2. For the classified information in the system, classify the classified information according to the relevant regulations, and mark the classified information and the off-line marking inseparable from the classified information.
3. Transmit secret information outside the control area where the military computer and its network are located, and adopt encryption measures according to the information security level; Transmit secret information in the control area and take corresponding encryption measures when necessary.
4, confidential information and important data in the system, according to the needs of the work and the principle of minimum authorization, no unit or individual may obtain, use, modify, copy and delete without authorization.
5, used to store confidential information and important data database, set the corresponding security measures.
6, for the important confidential information and data in the system, timely backup and remote storage, and according to the original security measures.
7. For hard disks, floppy disks, optical disks, magnetic tapes and other media that store classified information, the classification should be determined according to the highest classification of the information stored therein, and management should be implemented according to the specified security requirements.
8. The storage medium that has been processed with confidential information or important data shall not be transferred or lent to irrelevant personnel, taken out of the country without permission, or sent to an institution without security and confidentiality guarantee for repair.
9. Completely destroy the discarded confidential storage media.