Reflections on the education and learning of confidentiality awareness and confidentiality common sense in 2018
Reflections on the education and learning of confidentiality awareness and confidentiality common sense 1
In the 20 years since the promulgation and implementation of the "Secrecy Law", it has played an important role in safeguarding my country's national security and interests and ensuring the smooth progress of reform, opening up, and socialist construction. At present, our country's confidentiality work is still facing severe tests. We need to pay attention to raising confidentiality awareness and doing a good job in confidentiality in many aspects to ensure the smooth development of reform and opening up and the construction of a harmonious socialist society.
1. The severe test currently facing our country’s confidentiality work
1. The long-term peaceful environment has made people forget the concept of enemy situations and confidentiality awareness
At present, in our society, the weak legal concept of confidentiality still exists, and the peaceful and paralyzing ideas of "no secret can be protected", "secrets are difficult to protect", and "secrecy is useless" still have a market. Some cadres, including leading cadres, have a weak awareness of confidentiality, lack political and strategic vision, and do not pay enough attention to confidentiality work. Some departments and units do not implement confidentiality systems and have lax management measures. Especially in the management of confidential computers and networks, there is a lack of effective technical prevention means, and there are hidden dangers of leaks. The responsibilities of some key confidentiality departments are unclear and confidentiality responsibilities have not been implemented. In particular, the phenomenon of "one machine for two uses" is serious and there is no strict isolation method, posing potential threats to network information security work. Compared with the past, our country has diversified secret-related subjects, diversified secret-related carriers, and complicated leakage channels. The number of leaking objects has increased significantly, the probability of leaking secrets has increased significantly, and the difficulty of control has increased significantly.
2. The changes brought about by the market economy have raised many new issues for confidentiality work
First, the ideological concepts are complex. With the deepening of reform and the development of the market economy, various ideologies and cultures have stirred up each other. People's outlook on life and world view have become more complex and diverse. People's behavior has become more selective and diverse, and confidentiality education has become more targeted and effective. Facing new tests. Second, the profit motive is obvious. Some people pursue "money worship", "hedonism" and "extreme individualism" and are willing to trample state confidentiality laws and sell state secrets in order to maximize their personal interests and reflect their so-called personal value. Third, the number of confidential subjects has increased. More and more non-public economic units and private enterprises have entered the field of confidentiality, and the original confidentiality management system has developed blind spots. Fourth, the flow of personnel has intensified. Some high-tech personnel and secret personnel leave their jobs and find new jobs in foreign-funded enterprises, multinational companies, or immigrate to foreign countries, causing serious harm to national secrets and security.
3. The reform of the political system has brought new impacts to the original confidentiality management work
At present, the party and government of our country are promoting political civilization, open government affairs, and the construction of a sunshine government, and have a negative impact on the confidentiality work. presented new challenges. Secrecy work must not violate the trend and requirements of open government affairs, but also ensure the security of state secrets. This requires that we must move away from the old concept of "the more confidentiality we keep, the safer it is" and establish the principle of "openness" The new concept of confidentiality is "confidentiality is the exception". In particular, the "Government Information Disclosure Regulations" implemented in May this year stipulate that the disclosed government information must be disclosed in accordance with the law on legal carriers such as government websites. Of course, government information involving state secrets must not be disclosed. To this end, we must actively explore a new confidentiality work system that adapts to the socialist market economy and international practices, so that the confidentiality work system continuously adapts to the new requirements for information disclosure, ensuring that the core, key points, and advantages are preserved, so as to promote the openness of government affairs in our country. Play a good role in cooperating and promoting.
4. The rapid development of high and new technologies has brought new challenges to confidentiality management.
With the rapid development of high and new technologies and the widespread application of office automation, confidentiality management needs to be carried out accordingly. change. One is to transform from static management to dynamic management. In the past, static management meant keeping your mouth shut, taking good care of files, and keeping an eye on the door. Now, you also have to take good care of the dynamic management of information, networks, and various confidential media. The second is to shift from relying on traditional management to relying on scientific and technological means. In the past, whether the confidentiality work was done well or not mainly depended on whether various systems were sound, but now it also relies on technical means, and it is necessary to form a defense system that organically combines technical defense, physical defense and human defense. The third is to shift from managing media confidentiality to managing information confidentiality. The original confidential media were mainly paper, but now there are removable storage media such as optical disks, USB flash drives, floppy disks, and mobile hard disks. Therefore, it is necessary to manage various channels such as mobile phones, telephones, computers, and networks that can store, process, and transmit information. These changes have made it increasingly difficult for our country to protect confidentiality.
5. Hostile forces at home and abroad continue to carry out activities of differentiation and sabotage against our country.
In order to achieve the purpose of containing, dividing, evolving and subverting our country, hostile forces at home and abroad steal secrets from our country. Activity is quite rampant. First, the subjects of secret theft are diversified. Hostile forces, intelligence organizations, neighboring countries, multinational companies, etc. have significantly increased their secret theft activities under the guise of tourism, lectures, and social investigations. Second, the scope of secret theft has expanded. The scope of secret theft has expanded from the political and military fields in the past to the economy, science and technology, culture, transportation and other fields. The third is the diversification of secret theft methods.
Hostile forces not only use various means to instigate our internal personnel to rebel, but also use joint ventures, joint development, academic seminars, cultural exchanges, travel interviews, etc. as cover to come to our country to carry out secret theft activities. The current national security situation in our country is that traditional security threats and non-traditional security threats coexist, external security risks and internal security risks are intertwined, and the struggle between secret theft and counter-theft is more acute and complex.
2. Strictly comply with the provisions of the "Confidentiality Law" and take corresponding measures to ensure confidentiality work
1. Do a good job in publicity and education
Confidentiality publicity and education is a This is a regular and basic work, and it is also an important part of confidentiality work. First, through continuous and various forms of publicity and education, we must continuously enhance the public's awareness of enemy situations, confidentiality and comprehensive prevention awareness, so that the general public can consciously establish confidentiality vigilance. Second, we must focus on confidentiality education for leading cadres at all levels, and focus on strengthening confidentiality education and training for confidential personnel involved in key confidentiality departments, full-time and part-time confidentiality cadres of party and government agencies, and national civil servants and computer information system managers. The third is to study and improve the content and focus of education based on the development and changes of the situation and tasks, and carry out publicity and education in a targeted, situation- and reality-based manner, so that confidentiality publicity and education can keep pace with the times.
2. Do a good job in team building
Building a team of cadres with high political quality and strong professional capabilities is an important guarantee for confidentiality work. First, we must care for and care for confidential cadres politically, at work, and in life, retain people with career, affection, and appropriate treatment, and strive to create a team of high-quality confidential cadres with strong professionalism and firm beliefs. . The second is to further strengthen political theory learning and business training in accordance with the requirements for professionalization of the confidentiality team, continuously enrich learning and training content, improve learning and training effects, and comprehensively improve the overall professional quality of the confidentiality cadre team. Third, grassroots confidentiality workers and managers must conscientiously follow the work arrangements put forward by superior confidentiality departments and the overall requirements of "ensure safety and development", strive to cultivate a rigorous and meticulous, vigorous and hard-working style, and work hard in ordinary positions. Work with peace of mind, prepare carefully, and cooperate sincerely.
3. Strengthen system construction
First, implement the leadership responsibility system for confidentiality work. It includes three levels and three principles. The "three levels" are: first, the main leaders of the party and government at all levels bear overall leadership responsibility for the confidentiality work of their regions and departments; second, the leaders in charge of confidentiality work must bear the responsibility of specific organizational leadership; third, the leaders in charge of other work Responsible for the confidentiality of the business scope in charge. The "three principles" are: first, who is in charge of confidentiality work and who is responsible; second, what business is in charge, and at the same time, leads and manages the confidentiality work in this business; third, at which level the business work is managed, and the confidentiality work within it It also controls which level it reaches.
The second is to explore the establishment of a classified management system. Accurately defining state secrets and classification levels is an important foundation and prerequisite for strengthening confidentiality management. In view of the current problems of wide confidentiality scope, high classification level and random classification process, we should actively explore and establish a practical classification management system that adapts to the requirements of the development of the situation to prevent the leakage of state secrets due to inaccurate classification. It is necessary to establish a classification work organization, strengthen the study of classification knowledge, and ensure accurate classification in accordance with the law.
The third is to establish a confidentiality review system for information disclosure. According to the provisions of the Information Disclosure Regulations of the State Council, administrative agencies shall publish government information except those involving state secrets, commercial secrets and personal privacy. Therefore, when disclosing information, we must pay attention to the relationship between disclosure and confidentiality, establish a confidentiality review mechanism for government information release that is consistent with the actual work of the agency, and standardize the work procedures for confidentiality review, so as to ensure that the information that should be disclosed can be fully disclosed to the public. , but also to prevent improper disclosure from leaking secrets and endangering national interests.
The fourth is to implement the supervision, management and law enforcement inspection system. It is necessary to strengthen the management of confidential media. Disks, optical disks, USB flash drives, etc. that contain secret documents and information must be managed in the same manner as paper media documents of the same confidentiality level; it is necessary to strengthen the management of various printing plants that undertake the printing business of government agencies and institutions. , management of copy clubs and confidentiality management of important secret-related meetings and major secret-related activities; for units that have done well in confidentiality work, the confidentiality management department should promptly summarize and promote their experiences and practices, and report and commend them. Units that have problems and refuse to make corrections must promptly and seriously report criticism and urge them to make corrections.
The fifth is to implement the system of using high and new technologies to prevent leaks. It is necessary to effectively strengthen the confidentiality management of computers and their networks, conscientiously implement the approval and licensing system for the security and confidentiality management of computers and their networks, and effectively increase investment in confidentiality work. The relevant competent departments and principal responsible persons must stand at the overall level, raise awareness and be willing to invest, so that the level of confidentiality technology can adapt to the new situation of reform and opening up and the rapid development of high technology, and better play the role of "ensuring security and ensuring development".
On the learning experience of confidentiality awareness and confidentiality knowledge education 2
April 15 this year is my country’s first national security education day. Activities are organized in various forms across the country to publicize and educate people to raise their awareness of protecting national security. In actual work, our geological survey unit often uses confidential results and manages the derivatives of confidential results.
As a geological data manager of an organization, combined with many years of practical work experience, I would like to learn from two cases with everyone on the issue of confidential data management, so as to draw lessons from them in future work and encourage everyone to improve their work in the future. We must recognize the current severe situation of confidentiality work and prevent cases involving confidential information from occurring.
Surveying and mapping geographical information data is related to national security and territorial integrity. It has been regarded as a national artifact since ancient times and cannot be easily revealed to others. In recent years, surveying and mapping geographical information data have become more and more abundant, and their application fields have become more and more extensive. However, while these surveying and mapping results provide convenience to people, they also bring new problems to confidentiality work. In practice, leaks of surveying and mapping results occur from time to time and are becoming more frequent, seriously threatening national security.
Case 1: Guo, an engineer at a design institute, illegally used a computer connected to the Internet to store and process 7 confidential-level and 16 secret-level topographic maps. After investigation, Guo participated in the bidding and construction work of many domestic projects before 2008. Project A provided him with confidential topographic maps as a reference for bidding quotations and scheme design. Guo violated confidentiality regulations and copied it to a computer connected to the Internet for storage and processing without authorization, and used it as a backup for project data after use. After the case occurred, the relevant departments gave Guo an administrative demerit.
Analysis In this case, Guo was directly responsible for illegally using a computer connected to the Internet to store and process confidential information. However, the investigation found that most of the confidential topographic maps stored and processed by Guo came from Party A of the project, and Party A’s unit did not put forward any confidentiality requirements. According to the requirements of the "Regulations on Approval Procedures for the Provision and Use of National Confidential Basic Surveying and Mapping Results", the use of confidential basic surveying and mapping results must go through strict application and approval procedures and sign a security confidentiality responsibility letter. However, in practice, after purchasing confidential surveying and mapping results, some units did not strictly manage them in accordance with the relevant regulations on confidential media. Instead, for work convenience or other reasons, they illegally scanned and copied, or even copied electronic topographic maps repeatedly. The potential for leakage of confidentiality is very serious.
Case 2: In order to increase the economic income of the unit, Xu, the director of a certain geological institute, decided to sign a cooperation agreement with a foreign company without authorization, and allowed the company to inquire and borrow a large amount of geological data many times, which involved confidential information. 48 copies of topographic maps. After the case occurred, relevant departments imposed corresponding party and political sanctions on Xu.
Analysis: This case is a typical case in which relevant confidentiality laws and regulations were violated during economic cooperation and exchanges, resulting in the leakage of state secrets. According to Article 30 of the Secrets Law, if agencies and units need to provide state secrets in their external exchanges and cooperation, they must report to the relevant competent authorities for review and approval, and sign a confidentiality agreement with the other party. In this case, Xu had a weak awareness of confidentiality and cooperated with foreign companies in violation of regulations. Although subjectively he had no intention of leaking secrets, objectively he caused the leakage of confidential results, causing serious harm to national security and interests.
Through the analysis of typical cases and combined with the actual situation of our unit, I think we should do the following aspects well:
1. Control the source. Strictly review and approve procedures, and further strengthen the tracking, inspection and management of the use of confidential surveying and mapping results while understanding the needs of those in need, clean and destroy confidential results on a regular basis, and gradually find out the bottom line.
Second, we must strengthen education. It is necessary to regularly carry out various forms of confidentiality education for employees to encourage them to recognize the current severe forms of confidentiality work, effectively enhance confidentiality awareness, master confidentiality knowledge, and gradually reduce confidentiality violations due to ignorance and fear.
Third, we must strengthen management. The main thing is to do a good job in the management of confidential personnel, confidential carriers, confidential places and computer information.
Fourth, we need to step up inspections. Carry out confidentiality inspections in a planned and targeted manner on departments that use confidential results and materials, and seriously investigate and deal with violations of confidentiality laws and regulations, so as to promote education, correction and prevention. Gradually improve the overall confidentiality awareness.