Summary of security work of science and technology bureau

Summary of security work of science and technology bureau

The formulation of the summary of the confidential work of the Science and Technology Bureau can enable scientific and technical personnel to carry out all the work rigorously, meticulously and creatively. I want to share with you the summary of the confidentiality work of the Science and Technology Bureau. Welcome to browse.

Chapter 1: Overview of the Security Work of the Science and Technology Bureau In recent years, under the correct leadership of the Municipal Party Committee Security Committee and the specific guidance of the Security Bureau, the security work of our bureau has adhered to Deng Xiaoping Theory and? Theory of Three Represents theory? Under the guidance of Theory of Three Represents, we will fully implement Scientific Outlook on Development, thoroughly implement the principles, policies, laws and regulations of the party and the state on security work, and continuously promote the smooth development of the security work of the science and technology system with the goal of scientific security work, institutionalized security management and modernization of the security team. The security work is summarized as follows:

First, strengthen leadership and clarify responsibilities.

(a) to strengthen the organization and leadership of safety work. According to the needs of the work, timely adjust the leading group for the confidentiality work of the Municipal Science and Technology Bureau, with the Party Secretary and Director XX as the team leader, the members of the bureau leadership team as the deputy team leader, and the heads of various departments as members, and set up an office to be responsible for daily management. Do layers of implementation, so that security work is always, everywhere, and everything is caught and managed, forming a good situation of * * * management.

(two) put the confidentiality work on the important agenda. Adhere to the confidentiality work into the annual work plan and the regular work of the organs, so as to achieve the same deployment, inspection and assessment. Confidential contents involving scientific and technological achievements and scientific and technological projects shall be implemented in accordance with relevant regulations, and confidential work shall be extended wherever business work persists.

Two, in-depth publicity and education on confidentiality, and constantly improve the confidentiality awareness of cadres and workers.

Confidentiality publicity and education is an important part of confidentiality work. Combined with Friday's study day, I learned the new secrecy law. The General Office of Anhui Provincial People's Government forwarded the Notice on Strengthening the Secrecy of Foreign Scientific Research Cooperation from the General Office of the State Council, and organized government officials to watch confidential education films, such as Tong Daning's spy leak case and be careful with your mobile phone. , to carry out security education, hold a special security meeting, focus on learning the spirit of the relevant documents and security knowledge.

Third, revise and improve the confidentiality system.

Since the promulgation of the new Secrecy Law of XXXXX, according to the requirements of the Municipal Secrecy Committee and Secrecy Bureau, we have revised the scientific and technological secrecy work system of our bureau, revised the confidentiality regulations of XX Municipal Science and Technology Bureau, and introduced the confidentiality management system of XX Municipal Science and Technology Bureau (including the confidentiality management system of confidential documents and materials, the confidentiality management system of information equipment and information system of Municipal Science and Technology Bureau, and the confidentiality review system of information disclosure).

Four, actively do a good job in computer security management.

According to the deployment, this year, two comprehensive inspections were carried out on computers on the Internet, and key departments conducted spot checks. When loopholes were found, they were blocked in time, effectively preventing online leaks. Office network management is responsible for the inspection and maintenance of confidential computers. If it is really necessary to send it for maintenance, the relevant personnel should be responsible for clearing the data on the computer before maintenance. Regularly upgrade the virus database of confidential computers and kill viruses, and strengthen the management of all kinds of confidential media.

Five, strengthen management to prevent leaks.

1. Do a good job in daily receiving (sending) document management, document circulation (borrowing) management, computer use management and other systems, and strictly manage the receipt registration and circulation of documents. Offices, archives and other important places to implement the system of quota, posts, responsibilities and responsibilities, to prevent accidents such as loss, theft and computer online leakage. Manage computer access to the Internet, and it is strictly forbidden to make, store, transmit and use confidential documents, materials and internal information of the organization in computers that access the Internet. Is the computer on the Internet realized? Who is in charge of surfing the Internet? The principle of. No one is allowed to take a floppy disk containing confidential information home for computer processing.

2. Strengthen the system of centralized cleaning and destruction of waste documents. Bureau leaders attach great importance to document destruction and strengthen the management of all links in the process of document destruction. First of all, carefully clean up the documents and materials to be destroyed, and send them to the designated destruction site for centralized destruction after approval by the bureau leaders. No individual may sell or dispose of documents or other confidential materials as waste paper.

3. Established a confidentiality review system for government information disclosure. Effectively reviewed the government information that needs to be disclosed. Bureau leading group according to the requirements of the standardization of security work, combined with the actual work of our bureau, made clear the overall principle and scope of security work, and stipulated that all relevant statistical data published and submitted to the public shall be submitted by the office in a unified way, and the rest of the staff shall not be released to the public without authorization.

4. Actively participate in all kinds of confidential work training meetings organized by higher authorities, and timely submit information and materials related to confidential work as required. In view of the problems and situations, timely put forward rectification opinions. So far, there has been no leakage.

5. Increase hardware investment and improve the level of safety technology and equipment. In accordance with the requirements, the construction of security hardware facilities has been intensified, security funds, safes, tin cabinets and other security equipment have been implemented, and security work in key security places such as finance rooms and archives rooms has been strengthened.

6. Conscientiously implement the spirit of documents related to confidentiality work, increase publicity and education work for the overall cadres and workers, and carry out self-inspection work in a timely manner. Confidential information is not online, and online information is not confidential? Ensure the security of network information. According to the requirements of the Secrecy Bureau, report the secrecy work plan and summary, conscientiously complete the special secrecy work tasks deployed by the Secrecy Committee, actively carry out self-examination of secrecy work or cooperate with the secrecy work inspection of the Secrecy Bureau, subscribe to secrecy magazines according to regulations, and timely reflect the secrecy work of our bureau.

Although the security work of our bureau has done some work, it needs to be further improved according to the requirements of security work under the new situation. We will continue to conscientiously implement the instructions of our superiors on confidentiality, focus on weak links, continue to do a good job in the construction of confidentiality legal system, improve confidentiality rules and regulations, further enhance the confidentiality awareness of all staff, improve the ability to prevent leaks, and promote the scientific development of scientific and technological confidentiality. Provide scientific and technological support for building a happy XX.

Chapter II: Summary of the Security Work of the Science and Technology Bureau According to the requirements of the Detailed Rules for the Assessment of Security Work in 20xx Year and the Administrative Measures for the Use of Electronic Documents in Counties and Towns, we have earnestly carried out self-cleaning and self-inspection, and now the relevant information is notified as follows:

I. Construction of security institutions and hardware facilities

1 At the beginning of the year, a special leading group for confidentiality work was set up, headed by Chen Keliang, Party Secretary of the Bureau, with Cai, who is in charge of duty, as deputy head, with Huang Zhibin, director of the office, He Rolling and back office staff as members, and Comrade Huang Zhibin as a part-time secrecy clerk.

2. Defined the specific responsibilities of security agencies and security officials.

3. A special security room has been set up on the second floor of the office building and equipped with corresponding security hardware facilities.

4. The office on the second floor of the bureau has set up a separate computer room, which meets the confidentiality requirements.

5. The storage environment of confidential computers and intranet terminals is safe.

Second, the construction of confidentiality system and the development of confidentiality work

1, established at the beginning of the year? Public information release confidentiality management system? 、? Security management system for classified networks, computers and mobile storage media? 、? Secret vector destruction management system? And then what? Provisions on confidentiality management of computer operators? System, and ensure the implementation in place.

2. During the year, members of the Bureau held four meetings to study and arrange security work.

3. The secretary, the director, the person in charge on duty, and the secret keeper have all signed a letter of responsibility for confidentiality work with the county party committee. What is the system of mobile phone filing and mobile phone use for classified personnel? Ten bans? Well done.

4. 10 copies, organize a centralized publicity week for the first anniversary of the implementation of the newly revised secrecy law, hang 2 banners and post the slogan 10. In accordance with the requirements of superiors, the staff were organized to carry out centralized study on confidential legal knowledge, and the reporting system on major issues of confidential work was well implemented.

III. Computer and Network Management

1, the bureau office has established a standardized office computer ledger, including the number, model, serial number, purpose, classification and management personnel of the hard disk.

2. No confidential documents have been produced and processed, and computers in the e-government intranet have not logged on to the Internet.

3. All 12 office computers in the office building are equipped with standardized identification plates.

4. Firewall and antivirus software are installed in office computers, and virus database is upgraded in time.

There is no record of storing or processing confidential information on all computers.

6. All confidential information of office computers is exported through fixed mobile storage media.

Four. Use and management of removable storage media

1. All office mobile storage media are uniformly purchased, numbered, distributed and recycled by the office.

2. All office mobile storage media are clearly marked.

3. There is no confidential and sensitive information in the unclassified mobile storage medium.

4. There is no cross-use of mobile storage media between classified computers and non-classified computers.

Five, the central, provincial and municipal document processing and electronic document management.

1. The superior documents forwarded by Xianweiban shall be signed in time and printed out according to the specifications.

2. Standardize the registration of superior documents in time, strictly follow the reading and approval process, keep the reading and approval records, and store and collect them at the counter.

3. Classify and sort electronic documents.

4. All kinds of electronic documents are signed and transmitted in time.

5. Actively support and cooperate with the business guidance department.

Chapter III: Summary of the Security Work of the Science and Technology Bureau According to the spirit of the Notice of xx State Secrecy Bureau on Printing and Distributing the Annual Assessment Standards for the Target Management of Security Work in 20xx Cities, Counties and Units Directly under the Municipal Government (XX [20xx] No.4), the self-inspection of the target management of security work of our bureau is now reported as follows.

1, sound safety organization (self-assessment 10)

According to the needs of the work, timely adjust the leading group of confidentiality work of the Municipal Science and Technology Bureau, and file with the Municipal Secrecy Bureau. Comrade Yang Shulin, Party Secretary and Director of the Bureau, is the team leader, and the heads of various departments are members, and the team leader takes overall responsibility. Each person in charge has an office responsible for daily management. Do layers of implementation, so that security work is always, everywhere, and everything is caught and managed, forming a good situation of * * * management.

2, the secret organization to carry out normal activities (8 points)

Our bureau attaches great importance to confidentiality, and cadres have a strong sense of confidentiality. In combination with Friday study day, we often carry out confidential warning education activities, and organize party member cadres to watch confidential education films such as Tong Daning's spy leak case and Be careful with your mobile phone. Bureau leaders listen to the confidential work report of relevant departments, and put forward requirements and instructions.

3, timely convey and implement the spirit of learning the superior meeting, and actively organize party member cadres to collectively learn the spirit of the document and the leadership speech. (self-rating 5 points)

Timely convey the spirit of the confidential cooperation group meeting at the study meeting of government cadres; Organize government officials to study and implement Six Secret Telegrams [20xx] 1No. and XX [20xx] No.4, understand the spirit and implement them.

4. The office arranges 1 full-time staff to be responsible for confidentiality, and strictly implements the system of holding certificates for classified posts. (self-rating 5 points)

In addition to timely adjusting the members of the leading group, it is determined that Comrade Wang Huaiqiong is responsible for the security management of paper documents, and Comrade Xu Jianghuai is responsible for the security management of information equipment, information systems and communication equipment, so that the responsibilities are clear and the division of labor is divided among people.

5. Conscientiously implement the spirit of the document on confidentiality work and report the development of confidentiality work on time. (self-rating 5 points)

According to the spirit of the document [20xx] No.4 of the National Sixth Article, the computer access of our bureau was comprehensively inspected twice, and the key departments were randomly selected, and the loopholes were found to be blocked in time, effectively preventing the occurrence of online leaks. Office network management is responsible for the inspection and maintenance of confidential computers. If it is really necessary to send it for maintenance, the relevant personnel should be responsible for clearing the data on the computer before maintenance. Regularly upgrade the virus database of confidential computers and kill viruses, strengthen the management of all kinds of confidential media, and report the development in time.

6. Carry out confidential publicity and education. (self-rating 5 points)

On Friday study day, party member cadres were organized to study the new secrecy law, the Provisions on Strengthening the Network Security Management of Party and Government Organs and Secret-related Units issued by the Central Office and the State Council, the Notice on Strengthening the Security Work of Foreign Scientific Research Cooperation forwarded by the General Office of Anhui Provincial People's Government to the General Office of the State Council, the Provisions on the Security Management of Information and Information Equipment Use and other documents and the spirit of the higher-level meeting; Party member cadres were organized to watch secret education films such as Tong Daning's Spies Leaking Case and Be Careful with Your Mobile Phone, which further improved the understanding of party member cadres on secret work.

7. Actively participate in confidential knowledge training and confidential cooperation group activities. (self-rating 5 points)

Actively participate in all kinds of confidential knowledge training and confidential cooperation group activities organized by higher authorities, and submit relevant information and materials on confidential work in a timely manner as required.

8, the handling of confidential documents (5 points)

Our bureau? Three secrets? Documents should be returned in time according to the regulations, and there should be no shortage. Bureau leaders attach great importance to the handling of confidential documents, strengthen the management of all aspects of confidential documents, and personally ask questions. Carefully clean up the documents and materials to be destroyed, and send them to the designated destruction site for centralized destruction after approval by the bureau leaders.

9. Establish and improve various confidentiality systems. (self-rating 5 points)

Since the promulgation of the new secrecy laws of 20 10, 10, 1, we have revised the science and technology secrecy system of our bureau, promulgated the secrecy regulations of xx Municipal Science and Technology Bureau, and issued the secrecy management system of xx Municipal Science and Technology Bureau under the guidance of the Municipal Secrecy Bureau.

10, confidential file information management code. (self-rating 5 points)

Conscientiously do a good job in the daily receipt registration, document processing, issuance and circulation of organs, and strictly follow the requirements of the secrecy law and other provisions. Offices, archives and other important places to implement the system of quota, posts, responsibilities and responsibilities, to prevent accidents such as loss, theft and computer online leakage.

1 1. Implement the confidentiality management regulations on the use of information and information equipment, complete the filing of classified computers and mobile storage media on time, and put the classified computer system into use after approval according to procedures. (self-assessment 10)

In accordance with the unified requirements of the Municipal Security Office, our bureau completed the filing of classified computers and mobile storage media, and the classified computer system was put into use after being submitted for approval according to procedures.

12, the implementation of the "regulations on strengthening the network security management of party and government organs and secret-related units" (12 points)

Conscientiously implement the spirit of the "Provisions on Strengthening the Network Security Management of Party and Government Organs and Classified Units" issued by the Central Office and the State Council, and earnestly strengthen the security management of computers and mobile storage media. Is it implemented for computers connected to the Internet at work? Who is in charge of surfing the Internet? In principle, the production, storage, transmission and use of confidential documents, information and internal materials are strictly prohibited; It is strictly forbidden to use non-classified mobile storage media to store classified files and use them in classified computers; The classified computer is not connected to the network; The government information disclosure and confidentiality review system has been formulated. According to the requirements of standardization of secrecy work and the reality of scientific and technological work, the leading group of the bureau clarified the general principles and scope of secrecy work, and stipulated that all relevant information publicly released and submitted to the public should be submitted by the office in a unified way, and the rest of the staff should not release it without authorization.

13. Is the classified computer installed as required? Three in one? Violation outreach monitoring system. (self-rating 5 points)

Has the classified computer in the National Defense Science and Technology Mobilization Office of our bureau been installed as required? Three in one? Violation outreach monitoring system.

14, increase hardware investment. (Self-rating 8 points)

In accordance with the requirements, the construction of security hardware facilities has been intensified, security funds, safes, tin cabinets and other security equipment have been implemented, and security work in key security places such as finance rooms and archives rooms has been strengthened; By perfecting the system construction, standardizing personnel management, improving the level of technical defense, we will implement civil air defense, physical defense and technical defense measures.

15, playing the role of "confidential work" magazine (4 points for self-evaluation)

Actively subscribe to the "Confidentiality Work" magazine, seriously organize party member cadres to study "Confidentiality Work", and combine the actual work of science and technology to apply what they have learned.

;