Submission Email: 2854183000@qq.com
Editor's note: Not long ago, the Ministry of Public Security issued a new version of " Public Security Ordinance for the Internal Affairs of People's Police of Public Security Organs ". In order to strengthen the study of regulations, improve the management level of the public security organs, and enhance the image of the people's police, Ping An Tianshan WeChat public account publishes the content of regulations in batches for everyone to learn.
The Ministry of Public Security Order of the People's Republic of China
No. 161
The "Internal Affairs Regulations of the People's Police of Public Security Organs" has been reviewed and approved at the 6th Ministry of Public Security Meeting on April 9, 2021. It is now announced and will come into effect on the date of its promulgation.
department head Zhao Kezhi
October 28, 2021
Public Security Ordinance of the People's Police of Public Security Organs
Chapter 1 General
Chapter 2 Ceremony
Chapter 3 Internal Relations
Chapter 4 Police appearance and discipline
Chapter 5 Police etiquette
Chapter 6 Daily System
Chapter 7 Internal Affairs Settings
Chapter 8 Office Order
Chapter Ninth Reception of the masses
Chapter Ten On duty
Chapter 11 Emergency response
Chapter 12 Equipment financial management
Chapter 13 Security prevention
Chapter 14 Health protection
Chapter 15 Police flag Police badge Police song Police festival
Chapter 16 Read Police
Chapter 17 Attachment Then
Chapter 6 Daily System
Section 1 Learning
Article 70 Public security organs should strengthen theoretical armament, strengthen the political experience, ideological tempering, practical training, and professional training of public security police officers, and build a learning-oriented organ.
Article 71 Learning content should be scientifically arranged according to the situation, tasks and the needs of performing duties, mainly including political theory, policies and regulations, public security business, scientific and technological knowledge, police skills, etc.
Article 72 Public security organs should highlight the study of political theory, take Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era and the decisions and arrangements of the Party Central Committee on Strengthening Public Security Work in the New Era as key learning contents, and ensure that all police officers have firm ideals and beliefs, build strong political loyalty, unify their will, unified actions, and move forward in a consistent manner.
Article 73 Public security organs shall regularly formulate learning plans, coordinate the time and form, and adopt a combination of collective learning and individual self-study to innovate learning methods, pay attention to learning effects, and check learning situations.
Public security organs should organize concentrated learning at least once a month in accordance with work needs.
Section 2 Meeting
Article 74 Public security organs should adhere to the principles of streamlining, efficient, strict economizing, and practical results, and strictly control the number, time, scale and standards of meetings.
Article 75 Public security organs at or above the municipal level shall hold an annual work meeting every year to convey and study the relevant spirit and decision-making arrangements of the Party Central Committee and the superior organs, and study and arrange key work tasks of the public security organs at the same level.
County-level public security organs hold at least once a year to sum up work, commend advanced people and deploy tasks in a timely manner.
When the public security organs hold an annual work meeting, they may invite representatives of the people and relevant departments to participate according to work needs.
Article 76 Grassroots office teams and other front-line practical units shall establish a regular work meeting system, promptly sort out the situation, summarize comments, and arrange work.
Article 77 Public security organs shall organize meetings strictly in accordance with regulations, strictly enforce meeting discipline, and shall not organize activities that are unrelated to the meeting, and shall not eat or stay beyond the standard. It is strictly prohibited to distribute gifts, souvenirs, and local specialties in any name. It is strictly prohibited to organize high-consumption entertainment, fitness, dining, and visiting scenic spots.
Section 3 Request for instructions and report
Article 78 Public security organs must conscientiously implement the provisions of Regulations on Political and Legal Work of the Communist Party of China, Regulations on Request for instructions and report on major matters, establish a strict reporting system, clarify the subject, scope, procedures and methods of reporting, etc., strictly enforce the political discipline of the party, organizational discipline and work discipline, and ensure that the government orders and police orders are smooth.
The work of asking for instructions and reporting should adhere to political orientation, strictly enforce political discipline and political rules, and implement the requirements of political awareness in the entire process and all aspects of the work of asking for instructions and reporting; insist on clear rights and responsibilities, and be responsible for reporting in a timely manner, and be responsible for preventing conflicts and issues; adhere to objective, truthful, realistic, realistic, and realistic, and put forward opinions and suggestions; adhere to standardized and orderly, and strictly follow the prescribed subject, scope, procedures and methods.
Article 79 The subordinate agencies shall promptly consult with the superior agencies for problems that are not subject to the scope of their authority or cannot be solved by the unit. Request reports can be conducted in oral, written form according to the type of matter and the urgency. Both parties should keep records of matters that are reported in a verbal way.
The main responsible person of the public security organ is the first responsible person and is responsible for the matters requesting instructions and reporting.
The superior authority shall carefully study and promptly respond to matters requested by the subordinate authority.
Article 80 Request and Instruction Report shall be carried out step by step. In special circumstances, you can report beyond the level of instructions in accordance with relevant regulations.
Units that accept dual leadership shall submit instructions to the superior authority with the main leadership responsibilities according to the nature and content of the matter, and at the same time copy the other superior authority. In special circumstances, you may not copy the newspaper.
Article 81 Lower-level agencies generally report to the superior agencies the basic situation of public security work and public security team building every six months.
shall promptly report to the superior authority within the prescribed time limit when the following circumstances occur. No unit or individual shall conceal, falsely report, late or fail to report for any reason:
(I) Cases (events) that endanger national security and affect social stability;
(II) Major and serious criminal cases;
(II) Major and serious mass incidents occur;
(IV) Major and serious accident disasters occur; ;
(V) Terrorist attacks occurred;
(VI) Major foreign-related emergencies occurred;
(VIII) Major major and serious foreign-related emergencies occurred;
(VIII) Major public opinion involving police;
(Nine) Public safety incidents (sincere), major violations of discipline and law, official gun use cases (incidents) and major cases (incidents) in which law enforcement authority was violated.
Section 4 Take leave and cancel leave
Article 82 The main responsible person of the public security organ shall ask for leave from the main responsible person of the superior organ in advance. If you take temporary leave due to an emergency, you should report it immediately in accordance with the regulations.
The main responsible persons of the public security organs and responsible persons in charge of daily work (including dual-level leaders) cannot leave the region at the same time.
The main responsible persons of the public security organs take leave include: leave persons, reasons, time, location, etc., the responsible persons in charge of the work and their related information. If the itinerary changes during the leave period, a supplementary report should be made in a timely manner.
If a leading cadre of a public security organ needs to leave the task place for execution in another place, he shall promptly request leave from the relevant responsible person of the unit or the task dispatch unit.
Article 83 Public security police officers should take leave step by step and cancel leave on time without approval. They are not allowed to leave without authorization. When you cannot go to work on time due to injury, illness or other reasons, you should ask for leave in time.
Article 84 When a police officer performs special or emergency tasks, he or she shall not ask for leave for irresistible reasons.
Article 85 Personnel who ask for leave shall not return within the deadline without approval. If there are special circumstances, the leave may be renewed after approval. Article 86 of
For injured or sick persons, they shall be allowed to rest according to the regulations based on the injury, disease situation or hospital diagnosis and treatment recommendations.
Article 87 People who ask for leave should keep communication open during the leave. Except for special circumstances, if recalled due to work needs, you should return to your job immediately.
Section 5 Work Handover
Article 88 When a work change, retire, resign or be dismissed or dismissed from public office, the police shall transfer the work they are responsible for and the documents, materials, documents, weapons, ammunition, equipment, digital certificate , etc. in charge, clear out the confidential carrier, and perform management and supervision of the decryption period in accordance with regulations. The handover work should be completed before I leave my job. Before
is handed over, the leader of the unit shall designate the takeover. During the handover, both parties shall take the count in person, and if necessary, the unit leader shall preside over the presidency or ask the relevant departments such as discipline inspection and supervision to participate; after the handover, both parties shall sign the handover registration book (form).
Article 89 Before the main responsible persons of the public security organs or police types, departments and other leading cadres with economic responsibilities handle the transfer, transfer, dismissal, resignation, retirement, and adjustment of division of labor, the audit department shall audit the performance of their economic responsibilities during their tenure in accordance with the relevant provisions of Economic Responsibility Audit of leading cadres of .
Article 90 When a police officer leaves his post for a short period of time due to business trips, study and training, or vacation, etc., he shall arrange the work he is responsible for.
Section 6 Seal Management
Article 91 The engraving of seals (including electronic seals) of the public security organs shall be strictly approved in accordance with regulations and engraved in designated institutions. Article 92 of
newly engraved seals in shall be kept at the manufacturing authority and can only be activated after filing.
Article 93: The use of seals (samps) shall be strictly followed in accordance with the prescribed authority, strictly follow the approval and registration procedures, and strictly supervise and manage the use of seals. It is strictly forbidden to use official seals for personal gain, and it is strictly forbidden to stamp on blank documents or letters .
Article 94 seals (models) should be stored in a counter and kept by a dedicated person. If the seal (model) is lost, the relevant units should be reported immediately, and the responsibility should be held seriously.
Article 95 The seal that has been approved for invalidation shall be registered and submitted to the issuing authority for destruction. The seal that has been stopped shall be handed over to the issuing authority for processing.
Section 7 Document Management
Article 96 Public security police shall use the unified people's police certificate in accordance with regulations. During work, people's police certificates should generally be brought.
Article 97 Public security organs shall strictly enforce the scope of issuance of people's police certificates and strictly prohibit the issuance of people's police certificates to persons who are not in the identity of people's police.
For those who lose their qualifications to allot, their people's police certificate shall be recovered and confiscated in a timely manner.
Article 98 People's Police Certificate is uniformly supervised and implemented in accordance with regulations by the Ministry of Public Security and implemented hierarchical management.
Section 8 Confidentiality Management
Article 99 Public security organs shall establish a confidentiality work system, strengthen confidentiality publicity and education, strengthen supervision and management, strictly enforce confidentiality discipline requirements, implement confidentiality work responsibilities, and ensure that state secrets and police work secrets are absolutely safe.
Article 100 Public security organs shall strictly follow the national confidentiality management regulations and accurately define key departments and departments, as well as confidential positions and scope of confidential personnel.
Article 101 The political and industrial departments of the public security organs shall, in conjunction with the confidentiality department, conduct confidentiality reviews on personnel who are intended to be appointed (employed) in confidentiality positions in accordance with the principle of "review first and then use, strictly control", and regularly organize re-examinations of confidential personnel on duty.
If confidential persons go abroad for business or private purposes, strict approval shall be implemented in accordance with management authority and prescribed procedures. Under normal circumstances, core confidential personnel will not be approved for private travel.
Article 102 Public security organs shall strengthen daily supervision of confidential personnel, strictly implement confidentiality commitment requirements and reporting system for major matters, and strengthen the management of confidential personnel leaving their posts and leaving their jobs and deconfidential periods.
Article 103 In the process of producing, transmitting, copying, using, saving and destroying confidential information or carriers, public security police shall strictly implement the national confidentiality management regulations to ensure that confidential information or carriers are kept confidential and secure.
Confidential carrier refers to various items such as paper medium carriers, electromagnetic medium carriers, CDs, etc. that record and store state secret information and police secret information in text, data, symbols, graphics, images, sounds, etc.
Article 104 Confidential carriers that require shall be archived in accordance with the requirements; confidential carriers that do not require archiving shall be conscientiously followed by the inventory, registration, and approval procedures and then destroyed in accordance with the regulations.
Article 105 Public security police shall implement the following confidentiality rules:
(I) Do not tell secrets that should not be told;
(II) Do not ask for secrets that should not be known;
(III) Do not read secrets that should not be read;
(IV) Do not involve secrets in private interactions or public works;
(V) Do not read in non-confidential places , Talk about secrets;
(VI) Do not publish or pass secrets on social media;
(VIII) Do not record, copy, shoot, excerpt or collect secrets without authorization;
(VIII) Do not carry confidential carriers to public places or visit relatives and friends without authorization;
(IX) Do not use communication equipment, ordinary postal services and computer Internet without confidentiality measures to transmit secrets.
Article 106 When using computer information systems and information equipment, the following regulations shall be strictly abide by:
(I) Confidential computers are strictly prohibited from connecting to the public security information network and the Internet and other public information networks, and public security information network computers are strictly prohibited from connecting to the Internet and other public information networks;
(II) Confidential computers are not allowed to connect to local telephones and public security special line fax machines or multi-functional all-in-one machines with fax functions, and must not install wireless network cards , wireless mouse , wireless keyboard and other devices with wireless interconnection functions, and must not install cameras, microphones and other audio and video acquisition devices;
(III) Public security information network computers are not allowed to install wireless network cards, wireless mice, wireless keyboards and other devices with wireless interconnection functions, and must not install public departments and locations with wireless interconnection functions. Security Information Network computers are not allowed to install audio and video collection devices such as cameras and microphones;
(IV) Internet computers used in confidential places are strictly prohibited from connecting to the Internet through wireless means, cameras and microphones are strictly prohibited from installing audio and video collection devices such as cameras and microphones, and mobile hotspots are strictly prohibited;
(V) The use of Internet computers and mobile police terminals connected to the Internet are strictly prohibited from processing, storing, transmitting, and publishing state secret information and police work secret information. Mobile police terminals connected to the Internet are not allowed to connect illegally with confidential information equipment and public security information network computers;
(VI) Confidential computers and public security information network computers shall use mobile storage media and import and export equipment that meet confidentiality requirements;
(VII) Confidential computers and public security information network computers shall take identity identification measures that meet confidentiality requirements. Public security police shall not hand over the confidential computer keys to others for use without authorization, and shall not hand over the digital certificate of the Public Security Information Network computer for others for use;
(eight) If you carry a confidential computer and a computer for public security information network out, you shall be approved by the supervisor of the unit and complete the registration and filing procedures;
(9) The maintenance of secret information equipment involving state secrets and police work shall be carried out within the unit, and a special person shall be appointed to supervise the entire process. Maintenance personnel are strictly prohibited from reading or copying confidential sensitive information. If it is necessary to send it out for repair, the storage parts must be removed.When the computers involved in confidentiality or the computers of the Public Security Information Network are changed or scrapped, the storage components shall be removed first, and the removed storage components shall be processed in accordance with the relevant regulations of the confidential carrier;
(10) Confidential computers with determined confidentiality levels shall not process, store, or transmit information higher than the determined confidentiality level;
(11) The computers of the Public Security Information Network shall not process, store, or transmit content involving state secrets;
(12) The confidentiality security technical programs and management programs of the computer information system shall not be uninstalled or modified without authorization;
(13) The storage media, printers, fax machines, and scanners shall not be used intersecting between confidentiality computers, public security information network computers, and Internet computers All-in-one computers and other devices with storage functions;
(14) Confidential computers shall be marked with the highest level of storage and processing information, the number, responsible person and the identification of confidential computers for storage and processing, the computers of the public security information network shall be marked with the identification of the public security information network and prohibited processing of state secret information, and the Internet computers shall be marked with the identification of the Internet and prohibited processing of state secret information and police work secret information;
(15) shall not exceed the authority to access public security information resources, nor shall the disclosure of citizens' personal information and other information that is not suitable for disclosure to the public;
(16) Public security organs shall retain application system access log information, and no unit or individual shall delete or tamper with audit log information without authorization.
Article 107 public security organs and confidentiality responsible persons shall strictly determine the confidentiality in accordance with the prescribed confidentiality authority and procedures, and fully mark the confidentiality level and confidentiality period.
Article 108 Information disclosure of public security organs should adhere to the principles of "review first, then disclosure" and "one matter, one review", implement the confidentiality review and approval procedures, strictly register website information release and registration, and organize website confidentiality inspections regularly.
Article 109 If the public security organs use WeChat groups, QQ groups, Weibo , WeChat public accounts and other online social media to carry out their work, they should establish and improve confidentiality management systems.
Article 110 If a leak clue or situation is found in , it shall immediately report to the confidentiality department of the unit, organize investigation and punishment in a timely manner, and report it in accordance with regulations.
Section 9 Archive Management
Article 111 Public security organs shall establish and improve archive work systems, strictly regulate management, and maintain the authenticity, integrity, availability and security of archives.
Article 112 All archives formed by the public security organs in their work that fall within the scope of archives shall be centrally managed by the archives department. No department or individual may take it for themselves or refuse to file it.
Cadre personnel files shall be managed uniformly according to the cadre management authority. The organization and personnel departments of the corresponding organs or units shall be responsible for unified management.
Article 113 In accordance with the principle of "who forms, who archives", timely collects and organizes documents and materials included in the archive scope and strictly transfers them for archiving in accordance with regulations.
Article 114 Public security organs shall strengthen the collection and archive of documents and materials in the process of carrying out special actions, holding important meetings and activities, handling major cases (events), and undertaking the construction of major construction projects of and .
Article 115 Public security organs shall establish archive rooms that meet national standards, equip archive security protection facilities, regularly inspect archive storage, and ensure the security and confidentiality of archive entities and information.
Article 116 Public security organs shall strengthen the management of file borrowing and determine the corresponding borrowing scope and approval procedures based on the characteristics and confidentiality of the file.
Article 117 Public security police shall strictly abide by the regulations on file borrowing and bear the responsibility of custody and protection of the borrowed files, and shall not alter, tear or forge files. Do not lend files to others without authorization.
Article 118 Public security files shall not be destroyed without identification.
Editing丨He Ling
Review丨Xiao
Issuance丨Lan Zedong