Confidentiality guarantee

With the continuous progress of society, more and more affairs will use letter of guarantee, and the content format of letter of guarantee includes title, guarantee content and time. So what does the guarantee usually say? The following are nine confidentiality guarantees that I have carefully arranged. Welcome to reading. I hope you will like them.

Confidentiality guarantee 1 I am mainly responsible for the confidentiality of the national unified entrance examination papers for ordinary colleges and universities in 20xx. I will strictly perform my duties as a confidential clerk, stick to my post, keep state secrets, work hard to ensure the safety of transportation, distribution, storage and use of test papers, and ensure that I will not practice favoritism at any time. Adhere to the patrol system, strictly implement the relevant provisions of the "Detailed Rules for the Implementation of the National Unified Examination for Enrollment of Ordinary Colleges and Universities in 20xx" to ensure that there is no problem in the transportation, storage, distribution and use of this ordinary college entrance examination paper.

If there is a problem, I am willing to accept all the handling of the organization.

Guarantor: MM DD YY.

Chapter II Security Guarantee In order to implement the security and confidentiality of intranet and information, improve the security and confidentiality awareness of users of intranet and application systems, enhance their sense of responsibility, and ensure the security and confidentiality of intranet and information, this security and confidentiality responsibility book is formulated according to the management responsibility system of "who is in charge and who is responsible" and "who uses and who is responsible". The company requires each intranet user to:

First, clarify the "tripartite responsibility". First, the responsibility of leadership; The second is the responsibility of the competent department; The third is the responsibility of users. In particular, it is necessary to clarify the responsibilities of users of internal information networks, conscientiously implement various safety and confidentiality management rules and regulations, actively participate in various safety and confidentiality studies and activities, and know the types of violations of "one machine can be used for two purposes" without violating the relevant regulations.

Second, memorize the "four no's". First, it is strictly forbidden to handle classified content on non-classified computers; Second, it is forbidden to store top secret information in the computer hard disk; Third, it is strictly forbidden to take work computers and classified mobile storage media out of the office; Fourth, it is strictly forbidden to use classified storage media on the Internet.

Third, understand the "five measures". First, understand the management measures of network access equipment; The second is to understand the management measures of application systems and websites; The third is to understand the management measures of network boundary; The fourth is to understand the management measures of digital certificates; The fifth is to understand the management measures of confidential information carriers.

Fourth, observe the "eight disciplines". First, it is not allowed to store, transmit and publish information involving state secrets on non-confidential networks; Second, it is not allowed to compile or spread destructive programs such as computer viruses in the intranet; Third, it is not allowed to establish websites, web pages and services unrelated to internal work in the intranet; Fourth, it is not allowed to spread and paste harmful information or information unrelated to work in the intranet; Fifth, it is not allowed to scan, detect or invade internal information systems without authorization; Sixth, internal information and resources are not allowed to exceed the authority.

Access, illegal use; Seventh, it is forbidden for non-internal personnel to contact and use intranet networks and information without permission; Eighth, it is forbidden to take various means to evade, hinder or confront the internal network and information security inspection.

I promise that I have studied and mastered the relevant regulations according to the above requirements. If there is any violation of the rules, I will abide by the above regulations, keep state secrets, and accept the handling of relevant organizational disciplines and laws and regulations.

Signature of unit leader: Date of 20.

Signature of person in charge: Date of 20.

Note: This responsibility letter is signed by all other users of the intranet. According to the work requirements of "grasping the first level at first level and implementing the first level at first level", network users at all levels sign with the leaders at the next higher level, for example, the main leaders of the branch sign with the main leaders of the branch, or all employees of the branch sign with the main leaders of the branch directly.

I understand the relevant confidentiality laws and regulations, and I know my confidentiality obligations and legal responsibilities. I solemnly promise:

First, earnestly abide by the state secrecy laws, regulations and rules, and fulfill the obligation of confidentiality;

Second, do not provide false personal information and voluntarily accept confidentiality review;

The third is not to record, store and copy information in violation of regulations, and not to save information carriers in violation of regulations;

4. Don't disclose the information you have contacted and learned in any way;

Five, in accordance with the principle of "who is in charge who is responsible, who is responsible for running, who is responsible for using", comprehensively determine the scope and quantity of classified computers, and register the classified computers in a unified number, and implement the responsibility to people.

Sixth, strengthen safety awareness. Adhere to the principle of "no secrets online, no secrets online" to prevent leaks in use. Strictly distinguish between classified computers and Internet computers, and prohibit classified computers from accessing the Internet and other public information networks; It is forbidden to copy the data on the Internet public information network into the confidential information system without protective measures; It is forbidden to mix classified computers and classified mobile storage devices with non-classified computers and non-classified mobile storage devices. It is forbidden to use devices with wireless interconnection function to handle confidential information. Internet site information release should be unified and centralized, and it is forbidden to release classified information on Internet sites.

Seven, the implementation of a fixed responsibility system for classified computers, the system of regular inspection of classified computers, from the management to ensure that the security work "zero mistakes." The first is to implement the fixed responsible person system for classified computers. The secret-related computer is in the charge of a special person, and the office is independent. Without permission, the person in charge of the classified computer shall not be changed at will; When the non-responsible person really needs to use the computer, he must obtain the permission of the responsible person and accept the supervision of the responsible person; The second is the system of regular inspection and spot check of classified computers. In order to prevent confidential computers from leaking, the leaders in charge of security work take the lead in organizing regular inspections and irregular spot checks, conducting security inspections on confidential computers, and rectifying problems in time when they are found, effectively improving the confidentiality awareness and ability of window personnel.

Eight, when leaving, voluntarily accept the confidentiality period management, signed a confidentiality commitment. Violation of the above commitments, voluntary commitment to party discipline, political responsibility and legal consequences.

Signature of promisor: _ _ _ _ _ _ _

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Confidentiality Guarantee Article 4 Party A: (hereinafter referred to as Party A)

Party B: (hereinafter referred to as Party B)

Xx-x (hereinafter referred to as Party B) is an engineer of xx-x Department (hereinafter referred to as Party A), and is responsible for saving, continuously updating and establishing relevant data such as formulas of various lcp products. In order to protect the confidentiality of Party A's formula, Party B hereby guarantees and agrees to unconditionally abide by the following terms:

1. Party B promises to take good care of the kind manager, properly keep, continuously update and establish undisclosed information such as formula, technology and related business secrets that are known or mastered due to this contract, and shall not disclose or deliver it to any third party or make it known to any third party without authorization.

2. Without the consent or authorization of Party A, Party B guarantees that it will not disclose the formula and intellectual property rights mentioned in the preceding article to a third party without reason. If there is any violation, Party B is willing to accept the punishment of Party A unconditionally and bear the relevant losses caused to Party A therefrom. ..

3. Party B guarantees that it has not been employed, engaged, invested or operated full-time or part-time, and has not invested, operated, employed or engaged in any other relationship or behavior that directly or indirectly conflicts with the interests of Party A during the signing and tenure of this guarantee. ..

4. After Party B doesn't work in Party A, based on his professional ethics, Party B promises to keep all the formulas, technologies and related business secrets confidential during his work in Party A's company, and immediately or within the specified time, deliver all the documents, data, charts, computer disks or other storage media containing the above business secrets to Party A or its designated personnel.

At the same time, at any time within two years from the date when Party B does not work for Party A, without the written consent of Party A:

(1) Party B shall not directly or indirectly establish, invest, be employed by itself or be employed by itself in the name of any third party.

Where Party A confirms that Party B has the obligations mentioned in the preceding paragraph after leaving the company, it shall be agreed by both parties separately.

(2) Party B shall not directly or indirectly recruit or employ any employee of Party A for itself or any third party.

5. If Party B violates the provisions of the preceding paragraph enough to damage the interests of Party A, it shall compensate Party A for its losses. ..

6. When this guarantee involves litigation, both parties agree to accept the local court as the court of first instance.

7. This guarantee is made in duplicate, one for each party.

warrantor

Party A:

Person in charge:

Party B:

ID number:

Year, month and day

Letter of Commitment on Confidentiality Article 5 Letter of Commitment on Confidentiality (sample)

(applicable to on-the-job personnel)

I understand the relevant confidentiality laws and regulations, and I know my confidentiality obligations and legal responsibilities. I solemnly promise:

First, earnestly abide by the state secrecy laws, regulations and rules, and fulfill the obligation of confidentiality;

Second, do not provide false personal information and voluntarily accept confidentiality review;

3. Do not record, store or copy state secret information in violation of regulations, and do not keep state secret carriers in violation of regulations;

Four, not to reveal the contact and understanding of state secrets in any way;

Five, without the approval of the unit, shall not be allowed to publish articles and writings involving undisclosed work content;

Six, when leaving the company, voluntarily accept the confidentiality period management, and sign the confidentiality commitment letter. Violation of the above commitments, voluntary commitment to party discipline, political responsibility and legal consequences.

Signature of the promisor:

Date, year and month

Letter of Guarantee for Confidentiality Article 6 According to the Law of People's Republic of China (PRC) on Guarding State Secrets and the Regulations on the Administration of Military Confidential Personnel, our company is willing to receive confidentiality education, observe confidentiality discipline, fulfill confidentiality obligations, and make the following confidentiality commitments to the responsible units:

1. The company will strictly abide by the confidentiality laws and regulations of the state and the army and various rules and regulations.

2. The company shall not disclose the number, residence, task nature, number of scrapped equipment and confidential information of the troops involved to a third party.

3. Our company is responsible for the confidential management of the on-site personnel of this unit, and it is forbidden to take photos or videos. , consciously abide by the supervision and inspection of your unit.

4. Without permission, the company shall not prepare for disassembly without permission, and it is strictly forbidden to keep and destroy the equipment without permission.

5. In case of violation of the above commitments, the Company will bear corresponding responsibilities and legal consequences.

Confidentiality Guarantee Article 7 Party A:

Party B:

Date of signature: year month day.

In order to strengthen the confidential management of technical data and data of * * management system, in accordance with relevant national laws and regulations, both parties have reached the following agreement on the confidentiality of software modification and improvement, data processing and technical support services (hereinafter referred to as the project) provided by Party B to Party A based on the principles of equality, voluntariness, consensus and good faith:

I. Confidential information

1. Project design, pictures, development tools, flow charts, engineering design drawings, computer programs, data, patented technology, bidding documents and other items involved.

2. Party A shall provide Party B and its staff with the data, procedures, user names, passwords and materials needed in the implementation of the contract project;

3. Business and technical documents involved in the research and development stage of Party A's application software scheme, including policies, scheme design details, program files, data structures, software and hardware of related business systems, documents, tests and data generated from tests, etc.

4. Other confidential contents that Party A reasonably considers and informs Party B..

Second, the scope of confidentiality.

1. Existing technical secrets of Party A:

2. The scientific research achievements and technical secrets held by Party B shall be used by Party A upon mutual agreement;

Three. Privacy Policy

1. Party B shall strictly keep the confidential information of Party A, and shall not seek personal gain or damage the interests of Party A in any other way.

2. Without Party A's written permission, Party B shall not disclose Party A's confidential information to relevant units or individuals in any name.

3. Without the written permission of Party A, Party B has no right to use Party A's technical data and technical achievements in other projects.

4. Without the written permission of Party A, Party B shall not modify, supplement or copy the relevant confidential information.

5. Without Party A's written permission, confidential information shall not be taken out of Party A's premises in any way.

Four. Ownership of confidential information

The above confidential information belongs to Party A. ..

Verb (abbreviation for verb) confidentiality period

The confidentiality period of this agreement is 5 years.

1. After the expiration of this agreement, if some confidential information contained in this agreement has not lost its confidentiality, this agreement is still valid for the information that has not lost its confidentiality, binding the actions of both parties.

2. This agreement is specially formulated to prevent Party A's confidential information from being leaked within the validity period of this agreement. When the cooperation project between Party A and Party B is terminated for any reason, Party B shall return it to Party A..

All relevant information and documents of Party A, but this does not exempt Party B from confidentiality obligations.

Six, relationship restrictions

This agreement shall not serve as the basis for establishing any cooperative relationship or other business relationship between the two parties.

Seven. responsibility for breach of contract

If Party B fails to abide by the agreement, Party A has the right to terminate the cooperation project between the two parties, and Party B shall pay the amount of the cooperation project to Party A as liquidated damages, and compensate Party A for other losses according to the compensation amount determined by the people's court with jurisdiction. Party A has the right to further investigate all relevant legal responsibilities.

Eight. any other business

1. This agreement is written in Chinese in duplicate, with each party holding one copy, and each agreement has the same legal effect.

2. Matters not covered in this agreement shall be settled by both parties through consultation.

3. This agreement shall come into effect as of the date of signature by both parties.

Party A: (signature) Party B: (signature)

Chapter VIII In order to resolutely put an end to computer illegal activities, further improve network security, provide strong network security guarantee for information construction, improve the safety awareness of users of networks and application systems, enhance their sense of responsibility, and ensure the security and confidentiality of networks and information, according to the management responsibility system of "who uses and is responsible" and combining with the actual situation, the "Responsibility Letter for Network and Information Security" was formulated and required to be signed by all police who use computers.

First, the office private network is completely physically isolated from the Internet, and no other network equipment is used, resulting in "one machine can be used for two purposes".

2. In principle, office computers shall not be equipped with floppy drives, CD-ROMs and open USB interfaces, and computers with floppy drives, CD-ROMs and open USB interfaces must be installed due to work needs. Foreign and self-used mobile storage devices shall not be used. Foreign floppy disks, CDs and mobile storage devices must be checked and registered by the computer information security management team before they can be used in the office private network. Comprehensively prevent "public and private" in the use of mobile storage devices.

Third, the daily prevention of computer security

1, manage the computer I use, and prohibit outsiders and irrelevant personnel from using and tampering with the computer.

2. No one is allowed to install the software at will. If necessary, install work-related software. The personnel designated by the computer information security management team shall assist in the installation.

3. The computer should be provided with passwords for startup, warm startup, network login and screen protection. When you leave your computer temporarily, please make sure that the file you are editing is closed or the application system you are using is closed.

Quit and start the screen saver.

4. Open passwords should be set for important files.

5. The password or password length set in the computer system or file shall not be less than 8 characters; Passwords with complex composition and difficult to guess should be adopted, which should generally be a combination of two or more of uppercase and lowercase English letters, numbers and special characters; Password replacement cycle shall not exceed one month.

6, each user must properly manage their own password, password should be changed regularly, and shall not be leaked at will.

Four, this responsibility in triplicate, effective from the date of signature, computer information security management team and the responsible person each hold one copy.

Management organization: signature of the person in charge of computer information security management group: person in charge: telephone number: date of signing: year month date of signing: year month day.

Confidentiality Letter 9 Villagers' Committee of Taozhai Village, Qingcun Town, Fengxian District, Shanghai:

I have taken the serial number Tao Zhai Zhi (II)-Contemporary Figures and Genealogy Volume (20xx Edition) [hereinafter referred to as Tao Zhai Zhi (II)], * * _ _ _.

I am fully aware that The Records of Tao Zhai (Volume II) contains a lot of information about individuals, families, personal relationships, etc. It is a top secret document and is not allowed to spread abroad.

I promise and guarantee that:

(1) The above numbered Tao Zhai Zhi (Volume II) is kept and collected by myself, and only passed on to immediate family members for further storage and collection.

(2) Without the written permission of your villagers' committee, you are not allowed to copy, scan, duplicate or fax, upload or save any page or content of Tao Zhai Zhi (Volume II) in any network or information system, not to mention.

(3) Without the written permission of your villagers' neighborhood committee, the serial number of the above-mentioned "Tao Zhai Zhi" (Volume II) is only circulated within the scope of my relatives, and it is not for external reading. When relatives circulate it, they are not allowed to copy, scan, duplicate or fax any page or content of Tao Zhai Zhi (Volume II), let alone upload or save it in any network or information system. After circulation, the Taozhai record (Volume II) with the above number was immediately kept and collected by me.

(4) If I violate the above (1), (2) and (3) and cause consequences, I am willing to bear all responsibilities.

This undertaking and guarantee are made in duplicate, one for your village committee and one for myself.

Commitment and Guarantor (signature):