How to manage classified information system?

Secret-related information system refers to a system or network consisting of computers and their related and supporting facilities, which stores, processes and transmits state secret information according to certain application objectives and rules.

According to the highest level of information processing in system planning and design, the classified information system is divided into three levels: top secret, confidential and secret, and protected according to different protection requirements. The confidential information system shall be equipped with safety facilities and equipment that meet the national safety standards. Safety facilities and equipment shall be planned, constructed and operated synchronously with the classified information system. The confidential information system shall be put into use only after it has passed the inspection as required.

With the rapid development of information technology and the wide application of computer technology, government agencies and units generally use classified information systems to store, process and transmit state secret information. In order to strengthen the management of classified information systems, prevent and curb the theft and leakage under the conditions of information technology, the Secrecy Law specifically prohibits the confidential management of information systems and information equipment, and no organization or individual may engage in the following acts: connecting classified computers and classified storage equipment to the Internet and other public organizations. Exchanging information between classified information systems and the Internet and other public information networks without taking protective measures; Using unclassified computers and unclassified storage devices to store and process state secret information; Uninstalling or modifying the safety technical regulations and management regulations of classified information systems without authorization; Giving away, selling, discarding or using classified computers and classified storage devices that have not been processed by security technology for other purposes.

In violation of the above-mentioned prohibitive provisions, some or all security technical protection measures will be invalid, and state secrets will lose effective control and protection, resulting in serious leaks and endangering the security of state secrets.