Seven confidential self-inspection reports of the Bureau of Commerce

Confidential self-inspection report of the Bureau of Commerce 1

According to the spirit of "Notice on Centralized Inspe

Seven confidential self-inspection reports of the Bureau of Commerce

Confidential self-inspection report of the Bureau of Commerce 1

According to the spirit of "Notice on Centralized Inspection of the County's Confidentiality Work" issued by the X County Committee's Security Committee, our bureau has seriously carried out self-inspection and self-inspection report on confidentiality work in view of some problems and weak links notified in the document. The situation is summarized as follows:

One is to strengthen organizational leadership.

Since 20xx, under the guidance of the confidentiality committee of the county party committee, our bureau has conscientiously implemented the spirit of the document "Notice on Further Defining and Strengthening the Responsibility System for Confidential Work", focused on the confidentiality management of confidential personnel, secret vector and confidential computers, further strengthened the leadership of confidentiality work, strengthened the confidentiality management, strengthened supervision and inspection, paid close attention to the implementation of various confidentiality measures and the responsibility system for confidentiality, and put an end to major leaks.

First, the bureau party group always put the confidentiality work on the important agenda, paid close attention to the implementation of the responsibility system, held a special meeting at the beginning of the year to formulate confidentiality measures, and formed a management system in which the top leaders took overall responsibility, the leaders in charge took their respective responsibilities, and the office organized and coordinated.

Second, in order to adapt to the new situation and new problems of secrecy work under the new situation, a leading group for secrecy work with the director as the team leader and the heads of various departments, offices and centers as members has been further improved, and an office has been set up to handle the daily affairs of secrecy work, which has provided a strong organizational guarantee for the full implementation of secrecy work. Third, adhere to the principle of who is in charge and who is responsible, implement the target responsibility system, and incorporate it into one of the contents of the overall target assessment, and decompose the target tasks into all units under the bureau, so that there are arrangements at the beginning of the year, inspections at ordinary times, and assessments at the end of the year.

Second, strengthen publicity and education.

Strengthening safety education and safety concept is the premise and foundation of doing safety work well. In this regard, our bureau attaches great importance to the publicity and education of confidentiality work, leading cadres and secret-related personnel insist on taking the lead in earnestly studying the relevant provisions of various confidentiality work, and constantly improve the level of managing confidentiality work according to law. At the same time, various meetings and other forms are used to strengthen the publicity and education of employees' confidentiality work, so as to urge the majority of employees to consciously fulfill their confidentiality obligations and responsibilities and change the wrong concept that it is difficult to protect secrets without confidentiality.

Third, improve the system.

First, further improve the confidentiality rules and regulations to ensure the safety of key confidential parts; The second is to adhere to the quarterly inspection system for the management and use of secret vector in our bureau, and rectify the deficiencies and hidden dangers found in the inspection in strict accordance with the requirements; Third, the computer management system has been formulated, the computer network security protection has been checked, and the LAN antivirus software has been upgraded regularly every week. Adhere to the principle that whoever accesses the Internet is responsible. Online information is not classified, and classified information is not accessed online, so as to prevent the occurrence of leaks.

Fourth, strict confidentiality management.

One is to strengthen the management of secret carriers. In order to ensure the safety of secret vector, based on the principle of strict management, strict prevention, ensuring safety and convenient work, and in strict accordance with the requirements, our bureau has strengthened the management of the eight links of secret vector's production, receiving, sending, use, preservation and destruction, so that the management of secret vector has entered a standardized track. (In the production process, both paper media carriers and magnetic media carriers are uniformly produced in the office, and materials that do not need to be archived are destroyed in time. In the process of receiving, sending and transmitting, the procedures of counting, registration, numbering and distribution should be strictly fulfilled. When transmitting, the confidential personnel shall be designated to be responsible, and corresponding security measures shall be taken. In the use of links, strictly know the scope of personnel, expand the scope of knowledge without authorization. Anyone who is not allowed to record or video, the communicator must declare in advance, and the reproduction of secrets must be approved by the competent leader, and the registration procedures must be fulfilled. In terms of storage, it is filed in strict accordance with the national archives laws and regulations, and designated personnel are responsible for it, equipped with necessary security equipment. In terms of destruction, we should conscientiously perform the procedures of examination, counting and registration, and adopt corresponding non-public methods to prevent secret vector from being sold as waste.

The second is to strengthen the confidentiality management of archives. In order to strengthen the security and secrecy in the borrowing and circulation of documents and archives, the system of file keeping, post responsibilities of archivists, document data collection, file handover, file destruction and file circulation has been further improved. Through the establishment of these systems, the work of receiving, sending, circulating, returning and borrowing files has been strengthened, so that the files of our bureau can be retired and circulated in a timely and comprehensive manner, and the files can be filed, filed, handed over and destroyed safely. The third is to implement special personnel to manage classified computers. Designate a special person to manage confidential computers, strengthen the education and training of operators, and implement post responsibilities. The fourth is to strengthen information submission and approval. Strengthen the examination and approval system for online submission of information. Any information submitted to government websites must be approved by the office before submission.

In the future, we are determined to take this self-examination as an opportunity, unremittingly do a good job in the education and management of all personnel, especially those who are classified, strengthen business training and on-the-job training, constantly improve rules and regulations, strengthen the sense of confidentiality, resolutely put an end to the problem of leaking secrets, and create favorable conditions for the economic construction and development of xx County.

Confidential self-inspection report of the Bureau of Commerce II

According to the Notice of Jinjiang Municipal People's Government Office on Forwarding the General Office of the State Council on Further Improving the Confidentiality Review of Government Information Disclosure, Xiyuan Street attached great importance to it and organized relevant departments to conduct a comprehensive self-examination of the confidentiality review of street government information disclosure. The basic situation is as follows:

I. Establishment of the system

In strict accordance with the requirements of the Regulations on the Openness of Government Information and the Interim Measures for the Confidential Review of Government Information Release in Fujian Province, and in accordance with the Law of People's Republic of China (PRC) on Guarding State Secrets, the Regulations on the Openness of Government Information in People's Republic of China (PRC) and other relevant laws and regulations, and with reference to the confidential review system of information disclosure of Jinjiang Municipal People's Government, Xiyuan Street has promulgated a confidential review system for information disclosure, which was approved by the joint meeting of the party and government.

Two. Implementation of working mechanism and responsibility system

Street in the Jinjiang Municipal People's Government Information Disclosure and Confidentiality Review System "on the basis of the provisions, to further clarify the division of responsibilities, review procedures and accountability measures for confidentiality review, to ensure that no leaks occur, so as to manage people according to the system and handle affairs according to procedures, and to ensure the smooth development of government information disclosure.

The government information voluntarily disclosed shall be determined, produced and updated by relevant departments, and released after being approved by the leaders in charge; For government information that will not be made public, the specific reasons shall be explained, and the person in charge of the department shall review it and report it to the audit leader for approval.

Three, the government public information release

Streets strictly abide by the relevant provisions of the Regulations on the Openness of Government Information and the Interim Measures for the Confidential Review of Government Information Openness in Fujian Province, and strictly control confidential information such as stability, politics and law, letters and visits, ethnic and religious affairs, national security, public safety and economic security to ensure that confidential information is not online.

Upon examination, up to now, no classified information has been found on the government information publishing platform.

Four, the problems found in the process of self-examination and corrective measures

1, improve the system and standardize management. Strengthening system construction is the guarantee of confidentiality review management. Although the relevant confidentiality review system has been established, the basis of the review is relatively wide, and it is sometimes difficult to find a basis. Therefore, it is necessary to further refine the basis of confidentiality review in combination with the actual situation of the unit. Conscientiously implement the relevant provisions and requirements of the documents of the superior secrecy department, and constantly enhance the ability to do a good job in confidentiality review and management according to law. In view of the problems existing in information release, it is required to strictly examine, control and check online information, eliminate the hidden danger of leakage from the system, and ensure that online information is not classified and confidential information is not online.

2. Strengthen publicity and raise awareness. Take publicity and education as the leading factor, and strengthen the sense of confidentiality. Strengthen publicity, enhance confidentiality awareness, improve the initiative and consciousness of doing a good job in confidentiality, further improve the corresponding rules and regulations, earnestly strengthen and attach importance to the confidentiality management of online information, and ensure that the information disclosure review is in place.

3. Strictly supervise and guard against loopholes. In order to ensure the implementation of various rules and regulations on confidentiality review management, discover hidden dangers of confidentiality review in time, and plug management loopholes, the implementation of computer and its network management system, the construction and use of classified networks, and the implementation of management and preventive measures taken by classified computers and classified networks are regularly inspected by combining self-examination with spot check, daily inspection with key inspection, and regular inspection with surprise inspection.

Confidential self-inspection report of the Bureau of Commerce 3

Since the establishment of our bureau, the confidential contents received and the related confidential matters generated in the county have been properly handled in accordance with the relevant provisions of the secrecy law, ensuring the security of confidential documents, records and information in the process of transmission and use, and there has never been negligence and leakage. However, according to the requirements of higher authorities, there are still some gaps and deficiencies, and it is still a long way to go to do a good job of confidentiality. In the future work, our bureau will further strengthen the importance of confidentiality, strengthen the management of confidential content, strive for new achievements in confidentiality, and ensure the smooth development of urban management law enforcement.

According to the spirit of "Notice on Carrying out the General Inspection of Safety Work in the Region" (No.20xx[27]), our bureau conducted a self-examination of the annual safety work in strict accordance with the requirements of the document, and the special report is as follows:

First, attach great importance to and strengthen responsibility.

As an important work department of the district government, the party group of the sub-bureau has always regarded confidentiality as an important work and has always made unremitting efforts. Since the beginning of this year, according to the personnel changes, we have further adjusted the leading group for the confidentiality work of the sub-bureau, with the party secretary and director of the bureau as the team leader, the leaders in charge as the deputy team leader, and the heads of various departments as members. At the same time, he is determined to be a part-time safety officer, and the principle of post responsibility system and territorial management is implemented for safety work, so that the organization, personnel, responsibility and system of safety work can be implemented.

Second, improve the system and implement the task.

First, establish and improve rules and regulations. This year, our bureau further revised and improved the internal security system, and installed the security system on the wall in key parts such as the archives room and printing room. At the same time, in the case of insufficient government funds, we also specially allocated funds for the security infrastructure construction of archives, computer rooms and financial rooms to prevent leaks and secret-related incidents. The second is to collect last year's files into file management in time to ensure that confidential documents are not leaked. The third is to strengthen the management of archives and printing rooms. It is strictly stipulated that archivists should be transferred from their posts and held accountable if they leak or lose their secrets. File inquiry must be registered and signed, and relevant files can only be inquired with the consent of the director. There are many confidential matters in the printing room, so we have strengthened the education of employees' confidentiality awareness and asked them to make a promise never to reveal secrets. Four, the recycling of waste paper and documents of the bureau shall be carried out by the recycling point designated by the Security Committee, and the relevant documents shall be destroyed in time according to the regulations, so as to ensure that the waste paper basket does not leave complete documents and papers. The fifth is to register and distribute the secret documents issued by superiors and recover them in time. Sixth, this year, two major safety and confidentiality inspections were carried out at the grassroots level to urge the improvement of the confidentiality system and the implementation of confidentiality measures.

Three, clear focus, strengthen management

The finance office, archives room and computer of our bureau are the key departments and parts of confidentiality. In view of these three key parts, we have strengthened management to ensure that there is no leakage problem. In file management, we have formulated the confidentiality responsibility of archivists, and the procedures for consulting, borrowing and reading files are complete; The transmission, recovery and cancellation of secret documents and internal materials shall be handled in strict accordance with the confidentiality provisions. In the management of the financial office, we establish financial files for financial data, and review and save them in strict accordance with the financial system. No one can consult except financial personnel and archivists. If it is necessary to consult them for special reasons, it must be signed by the leaders in charge. In terms of computer information system security, we install genuine firewall and anti-virus software in each computer system, and the overall management of computers is carried out by special personnel. Financial and physical isolation of confidential computers is prohibited.

Fourth, strengthen rectification and pay attention to actual results.

After this year's regional safety work conference was held, according to the requirements of the conference, our bureau sorted out four outstanding problems that were not in place in time and did a good job in rectification. For example, in view of the problem that some cadres and workers are not aware of confidentiality, the branch office uses various meetings to strengthen the confidentiality education for cadres and workers. The Party Secretary and Director of the Bureau ask everyone to do what not to say and what not to say in accordance with the provisions of the Secrecy Law, always keep in mind the Ten Secrecy Rules, establish the concept of the overall situation, safeguard the overall interests and maintain social stability. At present, four problems that are not in place have been rectified.

The confidential work of our bureau is not only done frequently, but also planned at the beginning of the year, and it is included in the assessment of target management of our department, which is one of the important basis for the promotion of cadres on the basis of merit. In the year-end target assessment of grass-roots units, it is stipulated that any loss or disclosure shall not be rated as advanced units, and the person in charge shall not be rated as advanced individuals. So far, there has been no loss or leakage in the overall situation. Although we have made some achievements in security work, there are still some shortcomings, mainly in the following two aspects: First, there is still a lack of adequate technical support for the security management of computers and local area networks. At present, it can only be restrained by the conventional secrecy system, and it sometimes seems inadequate to take strict monitoring measures just in case. Second, it is difficult to determine the classification of internal data, because it is difficult to grasp the classification and scope, which leads to the difficulty in defining the requirements and norms in the work. In the future, we will continue to work hard to consolidate and carry forward the achievements made in the past, actively explore and study the new situation and new problems in the security work in the new period, and strive to bring the security work to a new level.

Confidential self-inspection report of the Bureau of Commerce 4

In order to do a good job of confidentiality, our bureau conducted a self-examination one by one in combination with the actual work and against the inspection catalogue. The self-inspection is now reported as follows:

I. Implementation of Confidentiality Work

My office has three internal organizations and five computers. At the same time, all computers have installed anti-virus software, regularly upgraded anti-virus, and designated personnel to engage in computer security management. Designate a special person to properly handle the receiving and dispatching, registration, transmission, archiving and destruction of documents, to ensure the safety of confidential documents, records and materials in the process of transmission and use, and not to neglect or disclose secrets. Further clarify that the confidentiality work should be based on rules, evidence and standards, and realize institutionalization, standardization and scientificity. Through self-examination, the computer security work I have done is basically in place in terms of system, management and inspection.

Second, the main practices

(1) Attach great importance to and strengthen organizational leadership. The leaders of our bureau attached great importance to it and set up a leading group for confidentiality to strictly implement the confidentiality work. Members of the leading group set an example, consciously study and master the secrecy system, so as to know the law, understand the law and enforce the law, and truly establish a style of obeying the law, abiding by the law, prosecuting offenders and prohibiting them among cadres and workers.

(2) Highlight key points and pay close attention to the implementation of the work. Our bureau regularly focuses on the illegal outreach of computers and mobile storage media and special Trojans, so as to investigate and promote management, take timely preventive measures, and resolutely cut off all channels through which classified information flows to the Internet.

(three) publicity and education, enhance the sense of confidentiality. In order to strengthen the safety awareness of the secret-related personnel in our bureau, we have adopted various ways and channels to publicize and educate the relevant personnel, and forwarded all kinds of secret-related learning documents to each unit room. It is required to combine the reality, carefully organize the study, do a good job of implementation, and ensure the safety of computers and their networks.

(4) Improve measures and strictly standardize the system. Strengthening system construction is the guarantee of computer security management. In order to build a scientific and strict prevention system, China has continuously improved various rules and regulations and standardized the security management of computers and their networks, and mainly adopted the following measures: First, computers have implemented the relevant provisions and requirements of the documents of higher security departments, and constantly enhanced the potential of doing a good job in computer security management according to law; The second is to formulate the management system of all classified and non-classified computers and networks; The third is to strictly regulate the flow of classified information and strictly implement the principle of "classified information does not go online, and online information is not classified".

In the future work, our bureau will further strengthen the importance of confidentiality, strengthen the management of confidential information, strive for new achievements in confidentiality, and ensure the smooth development of confidentiality.

Confidential self-inspection report of the Bureau of Commerce 5

In order to do a good job in the confidentiality management of confidential documents and materials, our bureau conducted a detailed self-examination in combination with the actual work and compared with the inspection catalogue. The self-examination report is as follows:

I. Implementation of confidentiality work

The documents received by our bureau are properly handled by designated personnel, ensuring the safety of confidential documents, records and information in the process of transmission and use, without negligence and leakage.

Our bureau has an information room, which adopts the method of separating internal and external networks. At the same time, all computers are equipped with anti-virus software, regularly disinfected and upgraded, and designated personnel are engaged in computer security management. Through self-examination, the computer security work of our bureau has basically achieved the system, management and inspection in place.

Second, the main practices

(1) Attach great importance to and strengthen organizational leadership. The leaders of our bureau attached great importance to it and set up a leading group for confidentiality to strictly implement the confidentiality work. Members of the leading group set an example, consciously learn and master the secrecy system, so as to know the law, understand the law and enforce the law, and truly establish a style of abiding by the law, abiding by the law, prosecuting those who violate the law and prohibiting them among cadres and workers.

(2) Highlight key points and pay close attention to the implementation of the work. Our bureau regularly focuses on major departments and leaders, focusing on illegal outreach of computers and mobile storage media and special trojans, taking preventive measures in time to resolutely cut off all channels through which classified information flows to the Internet.

(three) publicity and education, enhance the sense of confidentiality. In order to strengthen the safety awareness of the secret-related personnel in our bureau, our bureau has adopted various ways and channels to publicize and educate the relevant personnel, forwarded all kinds of secret-related learning documents to the computer rooms of various units, and requested to organize and implement the learning seriously in combination with the actual situation to ensure the safety of computers and their networks.

(4) Improve measures and strictly standardize the system. Strengthening system construction is the guarantee of computer security management. In order to build a scientific and strict prevention system, our bureau has continuously improved various rules and regulations and standardized the security management of computers and their networks. Our bureau has mainly taken the following measures: First, the computer implements the relevant provisions and requirements of the documents of the higher-level secrecy department, and constantly enhances its ability to do a good job in computer security management according to law; The second is to formulate various confidential and non-confidential computer and network management systems in this bureau; The third is to strictly regulate the flow of classified information, and strictly implement the principle that classified information does not go online and online information is not classified.

(five) supervision and inspection, plugging management loopholes. In order to ensure the implementation of various rules and regulations on computer and its network security management, find hidden dangers in computer security work in time and plug management loopholes, our bureau attaches great importance to the supervision and inspection of computer and its network security work, and checks the implementation of computer preventive measures by combining self-examination with spot check, daily inspection with key inspection, and regular inspection with surprise inspection.

In the future work, our bureau will further strengthen the importance of confidentiality, strengthen the management of confidential content, strive for new achievements in confidentiality, and ensure the smooth development of confidentiality.

Confidential self-inspection report of the Bureau of Commerce 6

According to the spirit of the Notice of * * Public Security Bureau on Organizing Security Inspection Activities in Public Security Organs of the City (* * word [20xx] 1 1), the traffic police detachment of * * Public Security Bureau conducted an in-depth self-examination on the security work within the organs. The self-inspection is now reported as follows:

First, strengthen organizational leadership and enhance the sense of confidentiality.

We put the confidentiality work as an important agenda into the responsibility management of road traffic management, and made it clear that the top leaders in charge of the confidentiality work should take overall responsibility and the leaders in charge should be specifically responsible, and all departments should perform their duties, forming a management pattern of first-level management and first-level responsibility, and implementing the confidentiality responsibility layer by layer to ensure that institutions, responsibilities, measures and personnel are in place. In May this year, the detachment identified the key post security personnel, defined the responsibilities of the security personnel, and required each security personnel. The leaders of the detachment take the lead in setting an example in their daily work, consciously abide by the secrecy law and strictly abide by the secrets of the party and the state.

Take the lead: first, do not copy or extract the contents of state secret messages and telegrams, and take the initiative to go through relevant procedures in accordance with relevant rules and regulations when they must be used. Second, do not carry state secrets to public places. Third, when presiding over important activities, meetings or projects involving party and state secrets, they can strictly require themselves and relevant personnel to abide by the confidentiality provisions and personally participate in the formulation of confidentiality work plans. Fourth, strictly require yourself and the staff around you to strictly abide by the relevant provisions of the party and the state on confidentiality. Fifth, don't read confidential information, materials or talk about matters involving state secrets in public places, and don't take confidential documents home. Sixth, don't talk about matters involving state secrets with irrelevant personnel. Because the leaders set an example and set an example, they made a good start for the cadres and workers of the whole Committee, and there has never been a mistake for many years.

Two, strengthen the education and management of confidential personnel.

According to the confidentiality regulations, we systematically manage the confidential areas such as key organs, office automation equipment, meetings, paper confidential documents, data production, distribution, transmission, use and destruction, and the confidential management of files, documents and data. At the same time, the confidential documents, materials and mobile storage media used and preserved by individuals who have left their posts, left their posts, transferred to other posts and retired shall be cleared away, and they shall be required to sign a confidentiality responsibility letter. In addition, we also improve the quality of security work of security personnel through training, training meetings and personal self-study.

Third, improve the system to ensure implementation. System construction is the fundamental policy and the premise and guarantee of doing all the work well. Over the years, we have always put the system construction in an important position, and have successively formulated and improved the secrecy system, the management regulations on the use of seals, the official document secrecy system, and the computer network security system. , which stipulates the specific security behaviors of leading cadres and general staff in their study, work and life, and strictly stipulates the security responsibilities and security measures for secret meetings, so that the security work can be followed by rules and regulations.

Four, strengthen the safety management of key parts of the secret.

(1) In order to truly be "cautious and confidential", we have determined the archives, internal receiving and dispatching posts, computer systems, financial information, etc. in combination with the characteristics and actual situation of road traffic management. As a key part, and put it into the management of key parts, and effectively strengthen prevention.

(2) Distinguish classified computers from non-classified computers according to the characteristics of business work, identify computers involved in personnel, finance, traffic engineering, and traffic combat readiness classified data processing as classified special machines, and take special personnel management, no networking, password setting, file encryption and other security precautions. Strengthen the custody of computer data, and the leaders in charge provide or copy information and data to the outside world. The office is responsible for contacting professional computer companies, and sending technicians to the site of the unit for maintenance when the classified computers, classified software, hard disks and mobile disks fail, so as to ensure that the classified information will not be leaked or stolen.

(three) to strengthen the management of confidential documents and the security measures for the printing, storage, cleaning, filing and destruction of various documents. Especially the waste manuscript paper produced in the process of document formation, is burned centrally. Strengthen the confidentiality of issuing documents, reading documents and circulating them, adopt direct transmission method for circulated documents, strictly determine the scope of circulation, register and circulate them, count the number of copies, and track the circulation links such as whereabouts, reading documents and supervision. , and ensure the confidentiality of circulated documents. Organize the circulation and storage of confidential documents within the party in strict accordance with regulations.

(4) Strengthen the confidentiality of meetings. Hold important meetings, take security measures before the meeting, educate the participants on confidentiality, and stipulate confidentiality discipline. For meetings involving state secrets, choose the meeting place with safe and confidential conditions. The transmission of secret documents shall be handled in accordance with the provisions of the documents and the instructions of the superiors, and the scope of transmission shall not be expanded without authorization. Irrelevant personnel are strictly prohibited from entering the meeting. Documents during the meeting should be registered and distributed uniformly. After the meeting, conduct a security check on the venue to see if there are any lost documents, materials and notebooks.

* * The safety work of the traffic police detachment of the Municipal Public Security Bureau has done a lot of work in terms of legal management and confidentiality, which has ensured the healthy development of road traffic management, but there are also problems such as imperfect safety laws and regulations and imperfect safety measures for office automation systems. In the future work, we will further enhance our understanding of the importance of confidentiality, strictly implement the confidentiality system based on the principle of putting prevention first, increase the publicity of confidentiality education, strengthen the supervision of confidentiality departments and parts, and continuously enhance the ability of confidentiality prevention.

Please criticize and correct the shortcomings in the above report.

Confidential self-inspection report of the Bureau of Commerce 7

In 20xx, under the leadership of the confidentiality committee of the county party committee, the secrecy work of our bureau adhered to the purpose of ensuring safety and promoting development, with leaders' attention, sound institutions, clear responsibilities, effective measures and solid and effective secrecy work. The report on the self-inspection of confidentiality work in our bureau for 20xx years is as follows:

First, the development of confidentiality work

(1) Leaders attach importance to establishing and improving organizations.

The leaders of our bureau attach great importance to confidentiality and put it on the agenda as an important work. In 20xx, in order to further strengthen the leadership of secrecy work and clarify the responsibilities, our bureau set up a leading group for secrecy work, with Cang Shaoen, the director, as the leader, Wang, the deputy director in charge of the office, as the deputy leader, and other leaders and the heads of relevant stock rooms as members. The daily work of the leading group is the responsibility of the administrative office, which clarifies the confidentiality responsibility of each unit room. According to the secrecy law and relevant regulations, combined with my work practice, I formulated the "Regulations on the Work Management of County Economic and Information Bureau", which made detailed provisions on the scope of confidentiality, confidentiality responsibilities, and penalties for leaking secrets. And put the confidentiality system on the wall to ensure the relevant organizations and systems of confidentiality work. In carrying out our work, we will effectively arrange business work and confidentiality work together.

(two) to strengthen the education and management of secret personnel.

Combined with the actual work of our bureau, we formulated the "Regulations on the Administration of Confidential Personnel of County Economic and Trade Bureau", and designated a special person to be responsible for the confidentiality work of our bureau. At the beginning of the year, the secret-related personnel signed a confidentiality responsibility letter with the county secrecy committee, participated in all kinds of confidential knowledge training organized by the county secrecy committee on time, and obtained the qualification certificate of the secret-related personnel. In accordance with the provisions of the Secrecy Law and the needs of the work, our bureau conducts two confidential education activities for all cadres and workers every year. When discussing personnel or important issues at each meeting, special emphasis is placed on the education of leading bodies. In 20xx, I subscribed to 1 copy of Confidential Work magazine as required.

(3) Strengthen the management of the Cultural Affairs Office and the confidentiality of secret vector.

The office of our bureau has been doing a good job in the management of sending and receiving documents, and conducting a spot check on the documents once a week to find out the missing problems in time.

Two, five people to the county government to exchange and receive official documents, to carefully register, classification and leadership audit, strict countersigning procedures. According to the instructions of the leaders, documents that need to be urged and transferred should be read and approved in strict accordance with the prescribed scope. Documents that are confidential, secret and top secret shall not be copied or extracted, and individuals shall not keep them. The cleaning and destruction of confidential documents and materials shall be handled in accordance with relevant regulations. In combination with the relevant confidentiality system, confidential archives are managed by iron cabinets, bars and iron gates, with special personnel in charge. 20xx * * * received 996 foreign documents and materials, issued 458 documents and circulated them to 10 17.

(four) the use and management of classified computers

Our bureau attaches great importance to the management of confidential fax machines, photocopiers, computers and other modern office automation equipment, and designates special personnel to be responsible for it and strictly uses it. Computers are used by special personnel, and all confidential computers are not allowed to connect to the internet to ensure the safety and reliability of confidential information.

(five) the disclosure of government information

I set up a leading group for government information disclosure in time, with the director as the leader, the deputy director in charge of information as the deputy leader, and the members composed of the heads of various units. In strict accordance with the requirements of the document number. (20xx) 10 1, and assign a person familiar with computer operation to be responsible for the submission of government information disclosure. The government information disclosure and business window shall be handled by a computer, and it is stipulated that illegal websites shall not be entered in disorder, and those involved in secrets shall be responsible by themselves. According to the spirit of document La Management Measures (20xx) No.76, after the official implementation of the Regulations on the Openness of Government Information in People's Republic of China (PRC), our bureau set up a study and training leading group in time, carefully organized cadres and workers to study the regulations, and actively implemented them. Our bureau reported all kinds of information in time, enriched the contents of government affairs disclosure, set up 20 information columns, reported 58 pieces of all kinds of information in 20xx, and audited 29 items.

Second, the existing problems

In the year of 20xx, our bureau has made some achievements in its secrecy work, and there has been no leakage. But generally speaking, there are still some problems in the secrecy work of our bureau: first, the secrecy personnel are unprofessional; Second, the work is tight and loose; Third, the intensity and depth of confidential publicity are not enough; Fourthly, because the information workers are all part-time, the workload of each center is very heavy, so they can't concentrate on the collection work. A lot of information was reported late, and information collection was out of line, so information could not be collected and reported in time.

Third, the next work plan

In view of the above problems, in order to further do a good job in confidentiality and implement various confidentiality systems, the next steps of our bureau are as follows: First, further improve the sense of confidentiality responsibility and safety of all cadres and workers, especially those involved in confidentiality. Strengthen the publicity and study of confidential knowledge and the spirit of relevant documents; The second is to strengthen the implementation of the secrecy system, so that the secrecy work of our bureau can be done better.