As we all know, agencies and units are the source of state secrets, and staff of agencies and units are the main bearers of the responsibility for the production, use and management of state secret carriers. However, in work practice, some individuals have leaked secrets due to p

2024/05/0700:14:32 technology 1525

As we all know, agencies and units are the source of state secrets, and staff of agencies and units are the main bearers of the responsibility for the production, use and management of state secret carriers. However, in work practice, some individuals have leaked secrets due to paralysis, luck-taking, negligence, etc., causing serious damage to national security.

As we all know, agencies and units are the source of state secrets, and staff of agencies and units are the main bearers of the responsibility for the production, use and management of state secret carriers. However, in work practice, some individuals have leaked secrets due to p - DayDayNews

Negligent paralysis

Case 1

In April 2021, Teng, a cadre of the Comprehensive Section of a county’s Letters and Calls Bureau, collected relevant work information from various departments to prepare inspection materials in order to welcome inspections from superiors. Wang, the head of a certain section, gave Teng his personal mobile hard drive and asked him to search for files on his own. Teng Mou did not verify with Wang Mou the file storage situation in the hard disk, so he connected it to the Internet computer. During the process of copying the relevant folders, he copied three "secret" level work briefings into the computer. Teng Mou During the operation, it was discovered by relevant departments.

The fluke that nothing will happen

Case 2

In August 2021, Liu, a clerk in the secretariat of a certain agency, was discovered by relevant departments when he was storing and processing a directory of sent and received documents on an Internet computer. During the investigation and verification of the case, investigators found that there are some archive directories of confidential documents in 2021 (including file names and document numbers) on their Internet computers, most of which are confidential and confidential. At the same time, the computer also contains a directory of files cleared in 2015 and the "Guidelines for the Preparation of Implementation Plans for a Certain Confidential Project". Under repeated questioning by the investigation team, Liu admitted that he printed the plan after unplugging the network cable, and then deleted it. In addition, investigators found that when Liu registered the file directory, he knew that his behavior violated confidentiality regulations and was worried about being investigated if the word "secret" appeared. The letter "M" was used to replace the file confidentiality level.

The greed for convenience and convenience

Case 3

In October 2021, Chi Moumou of a certain district emergency bureau, in order to facilitate the work, transferred the work materials handed over to the government emergency office after the organizational reform in 2019 without carefully reading and screening. , directly uploaded to the network disk for backup, which contained a confidential document, which was discovered by relevant departments.

The above-mentioned cases remind the staff of agencies and units to take a lesson, beware of three kinds of psychology of leaking secrets, and always keep "national interests above all else, and the responsibility for confidentiality is more important than Mount Tai" ingrained in their hearts.

In the post-epidemic era, mobile office has become the general trend and has become the mainstream work mode. Public officials' daily work communication, sending, receiving, and storing important information have been transformed into using mobile phones. While enjoying the convenience of mobile office, agencies, enterprises and institutions are also facing serious data security challenges. According to survey data, leakage risks often occur during internal and external file transfers and daily communication between staff. Using ordinary instant messaging products will pose great security risks and leakage risks.

Microplatinum Key is deployed in advance, and there is no "leakage" in mobile office.

In order to cope with the high security requirements of mobile office and instant messaging under the normal situation of the epidemic, Zhongyitong Technology launched the Microplatinum Key series mobile phone hardware-level security based on the innovation of cryptography technology. The product has built-in self-developed security chip and is committed to becoming a guardian of information security. It is suitable for mobile office, corporate management and personal life and other scenarios, and effectively solves users' information security problems in mobile communications and mobile office.

As we all know, agencies and units are the source of state secrets, and staff of agencies and units are the main bearers of the responsibility for the production, use and management of state secret carriers. However, in work practice, some individuals have leaked secrets due to p - DayDayNews

End-to-end call protection - Conversation security and confidentiality

Phone calls, voice, video, and online meeting content are all transmitted through ciphertext. The call channel is fully encrypted and protected. The content of your call is only between you and the person you are talking to. Any No third party can eavesdrop.

disappears after reading the chat - the information leaves no trace.

uses Weibo Key to chat. The information is not stored privately, and screenshots and recordings are not supported. The messages sent will disappear automatically after being read. It not only conveys information, but also ensures that the information is not leaked, eliminating the worries of leaking secrets and spreading privacy.

Bi-directional deletion of records - communicate freely

Use Weibo Key to chat about important things with important people. Call records and chat records can be deleted in both directions at any time. Deleted records cannot be recovered. Traceless communication is safe and reliable.

Files are securely locked - the information is only visible to you

Use Weibo Key to safely store important confidential information on your phone, and the protected files can only be seen by you.

Microplatinum Key series products are diversified and easy to operate.

takes into account the convenience of user applications, the diversity of scenes and the high-quality visual aesthetic requirements. MicroPlatinum Key series products have been launched in multiple product forms, including MicroPlatinum Key mobile phone holder, MicroPlatinum Key mobile phone case, MicroPlatinum Key dual Type-C USB flash drive. The products are suitable for all Android phones with Type-c interface. The following is an example of how to use the Microplatinum Key mobile phone holder. It is simple to operate and easy to use.

As we all know, agencies and units are the source of state secrets, and staff of agencies and units are the main bearers of the responsibility for the production, use and management of state secret carriers. However, in work practice, some individuals have leaked secrets due to p - DayDayNews

Under the instruction and guidance of national policies, the concept of confidentiality in various agencies, enterprises and institutions has continued to strengthen. Microplatinum Key series products have also been supported and supported by people from all walks of life such as party and government, finance, military and police, transportation, security, and the Internet. trust. Ensuring users' safe communication and work and building a solid security barrier for them in the big data era is the long-term pursuit of microplatinum .

Microplatinum is in hand, safe and worry-free!

*The case material comes from Confidentiality View

technology Category Latest News