In order to further strengthen the construction of the public security team in the new era, forge the "four iron-like" public security iron army, and resolutely lay a solid ideological foundation for "loyalty to the Party, serving the people, fair law enforcement, and strict disc

open column

In order to further strengthen the construction of the public security team in the new era, forge the "four iron-like" public security iron army, and resolutely lay a solid ideological foundation for "loyalty to the party, serving the people, fair law enforcement, and strict discipline", "Safe Tongliao" specially opened the "Good Morning•Study Strengthening Police" column to guide all police officers to firmly establish the concept of learning-based, vigorously create a strong atmosphere in which all police officers love learning and advocate learning, and strive to build a learning-oriented police force, loyally guarding the safe northern border. This issue will bring you to study " Public Security Order for the People's Police of Public Security Organs " (Issue 6)

Section Zuozhong Banner Public Security Bureau Office organized police officers to study "Public Security Order for the People's Police of Public Security Organs"

Public Security Order for the People's Police of Public Security Organs

Chapter 6 Daily System

Section 1 Learning

Article 70 Public security organs should strengthen theoretical armament, strengthen political experience, ideological tempering, practical training, and professional training of public security police officers, and build a learning-oriented organ. Article 71 The learning content shall be scientifically arranged according to the situation, tasks and the needs of performing duties, mainly including political theory, policies and regulations, public security business, scientific and technological knowledge, police skills, etc.

Article 72 Public security organs should highlight the study of political theory, take Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era and the Party Central Committee’s decisions and arrangements on strengthening public security work in the new era as key learning contents, and ensure that all police officers have firm ideals and beliefs, build strong political loyalty, unify their will, unified actions, and move forward in a consistent manner.

Article 73 Public security organs shall regularly formulate learning plans, coordinate the time and form, and adopt a combination of collective learning and individual self-study to innovate learning methods, pay attention to learning effects, and check learning situations. Public security organs should organize concentrated learning at least once a month in accordance with work needs.

Section 2 Meeting Article 74 Public security organs should adhere to the principles of streamlining, efficient, strict economy, and practical results, and strictly control the number, time, scale and standards of meetings.

Article 75 Public security organs at or above the municipal level shall hold an annual work meeting every year to convey and study the relevant spirit and decision-making arrangements of the Party Central Committee and higher-level organs, and study and arrange key work tasks of public security organs at the same level. County-level public security organs hold at least once a year to sum up work, commend advanced people and deploy tasks in a timely manner. When the public security organs hold an annual work meeting, they may invite representatives of the people and relevant departments to participate according to work needs.

Article 76: Frontline practical units such as grassroots offices and teams shall establish a regular work meeting system, promptly sort out the situation, summarize and comment, and arrange work.

Article 77 Public security organs shall organize meetings strictly in accordance with regulations, strictly enforce meeting discipline, and shall not organize activities that are unrelated to the meeting, and shall not eat or stay beyond the standard. It is strictly prohibited to distribute gifts, souvenirs, and local specialties in any name. It is strictly prohibited to organize high-consumption entertainment, fitness, dining, and visiting scenic spots.

Section 3 Request for instructions and report

Article 78 Public security organs must conscientiously implement the provisions of the Regulations on Political and Legal Work of the Communist Party of China, the Regulations on Request for instructions and report on major matters, establish a strict reporting system, clarify the subject, scope, procedures and methods of reporting, etc., strictly enforce the political discipline of the Regulations, organizational discipline and work discipline, and ensure that the government orders and police orders are smooth. The work of requesting instructions and reporting should adhere to the political orientation, strictly enforce political discipline and political rules, and implement the requirements of political awareness in the entire process and all aspects of the work of requesting instructions and reporting; adhere to clear rights and responsibilities, and be responsible for reporting in a timely manner, and be responsible for preventing conflicts and issues; adhere to objective, truthful, realistic, realistic, and realistic, and put forward opinions and suggestions; adhere to standardized and orderly, and strictly follow the prescribed subject, scope, procedures and methods.

Article 79: Sub-level agencies shall promptly consult with superior agencies for problems other than the scope of their authority or cannot be solved by their unit. Request reports can be conducted in oral, written form according to the type of matter and the urgency. Both parties should keep records of matters that are reported in a verbal way.The main responsible person of the public security organ is the first responsible person and is responsible for the matters requesting instructions and reporting. The superior authorities shall carefully study and promptly respond to matters requested by the subordinate authorities. Article 80:

Request report shall be conducted step by step. In special circumstances, you can report beyond the level of instructions in accordance with relevant regulations. Units that accept dual leadership shall submit instructions to the superior authority with the main leadership responsibilities based on the nature and content of the matter, and at the same time copy and report to another superior authority. In special circumstances, you may not copy the newspaper.

Article 81 Lower-level agencies generally report to the superior agencies the basic situation of public security work and public security team building every six months. When the following circumstances occur, they shall promptly report to the superior authority within the prescribed time limit. No unit or individual may conceal, falsely report, late report or fail to report for any reason: (I) Cases (events) that endanger national security and affect social stability;

(II) Major and serious criminal cases;

(II) Major and serious mass incidents;

(IV) Major and serious accident disasters;

(5) Terrorist attacks occurred;

(VI) Major foreign-related emergencies occurred;

(VIII) Major major and serious foreign-related emergencies occurred;

(VIII) Major public opinion involving police;

(9) Major casualties occurred (sincere), major violations of discipline and law, official gun use cases and major cases (incidents) in which law enforcement authority was violated.

Section 4 Take leave and cancel leave

Article 82 The main responsible person of the public security organ shall ask for leave from the main responsible person of the superior organ in advance. If you take temporary leave due to an emergency, you should report it immediately in accordance with the regulations. In principle, the main responsible persons of the public security organs and responsible persons in charge of daily work (including dual-level leaders) cannot leave the region at the same time. The contents of the main responsible persons of the public security organs’ leave application include: leave applicants, reasons, time, location, etc., the responsible persons in charge of the work and their related information. If the itinerary changes during the leave period, a supplementary report should be made in a timely manner. If a leading cadre of a public security organ needs to leave the task place when performing tasks in another place, he shall promptly request leave from the relevant responsible persons of the unit or the task dispatching unit.

Article 83: Public security police officers who go out for work are not on duty during their working hours, shall ask for leave step by step and cancel leave on time. They shall not leave their post without permission without approval. When you cannot go to work on time due to injury, illness or other reasons, you should ask for leave in time.

Article 84 When a public security police performs special or emergency tasks, they are not allowed to take leave for irresistible reasons. Article 85: Personnel who request leave shall not return within the deadline without approval. If there are indeed special circumstances, the leave can be renewed after approval.

Article 86 For injured or sick persons, rest will be granted according to the conditions of the injury or disease or the hospital's diagnosis and treatment recommendations.

Article 87: Leave persons should keep communication open during the leave. Except for special circumstances, if recalled due to work needs, you should return to your job immediately.

Section 5 Work Handover

Article 88 When a public security police officer changes work, retires, resigns, or is dismissed or dismissed from public office, they shall hand over the work they are responsible for and the documents, materials, documents, weapons, ammunition, equipment, digital certificate , etc. in charge, clear out the confidential carrier, and perform management and supervision of the decryption period in accordance with regulations. The handover work should be completed before I leave my job. Before handing over, the leader of the unit shall designate the takeover. During the handover, both parties shall take the count in person, and if necessary, the unit leader shall preside over the presidency or ask the relevant departments such as discipline inspection and supervision to participate; after the handover, both parties shall sign the handover registration book (form).

Article 89 Before the main responsible persons of the public security organs or police types, departments and other leading cadres with economic responsibilities handle the transfer, transfer, dismissal, resignation, retirement, and adjustment of division of labor, the audit department shall audit the performance of their economic responsibilities during their tenure in accordance with the relevant provisions of the economic responsibility audit of leading cadres of .

Article 90 When a police officer leaves his post for a short period of time due to business trips, study and training, or vacation, he shall arrange his responsible work properly.

Section 6 Seal Management

Article 91 The engraving of seals (including electronic seals) of public security organs shall be strictly approved in accordance with regulations and engraved in designated institutions. Article 92 of

newly engraved seals shall be kept at the issuing authority and can only be activated after filing. Article 93: Use of seals (samps) shall be strictly followed in accordance with the prescribed authority, and shall strictly follow the approval and registration procedures, and strictly supervise and manage the use of seals. It is strictly forbidden to use official seals for personal gain, and it is strictly forbidden to stamp on blank documents or letters .

Article 94: Seals (models) shall be stored in a counter and kept by a dedicated person. If the seal (model) is lost, the relevant units should be reported immediately, and the responsibility should be held seriously. Article 95: Seals that have been approved for invalidation shall be registered and submitted to the issuing authority for destruction. The seal that has been stopped shall be handed over to the issuing authority for processing.

Section 7 Document Management

Article 96 Public security police shall use the unified People's Police Certificate in accordance with regulations. During work, people's police certificates should generally be brought.

Article 97 Public security organs shall strictly enforce the scope of issuance of people's police certificates and strictly prohibit the issuance of people's police certificates to persons who are not in the identity of people's police. Those who lose their qualifications for distribution shall be recovered and confiscated in a timely manner.

Article 98 The People's Police Certificate is uniformly supervised and manufactured by the Ministry of Public Security in accordance with regulations and implemented hierarchical management.

Section 8 Confidentiality Management

Article 99 Public security organs shall establish a confidentiality work system, strengthen confidentiality publicity and education, strengthen supervision and management, strictly enforce confidentiality discipline requirements, implement confidentiality work responsibilities, and ensure that state secrets and police work secrets are absolutely safe.

Article 100 Public security organs shall strictly follow the national confidentiality management regulations and accurately define key departments and departments, as well as confidential positions and scope of confidential personnel.

Article 101 The political and industrial departments of the public security organs shall, in conjunction with the confidentiality department, conduct confidentiality reviews on personnel who are intended to be appointed (employed) in confidentiality positions in accordance with the principle of "review first and then use, and strictly control", and regularly organize re-examinations on confidentiality personnel on duty. If confidential persons who go abroad for business or private purposes shall be strictly approved in accordance with management authority and prescribed procedures. Under normal circumstances, core confidential personnel will not be approved for private travel.

Article 102 Public security organs shall strengthen daily supervision of confidential personnel, strictly implement confidentiality commitment requirements and reporting system for major matters, and strengthen the management of confidential personnel leaving their posts and leaving their jobs and deconfidential periods.

Article 103: In the process of producing, transmitting, copying, using, storing and destroying confidential information or carriers, public security police shall strictly implement the national confidentiality management regulations to ensure that confidential information or carriers are kept confidential and secure. Confidential carriers refer to paper media carriers, electromagnetic media carriers, optical discs and other items that record and store state secret information and police secret information in text, data, symbols, graphics, images, sounds, etc.

Article 104 Confidential carriers that need to be archived shall be filed in accordance with the requirements; confidential carriers that do not need to be archived shall be conscientiously followed by the inventory, registration, and approval procedures and then destroyed in accordance with regulations.

Article 105 Public security police shall implement the following confidentiality rules:

(I) Do not tell secrets that should not be told;

(II) Do not ask for secrets that should not be known;

(III) Do not read secrets that should not be seen;

(IV) Do not involve secrets in private interactions or public works;

(V) Do not read or talk about secrets in non-confidential places;

(VI) Do not publish or pass secrets on social media;

(VII) Do not record, copy, shoot, excerpt, or collect secrets without permission;

(VII) Do not carry confidential carriers to public places or visit relatives and friends without confidentiality;

(IX) Do not use communication equipment, ordinary postal services and computer Internet without confidentiality measures to transmit secrets.

Article 106 When using computer information systems and information equipment, the following regulations should be strictly abide by:

(I) Confidential computers are strictly prohibited from connecting to the public security information network and the Internet and other public information networks, and public security information network computers are strictly prohibited from connecting to the Internet and other public information networks;

(II) Confidential computers are not allowed to connect to local telephones and public security special line fax machines or multi-functional all-in-one machines with fax functions, and must not install wireless network cards , wireless mouse , wireless keyboard and other devices with wireless interconnection functions, and must not install audio and video acquisition devices such as cameras and microphones;

(III) Public security information network computers are not allowed to install wireless network cards, wireless mice, wireless keyboards and other devices with wireless interconnection functions, and must not be used to keep confidential key departments and locations of public security information. Computers in the Internet shall not install audio and video collection devices such as cameras and microphones;

(IV) Internet computers used in confidential places are strictly prohibited from connecting to the Internet through wireless means, cameras and microphones are strictly prohibited from installing audio and video collection devices such as cameras and microphones, and mobile hotspots are strictly prohibited;

(V) Use of Internet computers and mobile police terminals connected to the Internet shall not use state secret information and police work secret information, and mobile police terminals connected to the Internet shall not connect illegally with confidential information equipment and public security information network computers;

(VI) Computers in the Internet and public security information network computers shall use mobile storage media and import and export equipment that meet confidentiality requirements;

(VII) Computers in the Internet and public security information network computers shall adopt identity identification measures that meet confidentiality requirements. Public security police shall not hand over the confidential computer keys to others for use without authorization, and shall not hand over the digital certificate of the Public Security Information Network computer for others for use;

(eight) If you carry a confidential computer and a computer for public security information network out, you shall be approved by the supervisor of the unit and complete the registration and filing procedures;

(9) The maintenance of secret information equipment involving state secrets and police work shall be carried out within the unit, and a special person shall be appointed to supervise the entire process. Maintenance personnel are strictly prohibited from reading or copying confidential sensitive information. If it is necessary to send it out for repair, the storage parts must be removed. When the computers involved in confidentiality or the computers of the Public Security Information Network are changed or scrapped, the storage components shall be removed first, and the removed storage components shall be processed in accordance with the relevant regulations of the confidential carrier;

(10) Confidential computers with determined confidentiality levels shall not process, store, or transmit information higher than the determined confidentiality level;

(11) The computers of the Public Security Information Network shall not process, store, or transmit content involving state secrets;

(12) The confidentiality security technical programs and management programs of the computer information system shall not be uninstalled or modified without authorization;

(13) The storage media and printers, fax machines, and scanners shall not be used intersecting between confidentiality computers, public security information network computers, and Internet computers. All-in-one computers and other devices with storage functions;

(14) Confidential computers shall be marked with the highest level of confidentiality, number, responsible person and special logos for the storage and processing of information. The computers of the public security information network shall be marked with the logos for the public security information network and prohibited processing of state secret information. Internet computers shall be marked with the logos for the Internet and prohibited processing of state secret information and police work secret information;

(15) shall not exceed the authority to access public security information resources, nor shall the disclosure of citizens' personal information and other information that is not suitable for disclosure to the public;

(16) Public security organs shall retain application system access log information, and no unit or individual shall delete or tamper with audit log information without authorization. Article 107 The public security organs and the persons responsible for confidentiality shall accurately determine the confidentiality in strict accordance with the prescribed confidentiality authority and procedures, and fully mark the confidentiality level and confidentiality period.

Article 108 The information disclosure of public security organs should adhere to the principles of "review first, then disclosure" and "one matter, one review", implement the confidentiality review and approval procedures, strictly register website information release and registration, and organize website confidentiality inspections regularly.Article 109: If the public security organs use WeChat groups, QQ groups, Weibo , WeChat public accounts and other online social media to carry out their work, they should establish and improve confidentiality management systems.

Article 110 If a leak is found, it shall immediately report to the confidentiality department of the unit, organize investigation and punishment in a timely manner, and report it in accordance with regulations.

Section 9 Archive Management

Article 111 Public security organs shall establish and improve archive work systems, strictly regulate management, and maintain the authenticity, integrity, availability and security of archives.

Article 112 All archives formed by the public security organs in their work that fall within the scope of archives shall be centrally managed by the archives department. No department or individual may take it for themselves or refuse to file it. The personnel files of cadres shall be managed uniformly in accordance with the authority of cadre management, and the organization and personnel departments of the corresponding organs or units shall be responsible for unified management.

Article 113 In accordance with the principle of "who forms and who archives", timely collect and organize documents and materials included in the archive scope, and strictly transfer them for archiving according to regulations.

Article 114 Public security organs shall strengthen the collection and archiving of documents and materials formed in the process of carrying out special actions, holding important meetings and activities, handling major cases (events), and undertaking the construction of major construction projects of .

Article 115 Public security organs shall establish archive rooms that meet national standards, equip archive security protection facilities, regularly inspect archive storage, and ensure the security and confidentiality of archive entities and information.

Article 116 Public security organs shall strengthen the management of file borrowing and determine the corresponding borrowing scope and approval procedures based on the characteristics and confidentiality of the file.

Article 117 Public security police shall strictly abide by the regulations on file borrowing and bear the responsibility of custody and protection of the borrowed files, and shall not alter, tear or forge files. Do not lend files to others without authorization.

Article 118: Public security files shall not be destroyed without identification.

Source: China Police Network

Editor: Wang Jue

Review: Wang Qiang

Producer: Zhang Wei

Please indicate the source

when reprinting