In order to thoroughly study, publicize and implement the newly revised " Public Security Ordinance for People's Police of Public Security Organs " (hereinafter referred to as the "Internal Affairs Ordinance"), we will effectively strengthen the institutionalization and standardization of the internal affairs construction of public security organs in the province, and strive to forge the "four iron-like" high-quality and strong Longyuan Public Security Iron Army, and welcome the successful convening of the 20th National Congress of the Communist Party of China and the 14th Provincial Party Congress with practical actions. @Gansu Public Security WeChat public account has opened a column of "Regulations Classroom" and has successively pushed forward knowledge points and test questions related to "Internal Affairs Regulations" for reference, learning and practice by the civilian and auxiliary police officers in the province.
Chapter 5 Police etiquette
● Article 61 Public security police officers should pay attention to internal etiquette and fully reflect the unity, friendship and mutual respect within the public security organs.
● Article 62 The salute of the police is divided into a hand-raising ceremony and a attention-taking ceremony. You can usually give a hand tribute when you are performing a mission or carrying weapons and equipment. You can give a hand tribute to your attention when you are performing a task or carrying weapons and equipment. When wearing casual clothes, you usually give a polite manner.
● Article 63 When a police officer dresses in front of him, he shall take the initiative to salute him. After receiving the gift, the leaders of the superior organs should take the initiative to return the gift.
● Article 64 When the police in line are in charge of inspection and guidance from superiors, the leading personnel shall take the initiative to salute and report to their superiors and other personnel shall salute attentively.
● Article 65: When a public security police officer meets or meets a leader who is frequently in contact with the unit, or when there is inconvenient salute, he or she shall not raise his hand and give him or her. He or she shall take the initiative to greet him or her. The leader shall take the initiative to return the gift.
● Article 66 When the public security police hand over the post, they shall salute each other; when the public security police from different units contact each other on duty, they shall greet each other.
● Article 67 When a public security police officer contacts the people, party and government staff or foreign guests due to work needs, they shall take the initiative to salute or salute.
● Article 68 When raising the national flag or police flag, the police officers present shall stand attentively in front of the national flag and police flag, raise their hands and salute in casual clothes.
● Article 69 When playing (sing) the national anthem of the People's Republic of China and the Chinese People's Police Song, the public security police present shall stand attentively, behave solemnly, and stand up to pay tribute.
Chapter 6 Daily System
Section 1 Learning
● Article 70 Public security organs should strengthen theoretical armament, strengthen the political experience, ideological tempering, practical training, and professional training of public security police officers, and build a learning-oriented organ.
● Article 71 The learning content should be scientifically arranged according to the situation, tasks and the needs of performing duties, mainly including political theory, policies and regulations, public security business, scientific and technological knowledge, police skills, etc.
● Article 72 Public security organs should highlight the study of political theory, take Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era and the decisions and arrangements of the Party Central Committee on Strengthening Public Security Work in the New Era as key learning contents, to ensure that all police officers have firm ideals and beliefs, build strong political loyalty, unify their will, unified actions, and move forward in a consistent manner.
● Article 73 Public security organs shall regularly formulate learning plans, coordinate the time and form, and adopt a combination of collective learning and individual self-study to carry out, innovate learning methods, pay attention to learning effects, and check learning situations.
Public security organs should organize concentrated learning at least once a month in accordance with work needs.
Section 2 Meeting
● Article 74 Public security organs should adhere to the principles of streamlining, efficient, strict economy, and practical results, and strictly control the number, time, scale and standards of meetings.
● Article 75 Public security organs at or above the municipal level shall hold an annual work meeting every year to convey and study the relevant spirit and decision-making arrangements of the Party Central Committee and higher-level organs, and study and arrange key work tasks of public security organs at the same level.
County-level public security organs hold at least once a year to sum up work, commend advanced people and deploy tasks in a timely manner.
When the public security organs hold an annual work meeting, they may invite representatives of the people and relevant departments to participate according to work needs.
● Article 76: Frontline practical units such as grassroots offices and teams shall establish a regular work meeting system, promptly sort out the situation, summarize and comment, and arrange work.
● Article 77 Public security organs shall organize meetings strictly in accordance with regulations, strictly enforce meeting discipline, and shall not organize activities that are not related to the meeting, and shall not eat or stay beyond the standard. It is strictly prohibited to distribute gifts, souvenirs, and local specialties in any name. It is strictly prohibited to organize high-consumption entertainment, fitness, dining, and visiting scenic spots.
Section 3 Request for instructions and report
● Article 78 Public security organs must conscientiously implement the provisions of Regulations on Political and Legal Work of the Communist Party of China, Regulations on Request for instructions and report on major matters, establish a strict reporting system, clarify the subject, scope, procedures and methods of reporting, etc., strictly enforce the political discipline of the party, organizational discipline and work discipline, and ensure that the government orders and police orders are smooth.
Request and reporting work should adhere to political orientation, strictly enforce political discipline and political rules, and implement political requirements in the entire process and all aspects of the work of requesting and reporting; insist on clear rights and responsibilities, and be responsible for reporting in a timely manner, and prevent conflicts and issues from being submitted; adhere to objective, truthful, realistic, realistic, and realistic, and put forward opinions and suggestions; adhere to standardized and orderly, and strictly follow the prescribed subject, scope, procedures and methods.
● Article 79: Sub-level agencies shall promptly consult with superior agencies for problems other than the scope of their authority or cannot be solved by their unit. Request reports can be conducted in oral, written form according to the type of matter and the urgency. Both parties should keep records of matters that are reported in a verbal way.
The main responsible person of the public security organ is the first responsible person and is responsible for the matters requesting instructions and reporting.
The superior authorities shall carefully study and promptly respond to matters requested by subordinate authorities.
● Article 80 The report of request shall be carried out step by step. In special circumstances, you can report beyond the level of instructions in accordance with relevant regulations.
Units that accept dual leadership shall submit instructions to the superior authority with the main leadership responsibilities according to the nature and content of the matter, and at the same time copy the other superior authority. In special circumstances, you may not copy the newspaper.
● Article 81 Lower-level agencies generally report to the superior agencies the basic situation of public security work and public security team building every six months.
When the following circumstances occur, they shall promptly report to the superior authority within the prescribed time limit. No unit or individual may conceal, falsely report, late report or fail to report for any reason:
(I) Cases (events) that endanger national security and affect social stability;
(II) Major and serious criminal cases;
(II) Major and serious mass incidents occur;
(IV) Major and serious accident disasters occur; ;
(V) Terrorist attacks occurred;
(VI) Major foreign-related emergencies occurred;
(VIII) Major major natural disasters occurred and epidemic;
(VIII) Major police-related public opinion occurred;
(VIII) Major public opinion occurred;
(Nine) Public security police casualties occurred (sincere), major violations of discipline and law, official gun use cases (incidents) and major cases (incidents) in which law enforcement authority was violated.
Section 4 Take leave and save leave
● Article 82 When the main responsible person of the public security organ leaves the area, he shall request leave from the main responsible person of the superior organ in advance. If you take temporary leave due to an emergency, you should report it immediately in accordance with the regulations.
The main responsible persons of the public security organs and responsible persons in charge of daily work (including dual-level leaders) cannot leave the region at the same time in principle.
The main responsible persons of the public security organs take leave include: leave persons, reasons, time, location, etc., the responsible persons in charge of the work and their related information. If the itinerary changes during the leave period, a supplementary report should be made in a timely manner.
If a leading cadre of a public security organ needs to leave the task place for execution in another place, he shall promptly request leave from the relevant responsible person of the unit or the task dispatch unit.
● Article 83: When public security police go out for work hours, they shall ask for leave step by step and cancel leave on time. They shall not leave their post without approval. When you cannot go to work on time due to injury, illness or other reasons, you should ask for leave in time.
● Article 84 When a public security police performs special or emergency tasks, they are not allowed to take leave for irresistible reasons.
● Article 85 Personnel who request leave shall not return within the deadline without approval. If there are special circumstances, the leave may be renewed after approval.
● Article 86 For injured or sick persons, rest shall be granted according to the injury, disease condition or hospital diagnosis and treatment recommendations.
● Article 87: Leave persons should keep communication open during the leave. Except for special circumstances, if recalled due to work needs, you should return to your job immediately.
Section 5 Work Handover
● Article 88 When a public security police officer changes work, retires, resigns, or is dismissed or dismissed from public office, he shall hand over the work situation he is responsible for and the documents, materials, documents, weapons, ammunition, equipment, digital certificate , etc. in charge, clears the confidential carrier, and performs management and supervision of the decryption period in accordance with regulations. The handover work should be completed before I leave my job. Before the handover of
, the leader of the unit shall designate the takeover. During the handover, both parties shall take the count in person, and if necessary, the unit leader shall preside over the presidency or ask the relevant departments such as discipline inspection and supervision to participate; after the handover, both parties shall sign the handover registration book (form).
● Article 89 Before the main responsible persons of the public security organs or police types, departments and other leading cadres with economic responsibilities handle the transfer, transfer, dismissal, resignation, retirement, and adjustment of division of labor, the audit department shall audit the performance of their economic responsibilities during their tenure in accordance with the relevant provisions of the economic responsibility audit of the leading cadres of .
● Article 90 When a public security police leave their posts for a short period of time due to business trips, study and training, or vacation, etc., they shall arrange their responsible work properly.
Section 6 Seal Management
● Article 91 The engraving of seals (including electronic seals) of the public security organs shall be strictly approved in accordance with regulations and engraved in designated institutions.
● Article 92: Newly engraved seals should be kept at the issuing authority and can only be activated after filing.
● Article 93: The use of seals (samps) shall be strictly followed in accordance with the prescribed authority, strictly follow the approval and registration procedures, and strictly supervise and manage the use of seals. It is strictly forbidden to use official seals for personal gain, and it is strictly forbidden to stamp on blank documents or letters .
● Article 94 The seal (model) shall be stored in a counter and kept by a dedicated person. If the seal (model) is lost, the relevant units should be reported immediately, and the responsibility should be held seriously.
● Article 95: Seals that have been approved for invalidation shall be registered and submitted to the issuing authority for destruction. The seal that has been stopped shall be handed over to the issuing authority for processing.
Section 7 Document Management
● Article 96 Public security police shall use the unified people's police certificate in accordance with regulations. During work, people's police certificates should generally be brought.
● Article 97 Public security organs shall strictly enforce the scope of issuance of people's police certificates and strictly prohibit the issuance of people's police certificates to persons who are not in the identity of people's police.
For those who lose their qualifications to allocate, their people's police certificate shall be recovered and confiscated in a timely manner.
● Article 98 The People's Police Certificate is uniformly supervised and implemented in accordance with regulations by the Ministry of Public Security and implemented hierarchical management.
Section 8 Confidentiality Management
● Article 99 Public security organs shall establish a confidentiality work system, strengthen confidentiality publicity and education, strengthen supervision and management, strictly enforce confidentiality discipline requirements, implement confidentiality work responsibilities, and ensure that state secrets and police work secrets are absolutely safe.
● Article 100 Public security organs shall strictly follow the national confidentiality management regulations and accurately define key confidentiality departments and departments, as well as confidential positions and scope of confidential personnel.
● Article 101 The political and industrial departments of the public security organs shall, in conjunction with the confidentiality department, conduct confidentiality reviews on personnel who are intended to be appointed (employed) in confidentiality positions in accordance with the principle of "review first and then use, and strictly control", and organize re-examinations on the confidentiality personnel on duty in accordance with the principle of "selected first and then use, and strictly control".
If confidential persons go abroad for business or private purposes, strict approval shall be implemented in accordance with management authority and prescribed procedures. Under normal circumstances, core confidential personnel will not be approved for private travel.
● Article 102 Public security organs shall strengthen daily supervision of confidential personnel, strictly implement confidentiality commitment requirements and reporting system for major matters, and strengthen the management of confidential personnel leaving their posts and leaving their jobs and deconfidential periods.
● Article 103 In the process of producing, transmitting, copying, using, saving and destroying confidential information or carriers, public security police shall strictly implement the national confidentiality management regulations to ensure that confidential information or carriers are kept confidential and secure.
Confidential carrier refers to various items such as paper medium carriers, electromagnetic medium carriers, CDs, etc. that record and store state secret information and police work secret information in text, data, symbols, graphics, images, sounds, etc.
● Article 104 Confidential carriers that need to be archived shall be filed in accordance with the requirements; confidential carriers that do not need to be archived shall be conscientiously followed by inventory, registration, and approval procedures and then destroyed in accordance with regulations.
● Article 105 The police officers of the public security shall implement the following confidentiality rules:
(I) Do not tell secrets that should not be told;
(II) Do not ask for secrets that should not be known;
(II) Do not watch secrets that should not be read;
(IV) Do not involve secrets in private interactions or public works;
(V) Do not be in non-confidential places Read and talk about secrets;
(VI) Do not publish or pass secrets on social media;
(VIII) Do not record, copy, shoot, excerpt or collect secrets without authorization;
(VIII) Do not carry confidential carriers to public places or visit relatives and friends without authorization;
(IX) Do not use communication equipment without confidentiality measures, ordinary postal services and computer Internet to transmit secrets.
● Article 106 When using computer information systems and information equipment, the following regulations should be strictly abide by:
(I) Confidential computers are strictly prohibited from connecting to the public security information network and the Internet and other public information networks, and public security information network computers are strictly prohibited from connecting to the Internet and other public information networks;
(II) Confidential computers are not allowed to connect to local calls and public security special line fax machines or multi-functional all-in-one machines with fax functions, and equipment with wireless interconnection functions such as wireless network cards, wireless mouse , wireless keyboard and other wireless interconnection functions, and audio and video acquisition devices such as cameras and microphones are not allowed;
(III) Public security information network computers are not allowed to install wireless network cards, wireless mice, wireless keyboards and other wireless interconnection functions, and computers in key departments and locations of public security information network computers shall not install wireless network cards, wireless mice, wireless keyboards and other wireless interconnection functions. Camera, microphone and other audio and video collection devices are not allowed;
(IV) Internet computers used in confidential places are strictly prohibited from connecting to the Internet through wireless means, cameras, microphones and other audio and video collection devices are strictly prohibited, and mobile hotspots are strictly prohibited;
(V) Use of Internet computers and mobile police terminals connected to the Internet are strictly prohibited to process, store, transmit, and publish state secret information and police work secret information. Mobile police terminals connected to the Internet are not allowed to connect illegally with confidential information equipment and public security information network computers;
(VI) Confidential computers and public security information network computers shall use mobile storage media and import and export equipment that meet confidentiality requirements;
(VII) Confidential computers and public security information network computers shall adopt identity identification measures that meet confidentiality requirements.Public security police shall not hand over the confidential computer keys to others for use without authorization, and shall not hand over the digital certificate of the Public Security Information Network computer for others for use;
(eight) If you carry a confidential computer and a computer for public security information network out, you shall be approved by the supervisor of the unit and complete the registration and filing procedures;
(9) The maintenance of secret information equipment involving state secrets and police work shall be carried out within the unit, and a special person shall be appointed to supervise the entire process. Maintenance personnel are strictly prohibited from reading or copying confidential sensitive information. If it is necessary to send it to external repairs, the storage parts must be removed. When the computers involved in confidentiality or the computers of the Public Security Information Network are changed or scrapped, the storage components shall be removed first, and the removed storage components shall be processed in accordance with the relevant regulations of the confidential carrier;
(10) Confidential computers with determined confidentiality levels shall not process, store, or transmit information higher than the determined confidentiality level;
(11) The computers of the Public Security Information Network shall not process, store, or transmit content involving state secrets;
(12) The confidentiality security technical programs and management programs of the computer information system shall not be uninstalled or modified without authorization;
(13) The storage media and printers, fax machines, and scanners shall not be used intersecting between confidentiality computers, public security information network computers, and Internet computers. ml4. Multi-functional all-in-one machines and other devices with storage functions;
(14) Confidential computers shall be marked with the highest level of storage and processing information, the number, responsible person and the identification of confidential computers for storage and processing, the computers of the public security information network shall be marked with the identification of the public security information network and prohibited processing of state secret information, and the Internet computers shall be marked with the identification of the Internet and prohibited processing of state secret information and police work secret information;
(15) shall not exceed the authority to access public security information resources, nor shall the disclosure of information that should not be disclosed to the public;
(16) Public security organs shall retain the application system access log information, and no unit or individual shall delete or tamper with the audit log information without authorization.
● Article 107 The public security organs and the person responsible for confidentiality shall accurately determine the confidentiality in strict accordance with the prescribed confidentiality authority and procedures, and fully mark the confidentiality level and confidentiality period.
● Article 108 The information disclosure of public security organs should adhere to the principles of "review first, disclosure later" and "one matter, one review", implement the confidentiality review and approval procedures, strictly register website information release and registration, and organize website confidentiality inspections regularly.
● Article 109 If public security organs use WeChat groups, QQ groups, Weibo , WeChat public accounts and other online social media to carry out their work, they should establish and improve confidentiality management systems.
● Article 110 If a leak is found, it shall immediately report to the confidentiality department of the unit, organize investigation and punishment in a timely manner, and report it in accordance with regulations.
Section 9 Archive Management
● Article 111 Public security organs shall establish and improve archive work systems, strictly regulate management, and maintain the authenticity, integrity, availability and security of archives.
● Article 112 All archives formed by the public security organs in their work that fall within the scope of archives shall be centrally managed by the archives department. No department or individual may take it for themselves or refuse to file it.
Cadre personnel files shall be managed uniformly according to the authority of cadre management, and the organization and personnel department of the corresponding organ or unit shall be responsible for unified management.
● Article 113 In accordance with the principle of "who forms and who archives", timely collect and organize documents and materials included in the archive scope, and strictly transfer them for archiving according to regulations.
● Article 114 Public security organs shall strengthen the collection and archive of documents and materials formed in the process of carrying out special actions, holding important meetings and activities, handling major cases (events), and undertaking the construction of major construction projects of and other major construction projects.
● Article 115 Public security organs shall establish archive rooms that meet national standards, equip archive security protection facilities, regularly inspect archive storage, and ensure the security and confidentiality of archive entities and information.
● Article 116 Public security organs shall strengthen the management of file borrowing and determine the corresponding borrowing scope and approval procedures based on the characteristics and confidentiality of the file.
● Article 117 Public security police shall strictly abide by the regulations on file borrowing and bear the responsibility of custody and protection of the borrowed files, and shall not alter, tear or forge files. Do not lend files to others without authorization.
● Article 118 Public security files shall not be destroyed without identification.
Classroom test
1
Public security organs should highlight ( ) learning, take Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era and the decisions and arrangements of the Party Central Committee on strengthening public security work in the new era as key learning content, to ensure that all police officers firmly uphold their ideals and beliefs, build strong political loyalty, unify their will, act, and move forward in a consistent manner.
A.Political theory
B.Major policies and guidelines
C.Business specifications
D.Policies and regulations
Answer: A
C.Reply to and including: A
C.Registration and resignation of the Party: ( ) and work discipline to ensure the smooth operation of the Party’s political and legal work regulations of the Communist Party of China, the regulations on major matters, establish a strict system of requesting and reporting, clarify the subject, scope, procedures and methods of reporting, etc., strictly enforce the Party’s political discipline, ( ) and work discipline, and ensure that the government orders and police orders are smooth.
A. Integrity discipline
B. Mass discipline
C. Organizational discipline
D. Life discipline
Answer: C
C. Click to view the answer
3
Public security files shall not be destroyed without ( ).
A. Identify
B. Identify
C. Approve
D. Review
Answer: A
C. Click to view the answer
4
Public security organs should strengthen theoretical armament, strengthen public security police ( ), ( ), practical training, ( ), and build a learning organization.
A. Political experience
B. Ideological tempering
C. Professional training
D. Practical training
Answer: ABC
C. Click to view the answer
5
Public security police should implement the following confidentiality rules: ( )
A. Do not read or talk about secrets in non-confidential places
B. Do not tell secrets that should not be told
C. Do not read secrets that should not be watched
D. Do not post or pass secrets on social media
Answer: ABCD
C. Do not read secrets that should be watched
Edit: Zanglan Xiaozhi