The procuratorial organs involve a large number of state secrets and procuratorial secrets in their daily work. Doing a good job of confidentiality work seriously is an important part of the work of the procuratorial organs. It is also an important part of strengthening the construction of the procuratorial organs and giving full play to the work of the procuratorial organs. An important guarantee for legal supervision functions. With the development and progress of society, some new situations and new problems have also brought some new opportunities and new challenges to the confidentiality work of procuratorial organs. How to actively improve and strengthen confidentiality work is an issue currently facing the procuratorial organs that cannot be ignored. 1. Weak links in the current confidentiality work of the procuratorial organs. First, the awareness of confidentiality needs to be enhanced. At present, some police officers have a weak concept of confidentiality and have not implemented the education of confidentiality system and regulations. They have serious paralysis and mistakenly believe that "the world is peaceful and no secret can be protected." A small number of confidential personnel have a weak awareness of confidentiality. Some comrades use computers that process confidential information to access the Internet during working hours or spare time; some comrades use the Internet to transmit confidential materials; some units do not effectively implement the network for processing confidential information. to physical isolation from the Internet; some units need to adjust their internal computers due to work, and the computers originally used to process internal files are converted into Internet access machines. However, the confidential information in the computer memory is not cleared in time, resulting in the fact that the computers that access the Internet no longer process internal files. , but there is a lot of old information left. The management of individual secret-related departments is lax, and some agencies do not have adequate confidentiality management measures, resulting in many hidden dangers of leaking secrets. The confidentiality mechanism is not perfect, the system is not implemented in place, supervision is lacking, and prevention capabilities lag behind. Second, the confidentiality facilities are not perfect. The advantages of informatization construction have been widely accepted by procuratorial organs at all levels. However, due to different perceptions of information technology equipment and local financial restrictions, when purchasing hardware, they often only focus on the price of the equipment and the quantity purchased, and ignore it. The choice of hardware confidentiality performance creates technical loopholes in the confidentiality of the equipment itself, making it extremely easy for secrets to be stolen during use. In addition, the computer operating systems and anti-virus software we use are mostly pirated and lack technical support and subsequent updates, making them vulnerable to attacks by network viruses, malware and other security threats. Some confidential departments, such as confidential rooms, computer rooms, archives rooms, etc., have not installed monitoring, anti-theft, alarm and other security devices as required. Third, the computer password settings are not standardized. Some police officers have little awareness of passwords and neglect security precautions. They do not set power-on and screen saver passwords for confidential computers, and do not encrypt confidential electronic documents, which allows unknown persons to enter the computer system to view and steal prosecutorial secrets. opportunity. A few police officers set passwords that are too simple or use original passwords, making such passwords useless. Fourth, information network management needs to be strengthened. Some units' requirements for security and confidentiality are only limited to the physical custody and recovery of documents and materials, and they lack sufficient attention to the importance of the security of computer equipment and network equipment that contain a large amount of confidential information. Some units lack perfect management methods for computer office equipment and internal LANs, and do not have corresponding systems, or although they have systems, some were formulated earlier and cannot adapt to the development requirements of the situation; some systems are mere formalities and are poorly implemented; Some have neglected management and are in a laissez-faire state. The security of network information only stops at the level of anti-virus. Insufficient attention and management are paid to preventing external "hacker" intrusions and internal network information security leaks. There is no effective way to manage the use of mobile phones and laptop computers. Fifth, the management of mobile storage devices is not standardized enough. In daily use, there is usually no distinction between confidential and non-confidential properties of mobile storage media. Although the distinction between public and private use is made, it cannot be strictly adhered to. Therefore, there is a distinction between confidential computers and non-confidential computers. With the cross-use of removable storage devices between non-confidential computers, prosecutorial secrets will move between the work environment and the private environment, greatly increasing the chance of leaking secrets. 2. The "Four Places in Place" approach to confidentiality work in our hospital At work, we have achieved the "Four Places in Place" for computer confidentiality work: First, the confidentiality organization is in place. Implement a leadership responsibility system for confidentiality work. The prosecutor-general personally serves as the leader of the confidentiality work leading group and is generally responsible for confidentiality work; other party group members are deputy team leaders, responsible for guiding, coordinating, supervising, and inspecting the agency's confidentiality affairs, and handling confidentiality work in a timely manner. major issues; a confidentiality office is set up to specifically handle daily confidentiality matters. The leaders of the hospital should carry out regular inspections, supervise confidentiality work, and solve practical problems encountered in the work. At the same time, we pay attention to the key management of key confidentiality departments and parts, and have established a computer information security leading group to formulate and supervise the implementation of various management methods and regulations, implement responsibilities at all levels, and pay close attention to the implementation of security measures. Second, confidentiality education is in place. Increase the publicity of confidentiality laws and regulations, carry out in-depth confidentiality publicity and education, organize viewings of the educational film "Special Demonstration of Confidentiality Technology", and organize study of the "Opinions on Strengthening the Confidentiality Work of Central and State Agencies" and the confidentiality work of national and provincial procuratorial organs The spirit of the meeting was to improve the confidentiality awareness of all police officers, require police officers to implement confidentiality measures in all aspects of office handling, resolutely put an end to any behavior that violates relevant confidentiality regulations, and ensure that there are no "dead corners" or "loopholes" in confidentiality work. Third, the confidentiality system is in place. We have formulated and improved various rules and regulations for computer confidentiality work, enhanced the standardization and operability of computer confidentiality work, and ensured the orderly development of computer confidentiality work.
A series of rules and regulations such as the "Operation Rules for Computer Security Operations", "Internet Usage Management Regulations", and "Job Responsibility System for Confidential Personnel" have been formulated to ensure that computer confidentiality work has laws and regulations to follow. A set of practical, scientific and effective computer information management system has been established to strictly control the confidential technical processing of Internet-connected computers, strictly conduct confidentiality review of Internet-connected information, strictly prevent the storage and transmission of confidential information on the public network, and avoid the intrusion of LAN and Internet in office cases. Cross-use leads to leakage of secrets, ensuring the efficient and orderly operation and confidentiality of the network system. Fourth, confidentiality is implemented in place. The leaders of the hospital have earnestly shouldered the responsibilities of the responsible person, frequently asked questions, made demands, and pushed forward tasks regarding computer confidentiality work, strengthened the organization, guidance, coordination, and supervision of confidentiality work, and solved discovered problems in a timely manner. Strengthen the confidentiality management of confidential personnel, key confidentiality department positions, confidential carriers, confidential information transmission and activities, highlight the key points of confidentiality work, and strive to improve the quality of confidentiality work. It is emphasized that standardized management requirements must be strictly followed in office case handling, so that wherever business work is extended, confidentiality work will be followed up. Effectively increase the intensity of confidentiality inspections, adhere to the confidentiality inspection system and not relax, detect hidden dangers, plug loopholes, and ensure confidentiality and security. Regular and irregular confidentiality inspections are organized every year, and a comprehensive inspection is conducted on all case-handling laptops and personal office (case) computers, Internet-connected computers, and storage media. The main purpose is to check whether the case-handling laptops have traces of Internet access and whether they are stored Questions such as whether there are traces of Internet access on games and personal office (case) computers, whether wireless network cards are installed, whether computers connected to the Internet store confidential information, and whether mobile storage media are cross-used between computers connected to the Internet and computers connected to the Internet. . At the all-police meeting, departments (bureaus) with problems found during inspections were notified and criticized. At the same time, computer confidentiality work was included in the target management evaluation of the whole hospital, and violations of confidentiality work systems and regulations were vetoed with one vote to ensure that no leaks occurred. event. 3. Countermeasures to strengthen the confidentiality work of procuratorial organs (1) Strengthen confidentiality education. It is necessary to incorporate laws and regulations on confidentiality laws and computer security and confidentiality into learning plans, and carry out regular education through various methods such as holding confidentiality training classes and centralized education to enhance police officers' awareness of responsibility for confidentiality work. Set a confidentiality level on the office computer and stick it above the display screen to remind the police officers to abide by the confidentiality discipline at all times. Let all police officers realize that confidentiality work is around them and it is their duty to participate in confidentiality work. They must keep confidential matters involved in their work and stay away from the unit. The discussion will not be disseminated outside the unit, and the confidentiality system will be strictly adhered to. It is necessary to focus on the education and training of leading cadres and key secret-related personnel in terms of ideals and beliefs, confidentiality situations, laws and disciplines, and knowledge and skills. Through the combination of positive education and realistic negative education, confidentiality education should be regularized and institutionalized to firmly build a An ideological barrier to prevent leaks. (2) Improve the confidentiality system. Establish and improve confidentiality rules and regulations, establish a regular self-examination and return visit system for key secret-related departments, regularly organize confidential staff, archival personnel and other secret-related personnel to find problems in their work, guide police officers to increase their sense of responsibility for confidentiality work, and carefully summarize the work progress The experience and lessons gained in the process ensure the correct direction of confidentiality work. Use systems to standardize operating behaviors and reduce various leak risks induced by human factors. At the same time, we will gradually improve confidentiality and security protection facilities, especially the supporting hardware facilities for key confidentiality areas such as confidential rooms, computer rooms, and archives rooms. Strictly distinguish between confidential mobile storage media and non-confidential mobile storage media. Increase supervision, take effective measures, earnestly implement the various systems, carefully carry out confidentiality inspections, combine the nature of the prosecutorial work and the key points of case handling, supervise and inspect the confidentiality work of the unit, and carry out centralized rectification of the problems discovered , Promote the effective implementation of various tasks of confidentiality work. (3) Strengthen the confidentiality management of computers and networks. It is necessary to strictly follow the relevant requirements for confidentiality work, and uniformly purchase computers and network equipment that meet the relevant confidentiality requirements through the government affairs center to ensure the quality of the purchased equipment. It is necessary to effectively strengthen the daily inspection and management of computer and network systems. It is necessary to strictly follow the relevant regulations on confidentiality work, promptly adjust and enrich the confidentiality work leading group and members, and carry out regular special inspections on confidentiality work to ensure the normal operation of computers and networks. It is necessary to establish and improve the confidentiality management system of the unit's computers and networks. At the same time, a strict reward and punishment system will be implemented to ensure that no leakage of confidential or inspection-related information occurs. It is necessary to standardize and improve the online review procedures for confidential procuratorial information, strictly control the online review of confidential procuratorial information, and resolutely ensure that confidential procuratorial information is not online or published. It is necessary to strictly implement the physical isolation of internal and external networks, resolutely put an end to illegal interconnection, and effectively solve the problems of illegal use of mobile media such as interoperability between internal and external networks and mixed public and private use. It is necessary to strictly regulate the use and management of confidential media, formulate practical systems for purchasing, managing, and destroying soft, hard, and USB disks to prevent the leakage of confidential information. (4) Strengthen information construction. It is necessary to promptly report to the party committees and governments at the same level any difficulties (including human, financial, and material resources) encountered in the informatization construction of procuratorial organs, especially in view of the general lack of expertise in computer and network operation and maintenance among the procuratorial organs. To solve talent and other issues, we actively seek support from the public, promote informatization construction, and implement strong science and technology inspections.
Further optimize the staffing and functional merging of internal agencies, and at the same time introduce a group of young comrades with excellent political qualities, outstanding computer and network skills, and willingness to engage in procuratorial work through selection, recruitment, etc. to join the procuratorial agency's information construction team and devote themselves to procuratorial work The frontline of the informatization construction of government agencies, comprehensively improve the overall level of informatization construction of procuratorial organs, and promote the scientific and orderly development of various procuratorial work.
Author unit: Hekou District People's Procuratorate