According to the requirements of the Notice on Further Improving the Confidentiality Self-inspection and Self-evaluation Work of Organs and Units issued by the Office of the Municipal Security Committee, our town has earnestly carried out self-inspection work in accordance with the Detailed Rules for Self-inspection and Self-evaluation of Organs and Units (Trial). The report on the self-inspection of confidentiality work in our town is as follows:
I. System construction
With reference to the Law of People's Republic of China (PRC) Municipality on Guarding State Secrets and the Implementation Measures of People's Republic of China (PRC) Municipality on Guarding State Secrets, at the beginning of the year, we further improved the secrecy system of Zhuanlu Town, the secrecy system of archives work, the secrecy document management system, the secrecy personnel management system and the secrecy examination and approval system of online information release.
Second, the management of classified personnel and secret vector.
Do a good job in the confidential publicity and education of cadres in the town. Leading group members take the lead in learning confidential knowledge, abide by the confidentiality system, and organize government officials to learn relevant laws and regulations such as the Secrecy Law and the Reader of Confidential Knowledge, as well as the important spirit of the central, provincial and municipal secrecy work. Through careful study, the broad masses of cadres and workers have deepened their understanding and mastery of confidential knowledge, effectively enhanced the confidentiality awareness of all cadres and workers, and promoted the development of confidentiality publicity and education.
Focus on strengthening the safety management and education of security personnel. Our town insists that the DangZhengBan is the specific undertaking department of confidentiality work. In daily work, we should seriously train and strictly educate the full-time security personnel in the office, sign a confidentiality commitment letter at the beginning of each year, actively subscribe to confidential learning materials, learn the latest and most scientific security knowledge and skills in time, and improve the level of security work.
Secret-related computers and secret-related USB flash drives are all marked with secret-related signs; The person in charge of the management of classified computers and classified USB flash drives has been appointed as the director of the town party and government office; The company's confidential mobile storage media are registered with numbers and classification marks. , and carry approval records when going out. The removable storage medium does not intersect between confidential and non-confidential computers, and the non-confidential removable storage medium does not store or process confidential information.
Three. Management of confidential and unclassified networks
Our town further standardizes the management of classified and non-classified network computers, strictly implements the Interim Provisions of the State Secrecy Bureau on the Security Management of Computer Information Systems and the Provisions on the Security Management of International Networking of Computer Information Systems, and ensures that a special person is responsible for the security management of computer information systems.
There is no record of illegal internet access by classified computers in our town; Anti-virus software has been installed in all classified computers in our town, and updated and upgraded in time; The non-classified network of our unit does not store, process and transmit state secrets, does not use classified mobile storage media, does not install and use audio and video input devices and wireless transceiver devices on terminals connected to the Internet in classified places, does not publish state secrets on social media such as websites and forums, does not use e-mail to handle confidential business, does not use Internet storage services such as network disks to store state secrets, does not involve state secrets in the production and playback of network media such as the Internet, and does not store and process state secrets on smart devices connected to the Internet.
Four, confidential documents storage and information release review
Confidential documents are stored in a document safe with electronic password; Registration standard of confidential documents, with detailed circulation records; Strictly implement the relevant confidentiality provisions on the storage and destruction of discarded documents and materials.
The non-confidential network of our unit has established a confidential review system for information release, insisting on preliminary review and comprehensive review, and designated working institutions to be responsible for the confidential review of Internet information release. Internet access terminals are marked with signs prohibiting the handling of confidential information. As for the submission of confidential information, our town will report all confidential work and development in a timely manner in strict accordance with the requirements of the Office of the Municipal Party Committee's Confidentiality Committee, and submit information on major confidential work activities and major security and confidentiality facilities construction in our town according to the work arrangement.
Our town has done a lot of work in manpower, material resources and financial resources. Although some achievements have been made, there are still some shortcomings, such as the ideological understanding needs to be further improved and the implementation of specific systems needs to be further strictly regulated. Our town will continue to improve the function of secrecy work, intensify its work, carry out in-depth study and publicity on secrecy laws and regulations, constantly improve the secrecy system and measures, and pay close attention to the implementation of the system to ensure that our town's secrecy work is foolproof.
Confidential self-inspection report 2
Heihe Editorial Board Office has always regarded confidentiality as an important work schedule, organized and studied the spirit of relevant documents, fully understood the significance of doing a good job in confidentiality self-examination and self-assessment, incorporated the Working Rules for Confidentiality Self-examination and Self-assessment of Organs and Units (for Trial Implementation) into the contents of confidentiality education, clarified specific requirements, and formed a working mechanism of who is in charge and who is responsible to ensure that confidentiality self-examination and self-assessment work is actively and effectively carried out.
First, pay close attention to the implementation of confidentiality responsibilities.
Focusing on the safety management of secret-related personnel, secret vector and secret-related computers, we will continuously strengthen the leadership over safety work, strengthen safety management, strengthen supervision and inspection, and pay close attention to the implementation of various safety measures and safety responsibility system. In accordance with the requirements of the rules, conduct a comprehensive self-examination, carefully fill in the "Standards for Self-examination and Self-assessment of Confidentiality of Organs and Units" and score them. * * * It involves 8 self-inspection projects and 32 actual projects, and the evaluation results meet the requirements. Sign a letter of responsibility for the safe use and management of classified equipment. Since the establishment of the network platform organized by the Municipal Party Committee and the connection with the confidential intranet of the Party Committee, in order to do a good job in the use and management of confidential equipment and prevent leakage, our bureau strictly follows the Administrative Measures for the Use of Common Passwords in the Intranet of the Party Committee System of Heilongjiang Province (Trial), adheres to the principle that whoever uses it is responsible, and all users of confidential equipment in each department determine the first responsible person, the second responsible person and the third responsible person respectively according to their positions and frequency of use, and sign the security of confidential equipment.
Second, establish a private network management system.
In order to improve the safety awareness of users of institutional network platform and strengthen the standardization and safety of platform operation, Heihe Editorial Board Office has specially formulated the Management System of Institutional Private Network, which strictly regulates all employees of our office and platform operators of linkage departments, and requires platform operators not to inform others of their login passwords and passwords in any form. Any equipment with storage and memory functions connected to the private network is regarded as classified equipment, and it is forbidden to use the classified equipment connected to the private network for other purposes without permission. This is strictly required.
Third, establish a long-term mechanism to form a normalization of work.
Heihe Editorial Board Office attaches great importance to the supervision and inspection of confidentiality work, establishes and improves a long-term mechanism for self-inspection and self-evaluation of confidentiality, and adopts the methods of combining self-inspection with spot check, routine inspection with key inspection, and regular inspection with surprise inspection to find hidden dangers in confidentiality work in time, further strengthen the incentive-oriented function of the results of self-inspection and self-evaluation of confidentiality, and pay close attention to the implementation of the responsibility system. Formulate security measures, strengthen security education, improve the subject consciousness of all employees' security responsibility, enhance the enthusiasm and initiative of self-examination and self-correction, and finally achieve the goal.
Confidential self-inspection report 3
According to the spirit of the Notice of Zhenghe County State Secrecy Bureau on Printing and Distributing the Supervision Work Plan of Zhenghe County Secrecy Self-inspection and Self-evaluation (Bao Zheng [2017] No.2), our bureau has carefully organized and carried out the self-inspection and self-evaluation of this system in light of the actual situation, and now the work is reported as follows:
I. Organization, Team and System Construction of Confidentiality Work
(1) organizational construction. In order to implement the target management responsibility system for confidentiality work and ensure the effectiveness of confidentiality work, our bureau has set up a leading group for confidentiality work, with the director as the leader, the deputy director in charge as the deputy leader, the heads of all units and offices as members, and the office responsible for daily work. Our bureau adheres to the principle of who is in charge and who is responsible for confidentiality. By clarifying the scope of responsibility and conducting pressure at different levels, we will implement the requirements of confidentiality work to every post and every cadre and worker, and closely combine confidentiality work with human society business, with the same deployment, requirements and inspections.
(2) Team building. In order to ensure the smooth development of daily security work, two security personnel are specially appointed to take charge of daily inspection and liaison work. Do a good job in the publicity and education of confidentiality for all cadres and workers, organize and study the important spirit of confidentiality laws and regulations and the confidentiality work of higher authorities through various forms, continuously deepen the understanding and application of confidentiality knowledge by cadres and workers, and effectively enhance the confidentiality awareness of cadres and workers.
(3) system construction. Combined with the actual work of the People's Social Security Bureau, the "Zhenghe County People's Social Security Management System" and the "Zhenghe County People's Social Security Bureau's Government Information Disclosure and Confidentiality Review System" were formulated and promulgated, so that all confidentiality work can be followed by rules and evidence. Always put the secrecy work into the important task of organ construction, and link it with performance appraisal, annual appraisal and all kinds of appraisal, and carry out informed criticism on units and individuals whose secrecy work is not in place, with serious accountability, and form a strict secrecy work system.
Second, computer security management
(1) classified management. Classified management of classified computers and computers on the Internet, strict implementation of the Interim Provisions on the Security of Computer Information Systems, and designation of users of each computer as responsible persons and administrators. For important platforms such as salary database and treasury system, special computers are used for cross-network operation, and data entry and access are strictly in accordance with the step-by-step examination and approval system to ensure the security of confidential data. We conscientiously implement the confidentiality provisions that confidential media should not be connected to non-confidential computers, and it is strictly forbidden to store and process confidential information on non-confidential computers.
(2) Regular maintenance. Bureau of security work leading group regularly patrol classified and online computer usage, it is strictly prohibited for classified computers to run online, and requires online computers to regularly antivirus and update software to ensure compliance with the use management regulations. The maintenance, maintenance and elimination of networked computers and classified computers strictly implement the confidentiality system, and set the power-on password as required.
Three. Document production, disclosure and document management
(a) the production of government documents. Drafting, issuing, circulating and publicizing government documents and information in strict accordance with the gradual examination and approval system. The disclosure of government information strictly follows the principle of "who is in charge, who examines, who is open and who is responsible" to prevent the disclosure of personal privacy and state secrets.
(2) File management. In strict accordance with the requirements of archives utilization and management, centralized storage and management of the files of floating personnel and cadres and workers, equipped with full-time archivists, and strengthened the construction of hardware facilities such as archives warehouse and system equipment to ensure that personnel, facilities and funds are in place. Strictly implement the procedures for consulting the borrowed files to ensure the safety of the file information: if the borrower is himself or his relatives, if the procedures are incomplete or the reasons are insufficient.
Confidential self-inspection report 4
In order to do a good job of confidentiality, our bureau conducted a self-examination one by one in combination with the actual work and against the inspection catalogue. The self-inspection is now reported as follows:
First, the basic situation:
Anti-virus software has been installed on all computers in our bureau, which are regularly disinfected and upgraded, and special personnel are appointed to engage in computer security management. Designate a special person to properly handle the receiving and dispatching, registration, transmission, archiving and destruction of documents, to ensure the safety of confidential documents, records and materials in the process of transmission and use, and not to neglect or disclose secrets. Further clarify that the confidentiality work should be based on rules, evidence and standards, and realize institutionalization, standardization and scientificity. Through self-examination, the computer security work of our bureau has basically achieved the system, management and inspection in place.
Second, the main approach:
(1) Attach great importance to and strengthen organizational leadership. The leaders of our bureau attached great importance to it and set up a leading group for confidentiality work to strictly implement confidentiality work. Members of the leading group set an example, consciously study and master the secrecy system, so as to know the law, understand the law and enforce the law, and truly establish a style of obeying the law, abiding by the law, prosecuting offenders and prohibiting them among cadres and workers.
(2) Highlight key points and pay close attention to the implementation of the work. Our bureau regularly focuses on monitoring the illegal outreach of computers and mobile storage media and special Trojans, so as to investigate and promote management, take timely preventive measures, and resolutely cut off all channels through which classified information flows to the Internet.
(three) publicity and education, enhance the sense of confidentiality. In order to strengthen the safety awareness of the secret-related personnel in our bureau, we have adopted various ways and channels to publicize and educate the relevant personnel, and forwarded all kinds of secret-related learning documents to each unit room. It is required to organize the study seriously and implement it in combination with the actual situation to ensure the safety of computers and their networks.
(4) Improve measures and strictly standardize the system. Strengthening system construction is the guarantee of computer security management. In order to build a scientific and strict prevention system, our bureau has continuously improved various rules and regulations and standardized the security management of computers and their networks, and mainly adopted the following measures: First, computers have implemented the relevant provisions and requirements of the documents of higher-level secret departments, and constantly enhanced the potential of doing a good job in computer security management according to law; The second is to formulate various confidential and non-confidential computer and network management systems in this bureau; The third is to strictly regulate the flow of classified information and strictly implement the principle of "classified information does not go online, and online information is not classified".
In the future work, our bureau will further strengthen the importance of confidentiality, strengthen the management of confidential information, strive for new achievements in confidentiality, and ensure the smooth development of confidentiality.
Confidential self-inspection report 5
According to the requirements of xxx Archives Bureau, combined with the inspection contents and related requirements. At the beginning of June, our bureau carried out a comprehensive file safety inspection and self-inspection activity for the unit file room, departments involved in file filing and relevant personnel, and at the same time conducted a comprehensive file safety publicity for all cadres and workers. The summary report of self-inspection is as follows:
First, leaders attach importance to strengthening archives safety awareness and the construction of archives facilities, the safety management of archives information systems, and standardizing operations.
Archival safety is the most important thing in archival work, and it is the unshirkable responsibility of archivists to ensure archival safety. Our bureau attaches great importance to the safety of archives and implements the responsibility system of safety leadership. This year, after the launch of the education activity to maintain the advanced nature of party member, we strengthened the leadership of archives security and confidentiality, established and improved the responsibility system for archives management, defined various responsibilities, implemented archives work, and ensured the smooth development of archives security work. Archivists should also wake up the alarm bell, firmly establish the idea of safety first and prevention first, resolutely prevent lax and fluky psychology, and ensure the safety of archives.
With the gradual development of electronic file management system, with the attention of unit leaders, computers are applied to file arrangement. At the beginning of this year, a computer was specially equipped for the archives management of the unit, and in early March, a set of software "Nantian Archives Computer Management Information System" was purchased from the National Archives as required, and a special person was responsible for its implementation. Standardize operation and orderly utilization. We also set up a firewall and password access control for the information system, purchased and installed a security isolation card, established a backup recovery system, and constantly improved the security management system of the file information system to ensure the security of the file information system. In terms of management, an electronic filing system and a recording system for document management have been established, and the custody system has been strictly implemented, which effectively ensures the safety management of the archives information of our bureau from two aspects of technical requirements and management measures.
Two, earnestly implement the establishment and implementation of archives security system, to ensure safety.
In order to do a good job in archives safety management, the unit archives room has strengthened the implementation of rules and regulations on archives storage, utilization, protection and confidentiality, and added and improved the system of ten precautions and eight prohibitions on fire safety in archives warehouse. We will continue to carry out special custody, special consultation and centralized filing of archives, and conscientiously implement the archives warehouse management system, archives statistics system, archives custody and confidentiality system, archives appraisal and destruction system, archives access and utilization system, and post responsibilities of archives administrators and other related systems. And earnestly implement the rectification in accordance with the requirements of various rules and regulations. Incorporate fire safety and water supply and power supply line supervision into the fire protection system of state official center, and make concerted efforts to strictly implement it, so as to truly eliminate the potential safety hazards of archives; The team leader of this unit is responsible for implementing the safety system on duty during holidays, carefully checking and making records; Arrange special personnel to implement and do a good job in the ten prevention of archives warehouse and the confidentiality of various files such as electronics and documents, and check them regularly. In addition, whether the equipped facilities are complete, such as filing cabinet, thermometer, automatic sprinkler system, anti-theft doors and windows, power cord, etc. , and check the quantity, quality and mildew of files, and implement the safety responsibility system of file management.
Three, strengthen the construction of job responsibilities of staff at all levels, improve the file management measures, conscientiously implement, to prevent leaks.
Continue to strengthen the construction of post responsibilities of staff at all levels, implement the Archives Law and national policies on archives work, regularly publicize the laws, regulations and provisions on archives work, and enhance the archives awareness of all staff in this unit. In accordance with the relevant laws and regulations, strengthen the supervision, inspection and management of the collection, identification and destruction of documents and materials, so as to make the archives management of our bureau more reasonable, standardized and scientific. We have formulated and implemented more effective measures:
On the one hand, strengthening the custody and confidentiality of archived documents and materials shall be managed by archivists in a unified and centralized manner, and no individual may misappropriate them without authorization. All confidential documents and materials should be carefully circulated and kept;
On the other hand, people-oriented, and strive to improve the professional quality of archives managers, my unit subscribes to relevant archives publications every year and actively participates in the training of archives professional technology and business knowledge. Archivists should conscientiously do a good job in sending and receiving documents, do a good job in collecting and sorting files, and ensure that the archived documents are complete, accurate and systematic; Do a good job in the statistics and utilization of archives, accurately count the inventory, receipt, destruction and utilization of all kinds of archives, compile historical archives in a planned and step-by-step manner, actively develop and utilize archival information resources, and ensure the provision of quality services for local chronicles; Manage archives in strict accordance with the secrecy law and the archives law to ensure the safety and utilization of archives. Strictly implement the borrowing rules and compensation system, and do a good job of confidentiality. Take the initiative to accept the business guidance, supervision and inspection of the competent department, and actively complete other work related to archives.
(1). Self-inspection and self-evaluation demonstration report of unit secrecy work (three articles) (2). Self-inspection demonstration report on unit secrecy work (four articles) (3). Self-inspection demonstration report on school secrecy (two articles) (4). Self-inspection demonstration report on unit secrecy work (two) (5). How to Write the Self-inspection Report on the Confidentiality Work of the Unit (three articles) (6). Education Bureau (7). Model essay on self-examination and self-evaluation report on confidentiality work of government organs and units (four articles) (8). Model essay on self-examination and self-evaluation report on bank secrecy (two articles) (9). Model essay on confidentiality undertaking of enterprise units (five articles) (10). Model essay on the contents of the company's confidentiality undertaking (three articles)
Through self-examination, our bureau further clarified the confidentiality of archives, but also found some weak links, such as: the archives room was not separated from the reference room, the insect repellent was not updated in time after moving, and the concept of confidentiality needs to be further strengthened.
In view of the above problems, we have formulated a rectification plan:
(1) Further organize to learn the basic knowledge of archives management and fully understand the importance of archives work. Intensify publicity to let everyone know about archival work and strengthen safety concept.
(2) Archives management should be based on serious, meticulous and timely work at ordinary times. Daily work should be sorted, classified and filed at any time to achieve standardized management.
(3) Strengthen supervision. Safety supervisors should conscientiously perform their duties, regularly check the documents of their own units, especially before the festival, form a system, correct problems in time, nip hidden dangers in the bud and ensure the safety of documents.
(4) Continue to establish and improve the file management system, and strictly implement the system.
Through this self-inspection, leaders at all levels, archivists and all cadres and workers in our unit have enhanced their awareness of file safety, firmly established their awareness of safety precautions, and further eliminated potential safety hazards during the inspection. In the future, our unit will continue to reflect the safety of archives in practical work in accordance with the spirit and requirements of this inspection, and persist in it to ensure the safety and integrity of archives. ;