrets in any way.

● What are the main contents of the confidentiality commitment letter for on-the-job personnel?

The contents of the confidentiality commitment letter for on-the-job personnel mainly include: abide by national confidentiality laws, regulations and rules and regulations, fulfill confidentiality obligations; do not provide false personal information, and voluntarily accept confidentiality review; do not record, store, and copy state secret information in violation of regulations, and do not retain confidential carriers in violation of regulations; do not disclose state secrets you contacted and known in any way; do not publish articles and works involving undisclosed work content without review and approval from the unit; do not voluntarily accept the management of the declassification period and sign a confidentiality commitment letter; clear away all confidential carriers stored; if the above commitment is violated, voluntarily bear the responsibility of party discipline, political discipline and legal consequences.

● What are the main confidentiality requirements for confidential personnel leaving their posts and resigning?

Confidential personnel should promptly clear out confidential carriers and confidential information equipment that they own and use by themselves, sign a confidentiality commitment letter, and strictly manage the decryption period, etc.

● How long is the decryption period for confidential personnel?

The decryption period for confidential personnel. Generally, the core confidential personnel are 2 years to 3 years, important confidential personnel are 1 year to 2 years, and generally 6 months to 1 year. For special high-level personnel with high density, a detachment period exceeding the above period can be set according to law.

● What major matters should confidential personnel report?

The major matters that confidential personnel need to report are: leakage or cause major leaks; discovery of infiltration and rebellion against themselves; receiving funding from overseas institutions, organizations and non-relatives; marrying overseas personnel; spouses and children obtain permanent residence qualifications for overseas or obtain foreign nationality; other personal situations that may affect the security of state secrets.

● What are the main confidentiality requirements for confidential personnel going abroad?

Confidential personnel going abroad should strictly implement the overseas approval system. If you really need to bring a confidential carrier to the country (in foreign countries), the approval procedures shall be followed. If confidential personnel encounter cross-examination, inducement, coercion or other major abnormal situations abroad, they shall report it in a timely manner.

● What are the main confidentiality requirements for confidential personnel to publish articles and works?

Confidential personnel shall not involve state secrets on articles and works. Anyone who involves the business work of this system or the unit or whether the boundaries of whether it involves state secrets are unclear, and who intends to provide reports to overseas news and publishing institutions and publishes content involving national politics, economy, diplomacy, science and technology, military, etc. shall be approved by the unit or superior authority or unit in advance. Submitting manuscripts to overseas shall be handled in accordance with relevant national regulations.

. Confidential carrier

● What is a confidential carrier?

Confidential carrier refers to various items such as paper media, optical media, electromagnetic media that record state secret information in words, data, symbols, graphics, images, sounds, etc. Paper media confidential carriers refer to traditional paper confidential documents, materials, books, drawings, etc. Optical medium confidential carrier refers to a storage medium that uses laser principle to write and read confidential information, including CD, VCD, DVD and other types of optical discs. Electromagnetic media confidential carriers include two types: electronic media and magnetic media. Electronic media confidential carrier refers to storage media that writes and reads confidential information using electronic principles, including various USB disks, mobile hard disks, etc. A magnetic medium confidential carrier refers to a storage medium that uses magnetic principles to write and read confidential information, including hard disks, soft disks, magnetic tapes, etc.

● How should we manage the production of confidential carriers?

The production of confidential carriers shall be undertaken by the agency, unit or unit that has passed the confidentiality review by the confidential administrative department; the production site shall meet the confidentiality requirements and if electronic equipment is used, measures such as electromagnetic leakage emission protection shall be taken; materials that do not require archives during the production process shall be destroyed in a timely manner.

● How to manage the copying of confidential vectors and excerpts, citations, and compilation of contents belonging to state secrets? The copying, excerpts, citations, and compilation of confidential carriers of confidential level and secret level shall be submitted for approval in accordance with regulations. The confidentiality, confidentiality period and scope of knowledge of the original shall not be changed without authorization. The copy shall be stamped with the copying authority or unit and shall be treated as the original. Top-secret confidential carriers generally cannot be copied, excerpted, cited, or compiled. If there is indeed work needs, the consent of the original confidential agency, unit or its superior agency or unit must be obtained.

● How to manage confidential carriers?

Confidential carriers shall perform the procedures of inventory, numbering, registration and signing.

● How to manage the confidential carrier?

The confidential carrier should be carried out through confidential transportation, confidential communication or other methods that meet the confidentiality requirements. It shall not be transmitted through channels without confidentiality measures such as ordinary postal and express delivery. When a special person is assigned to deliver, safe means of transportation and traffic routes must be selected and corresponding security and confidential measures must be taken; cities with confidential document exchange stations must transmit confidential and secret-level confidential carriers in the city, which can be carried out through confidential document exchange stations.

● How to manage the reading and use of confidential carriers?

Reading and use of confidential carriers should be carried out in an office that meets the confidentiality requirements; if you really need to read and use confidential carriers outside the office, you must abide by the relevant confidentiality regulations. When reading and using confidential carriers, registration and signing procedures shall be completed, and management personnel shall be aware of the whereabouts of confidential carriers at any time.

● How to manage confidential carriers?

Saving confidential carriers should choose safe and confidential places and parts, and equip them with necessary confidential facilities and equipment. At the same time, regular inventory and verification should be carried out, and problems should be reported in a timely manner. When leaving the office, confidential carriers should be stored in confidential equipment.

● How to manage carrying confidential carriers out?

Strict confidentiality measures must be taken to ensure that confidential carriers are always under the effective control of the carrier. Generally, confidential carriers are not allowed to participate in foreign-related activities. If you really need to carry confidential or secret carriers, they must be approved by the head of the agency or unit.

● How to manage confidential carriers for maintenance?

Maintenance confidential carriers should be responsible by the professional and internal technical personnel of this agency and the unit. If maintenance is really required by personnel from other units, it must be carried out within the agency or unit, and a special person shall be appointed to supervise the entire process on-site. If it is necessary to send out for repair, it should be sent to the designated unit approved by the confidentiality administrative department for review and approval, and the information storage components should be removed before sending for repair.

● What are the main confidentiality requirements for destroying confidential carriers?

Destruction of confidential carriers shall comply with the inventory, registration, and approval procedures and shall be submitted to the destruction work agency established by the confidentiality administrative department or designated unit for destruction. The confidential carriers for the delivery of the government agencies and units shall be classified and packaged and transported safely, and a special person shall be sent to supervise the sale on site. If a small amount of confidential carriers are destroyed by themselves, the destruction equipment and methods that meet the national confidentiality standard of should be used, and the destruction standards stipulated by the state should be met. Registration and approval records for the destruction of confidential carriers shall be kept for reference for a long time.

. Computer and Mobile storage media

● What are the main requirements for confidentiality management of confidential computers?

Before the new purchase of confidential computers is enabled, confidentiality technology testing should be carried out.Confidential computers should be managed in accordance with the highest level of storage and processing of information, and shall not be connected to the Internet and other public information networks; shall not exchange information between the Internet and other public information networks without taking protective measures; shall not uninstall and modify security technical programs and management programs without authorization; shall not give away, sell, discard or convert confidential computers that have been removed from use without security technology for other purposes.

● How to set passwords for confidential computers?

Secret-level computer password length should be no less than 8 digits, and the replacement cycle should not exceed 1 month. The length of the confidential computer password should be no less than 10 digits, and the replacement period should not exceed 1 week. It can also be combined with IC card or USB Key and password (length not less than 4 digits). Password settings for secret and confidential computers should be compiled with a mixture of characters and numbers. Top-secret computers should adopt strong identity identification methods such as physiological characteristics, or combine IC cards or USB keys with passwords (length is not less than 6 digits).

● When carrying confidentiality laptop and other confidential storage media out of the room, what confidentiality requirements should be followed?

In general, it is not allowed to carry confidentiality laptops and other confidential storage media out of the room. If you really need to take it out, you must strictly follow the approval procedures and take effective management measures to ensure that confidential laptops and other confidential storage media are always under effective monitoring. At the same time, confidentiality technical protection measures such as identity authentication and confidential information encryption should be taken.

● What issues should be paid attention to when changing a confidential computer to a non-confidential computer?

Used by the agency or unit to change a confidential computer to a non-confidential computer, and security technical measures such as dismantling information storage components (such as hard disks, memory) should be taken.

● What are the main requirements for confidentiality management of non-confidential computers?

It is strictly forbidden to use non-confidential computers to store, process, and transmit confidential information. Confidential protection measures should be taken when exchanging information between confidential computers and non-confidential computers.

. Network

● What is confidential network ?

Confidential network refers to a confidential computer network that stores and processes state secret information. According to the highest level of storing and processing state secret information, it is divided into top secret level, confidential level and secret level. A network that centrally stores and processes work secrets, refer to the secret-level network management.

● What are the main confidentiality requirements for the planning and construction of confidential networks?

Confidential networks should determine the confidentiality level based on the highest level of storage and processing of information. According to the requirements of synchronous planning and synchronous construction, and formulate a hierarchical protection plan in accordance with the national confidentiality regulations and standards, and adopt technical measures such as identity authentication, access control, security audit , password protection. After completion, the confidentiality assessment agency established or authorized by the state confidentiality administrative department shall be inspected and evaluated, and shall be reviewed and qualified by the confidentiality administrative department at or above the prefecture level before it can be put into use.

● What are the main confidentiality requirements for the operation and use of confidential networks?

Confidential networks should designate internal personnel to serve as system administrators, security and confidential administrators, and security auditors; implement physical isolation from the Internet and other public information networks; unify procurement, registration, identification, and equip information equipment, and clarify the person responsible for use management; strictly set user rights based on job responsibilities; strictly control the use of storage media and information output; strengthen comprehensive analysis of user operation records, and promptly discover violations or abnormal behaviors: copy data on the Internet and other public information networks to confidential networks, and protecting measures such as virus detection and one-way import should be taken.

● What are the main requirements for confidentiality management of non-confidential networks?

Non-confidential networks are strictly prohibited from storing, processing, or transmitting confidential information. If confidential information is found, it should be deleted immediately and reported in a timely manner.State secrets shall not be transmitted in the Internet and other public information networks or in wired and wireless communications where confidentiality measures have not been taken.

● What are the main confidentiality requirements for information exchange between confidential networks and non-confidential networks?

Information exchange between confidential networks and the Internet and other public information networks without taking protective measures. If it is necessary to copy the data on the Internet and other public information networks to confidential networks, necessary protective measures should be taken, such as using a disposable CD to burn and download, setting up an intermediate machine, or using a one-way information import device approved by the state confidentiality administrative department.

9. Communication and office automation equipment

● What are the main confidentiality requirements for using ordinary mobile phones?

Use ordinary mobile phones and do not involve state secrets in communications; do not store, process, or transmit information involving state secrets; do not connect to confidential information system , confidential information equipment or confidential carriers: do not store sensitive information such as work units, positions, red machine phone numbers of core confidential personnel; do not enable and use location service functions in confidential official activities; do not fill in information such as the name and address of confidential units that are prohibited from being disclosed when applying for mobile phone numbers, registering mobile phone emails or activate other functions; do not use mobile phones without permission from the state telecommunications management department to access the Internet; do not use mobile phones given by overseas institutions or overseas personnel.

● What are the main confidentiality requirements for using communication equipment such as telephones and fax machines?

Use ordinary telephones and fax machines to not talk about or transmit confidential information. For fax confidential information, an encrypted fax machine approved by the national password management department must be used. Encrypted fax machines can only transmit confidential and secret information, and top-secret information should be translated and sent to the local confidential department.

● What are the main confidentiality requirements for using a copier?

Non-confidential copier shall not copy confidential documents or materials. Confidential copiers should be installed in places that meet confidentiality requirements and are designated as designated as a dedicated person to manage them. They shall not be connected to public information networks such as the Internet; confidentiality technical inspection and testing should be carried out before activation.

● What are the main confidentiality requirements for using printers and scanners?

Non-confidential printers and scanners are not allowed to print or scan confidential files or materials. Confidential printers and scanners shall not be connected to public information networks such as the Internet, and shall not be connected to confidential computers by wireless. Confidential documents and materials should be printed with audit records. The approval procedures should be followed for scanning confidential documents and data.

● What are the main confidentiality requirements for eliminating and scrapping confidential office automation equipment?

Eliminating and scrapping confidential office automation equipment should be counted and registered. After approval by the supervisors of the agency and unit, it will be sent to the confidential carrier destruction agency designated by the confidential administrative department for destruction. It is prohibited to transfer or donate to others, and it cannot be sold as waste or discarded at will.

11. Key departments and locations of confidentiality

● What are key departments and locations of confidentiality?

Confidentiality junction refers to the internal organization that generates, transmits, uses and manages top-secret or more confidential and secret-level state secrets in the daily work of an agency and unit. The key parts of confidentiality refer to special places where the institutions and units centrally produce, store and store confidential carriers.

● What principles and standards should be grasped when determining key departments and locations of confidentiality?

Confidentiality should be grasped by the principles of internal determination, hierarchical confirmation and minimization. The confidentiality key departments should determine the level and quantity of state secrets generated, transmitted, used and managed. The confidentiality key parts should be determined based on whether they are special places for centralized production, storage and storage of confidential carriers.

● What is the procedure for determining key confidentiality departments and parts?

The confidentiality departments and parts of the central and state organs and directly affiliated units shall be determined by each agency and unit and reported to the state confidentiality administrative department for confirmation; the confidentiality departments and parts of the provincial and directly affiliated units shall be determined by each agency and unit, and shall be reported to the provincial (autonomous region, municipal) confidentiality administrative department for confirmation, and shall be reported to the state confidentiality administrative department for filing; the central and state organs and state organs and units below the provincial level shall be determined by the central and state organs or the provincial (autonomous region, municipal) confidentiality administrative department for review and confirmation;

● What are the requirements for the management of key departments and parts of confidentiality?

Confidentiality key departments and parts implement the principle of "who is in charge, who is responsible" to ensure strict management, responsibilities are assigned to individuals, strictly prevent and ensure safety.

● What are the main confidentiality requirements for office places in key departments and departments?

Confidentiality key departments and departments should determine the security control area, and take necessary security precautions such as electronic monitoring, anti-theft alarms and other necessary security measures according to the characteristics of the surrounding environment and work needs. At the same time, determine the scope of entry personnel, install identity identification devices, or take other measures to control personnel entry, and strictly supervise and manage the entry of employees.

● What are the main confidentiality requirements for confidentiality technical protection of key departments and parts?

Confidentiality key departments and parts should be equipped with confidentiality technical protection equipment in accordance with national confidentiality standards, and confidentiality technical inspection and testing of the information equipment used, especially imported equipment and products. Confidentiality key departments prohibit the use of ordinary mobile phones. It is prohibited to bring mobile phones into key confidentiality areas. If you really need to bring special mobile phones in, you must be approved by the confidentiality committee (leading group) of the agency and unit and registered and filed. Equipment with functions such as recording, video recording, photography, information storage, etc. shall not be brought in without approval.

. Confidential meetings and events

● What are the principles of confidentiality management for confidential meetings and events?

Confidential meetings and events should be managed in accordance with the principle of "whoever hosts, who is responsible", and the confidentiality management responsibilities of all parties involved in confidential meetings and events should be clarified.

● For confidential meetings, what confidentiality management measures should the organizer take?

Confidential meetings and organizers shall determine the level of confidentiality according to the confidential procedures of the meetings and activities, formulate confidentiality plans, and limit the scope of participants; use places, facilities, and equipment that comply with national confidentiality regulations and standards; manage confidential carriers such as document materials, recordings and videos in accordance with national confidentiality regulations. Confidential documents and materials should be numbered uniformly and the scope of communication should be clearly defined. Units that need to be sent to participants should be sent through confidential transportation or confidential communication departments; specific confidentiality requirements should be put forward to participants. When hosting major confidential meetings and activities, the confidentiality administrative department should be requested to supervise and guide the confidentiality work and provide necessary security and confidentiality technical services.

● What confidentiality management measures should the organizers of confidential meetings and events take?

Confidential meetings and events organizers should provide a safe and confidential environment, facilities and equipment in accordance with the requirements of the organizer, educate staff on confidentiality, clarify the confidentiality responsibilities of staff and require them to do a good job in confidentiality service guarantee.

● What confidentiality matters should those who participate in confidential meetings and activities be paid attention to?

Personnel who participate in confidential meetings and activities should abide by confidentiality discipline and confidentiality requirements, and shall not entrust other personnel to participate in the meeting on their behalf without authorization, record, record, or video without authorization, and shall not use wireless equipment or devices such as wireless keyboard , wireless network card and other wireless equipment or devices. Mobile phones are prohibited from being brought into top-secret, confidential meetings and event venues. If a dedicated mobile phone is indeed required to be brought into it, it should be approved by the confidentiality committee (leading group) of the agency and unit and registered and filed.For confidential meetings and activities that need to be kept strictly confidential at the venue and participants, participants and entourage shall not bring their mobile phones to them. Ordinary mobile phones are prohibited from using secret meetings and event venues.

● What are the main confidentiality requirements for confidential meetings and event venues?

Confidential meetings and events should be held in places that meet confidentiality requirements. The venues, facilities and equipment should be inspected and inspected by confidentiality technology. Mobile communication and wireless network shielding equipment should be installed in the venue. Carrying, using recording and video equipment should be approved by the organizer. Wireless equipment or devices such as walkie-talkies, cordless telephones, wireless microphones, , wireless keyboards, wireless network cards shall not be used, and video conference systems that do not meet the conditions for confidentiality shall not be used.

Confidential video conferences should not only comply with the general requirements for confidentiality management of confidential meetings and activities, but also establish a dedicated person to be responsible for the operation and maintenance of the video conference system and audio and video recording. When the meeting is held, all video conference equipment and network connections should be disconnected from the network, and the participating venues and facilities and equipment should be inspected for security and confidentiality. The audio and video materials of the conference should be managed in accordance with the confidential carrier.

● What should be paid attention to when promoting and reporting confidential meetings and activities?

When writing a news release, you must strictly abide by News and publication confidentiality regulations and meeting confidentiality requirements, and must not involve state secrets. If a meeting or event provides a press release or report caliber, it should be reported in accordance with the press release or report caliber. Any manuscripts, pictures, videos, audio tapes, etc. that are publicly reported and played should be reviewed and approved by the relevant business department or the organizer of confidential meetings and events.

2. Government information disclosure confidentiality review

● What are the principles of confidentiality review?

Confidentiality review should adhere to the principles of "review first, then disclosure" and "one matter, one trial".

● What is the content of confidentiality review?

Confidentiality review mainly reviews whether the information to be published involves state secrets based on the basic scope of state secrets and the scope of confidential matters, and also includes identifying and identifying whether the information to be published involves state secrets in accordance with relevant laws and regulations to confirm whether the information to be published can be disclosed.

● What are the requirements for confidentiality review work?

Establish and improve the information disclosure confidentiality review mechanism, strictly review responsibilities and procedures, and clarify the review agency. The review work should be carried out by the leader, the department should be responsible, and the person should be responsible for it. Confidentiality review staff should strengthen their sense of confidentiality responsibility and be familiar with relevant laws and regulations on confidentiality review work.

● What is the procedure for confidentiality review?

Confidentiality review of the information to be disclosed shall be submitted by the organizer. After review by the confidentiality review agency designated by the agency or unit, it shall be submitted to the relevant responsible persons of the agency or unit for approval. Government information shall not be published publicly without review and approval.

3. Foreign-related activities

● What are the main confidentiality requirements for foreign-related activities?

Foreign-related activities shall not lead foreign personnel into confidential places and key departments and departments. Talks with foreign personnel shall not involve state secrets. Confidential carriers shall not be carried when entering and leaving the country or accompanying the country to and from abroad. If any overseas personnel request to provide relevant confidential information, they should be rejected and reported to the authorities and units in a timely manner. Confidential communication facilities shall not be used for use in foreign countries and overseas personnel's office equipment shall not be used to process confidential information.

● What are the main requirements for confidentiality management of group groups on business trips?

Group on business trips implement the principle of "whoever sends out is responsible, whoever group is responsible", and adheres to the principle of distinction between inside and outside, dedicated personnel are responsible, full-process management, and ensuring safety. Before going abroad, arrangements should be made for the organization and management of confidential activities during overseas travel, and confidential management measures should be clearly ensured. Sending agencies and units should provide confidential education for overseas personnel. Using computers to process confidential information should be carried out in a place where our embassy (consulate) abroad is blocked indoors or meets security and confidentiality requirements. Meetings involving confidential or important and sensitive matters should be held in our embassies and consulates abroad, institutions abroad or places that meet the security and confidentiality requirements. If you really need to carry it abroad or make, copy, use, or store confidential carriers abroad, you should strictly follow the relevant confidentiality management regulations of confidential carriers.

● What are the main confidentiality requirements for providing state secret information to the outside world?

No organization or individual may provide state secret information to the outside world without authorization. If it is necessary to provide, the scope should be determined, confidentiality review and necessary technical processing should be carried out, and the department with approval authority should be approved. In accordance with the intergovernmental confidentiality agreement or in accordance with relevant confidentiality laws and regulations, a confidentiality agreement should be signed with the recipient and required to assume the obligation of confidentiality.

. Confidentiality, violations of laws and discipline,

● What are the 12 serious violations stipulated in the Confidentiality Law?

The 12 serious violations stipulated in the Confidentiality Law are: illegally obtaining and holding state secret carriers; buying, selling, forwarding or privately destroying state secret carriers; passing state secret carriers through channels without confidentiality measures such as ordinary postal and express delivery; mailing and consigning state secret carriers out of the country, or carrying and passing state secret carriers out of the country without the approval of the relevant competent authorities; illegally copying, recording, and storing state secrets; involving state secrets in private communication and communication; Transfer state secrets in networking and other public information networks or wired and wireless communications without confidentiality measures; connect confidential computers and confidential storage devices to the Internet and other public information networks; exchange information between confidential information systems and the Internet and other public information networks without protective measures; use non-confidential computers and non-confidential storage devices to store and process state secret information; uninstall and modify the security technical programs and management programs of confidential information systems without security technology; and donate, sell, discard or convert confidential computers and confidential storage devices that have been removed from use without security technology.

● What administrative sanctions should civil servants be subject to leak state secrets and work secrets?

If civil servants leak state secrets and work secrets and cause adverse consequences, they will be given a warning, a demerit or a serious demerit; if the circumstances are serious, they will be given a punishment of demotion or dismissal; if the circumstances are serious, they will be given a punishment of dismissal.

● What administrative sanctions should the relevant personnel be subject to violation of the provisions of the Confidentiality Law? If the agency and unit violate the provisions of the Confidentiality Law and cause major leaks, the relevant authorities and units shall impose sanctions on the directly responsible supervisors and other directly responsible persons in accordance with the law; if the persons who do not apply the punishment shall be subject to the confidentiality administrative department urged their competent departments to deal with it. If matters that should be classified are not classified, or matters that should not be classified and confidential are classified, and serious consequences are caused, the relevant authorities and units shall impose sanctions on the directly responsible supervisors and other directly responsible persons in accordance with the law.

● What party discipline sanctions should Communist Party members be subject to leaking party and state secrets?

The Party’s Disciplinary Punishment Regulations stipulate that if secret documents or leak party and state secrets are lost, they will be given a warning or a serious warning; if the circumstances are serious, they will be given a punishment of revoking their party posts or staying at the party for probation; if the circumstances are serious, they will be given a punishment of expulsion from the party.If irresponsible in confidentiality work, resulting in major leakage accidents, causing or may cause major losses, the person responsible for the main leadership will be given a warning or a serious warning; if the person responsible for the main leadership will be given a punishment of removal from his party position.

Source: Lanshan Party Office