Procuratorate confidential self-examination and self-assessment report

Procuratorate confidential self-examination and self-assessment report

All questions involving private information and important secrets should be kept confidential. Below, I have compiled the confidential self-inspection and self-evaluation report of the procuratorate for everyone. Welcome to read the reference!

Self-inspection and Self-evaluation Report on the Confidentiality Work of Procuratorial Organs 1. In order to further strengthen the confidentiality awareness of all police officers, strengthen the security and confidentiality of classified information, and prevent leakage incidents, Wuyuan County Procuratorate recently organized a self-inspection and self-evaluation activity on confidentiality and safety in the whole hospital according to the deployment of provincial and municipal procuratorates.

It is understood that the self-examination and self-evaluation activities of the hospital are divided into four stages: problem checking, special inspection, rectification and implementation, and superior supervision. In the problem-finding stage, it is mainly to find out whether the internal and external networks are isolated, whether the office computer is managed by a special person, whether the screen saver password is set, whether the classified electronic documents are encrypted, whether the mobile storage devices are cross-used, and whether classified and non-classified files are stored when sending and receiving files. In the special inspection stage, mainly led by the Security Office and the Technology Department, a comprehensive inspection was conducted on classified websites, classified networks of procuratorial private networks and non-procuratorial private networks, security and confidentiality protection of classified networks, security and confidentiality of application systems, security and confidentiality management of classified networks, management of security personnel, and operation and maintenance of classified networks. In the implementation stage of rectification, a special meeting was held mainly for the problems and weak links found in the inspection stage, the reasons were carefully analyzed, and the problems were deeply studied. The responsible departments and personnel were required to formulate rectification measures, and the rectification was in place within a time limit to eliminate potential safety hazards. The higher-level procuratorate checks the reported report without greeting, and supervises the rectification of the problem to ensure that the problem is suppressed in the hidden danger stage and ensure safety.

First, the implementation of the leadership responsibility system for confidentiality work and the construction of confidentiality system

(a) I stand to implement the leadership responsibility system for confidential work. The leading group attaches great importance to confidentiality as an important work, and plans, deploys, checks and summarizes it together with business work. The leaders in charge are responsible for safety work, and the handling personnel are responsible. They can master the basic knowledge of safety laws and regulations and safety technology, and be familiar with the basic situation of their own business and safety work. And in accordance with the confidentiality laws, regulations and relevant provisions, the confidentiality responsibility system has been established. Putting the responsibility on people, making the responsibilities and tasks of each post clear, laid a strong organizational foundation for the smooth development of our unit's confidentiality work.

(2) Construction of confidentiality system. The office security system has been formulated, including the security management system of classified and non-classified computers, the security management system of classified and non-classified mobile storage media, the security management system of classified networks, the security management system of maintenance, replacement and scrapping of classified computers, and the security management system of information released by public information networks. Ensure that the confidentiality work is pragmatic and efficient from the system. The system of document circulation, management, filing and file management was revised and improved. For the security prevention and management of computer information system, the principle that confidential information is not online and online information is not confidential is strictly implemented, which not only ensures the normal operation of office system, but also prevents leakage.

Two. Confidential publicity, education, training and management of secret-related personnel

My unit regards confidentiality as a key point of internal work, strictly implements the requirements of superior confidentiality work, earnestly strengthens the construction of its own confidentiality work, and requires employees to seriously study and strictly enforce relevant confidentiality laws and regulations in line with the principle of putting prevention first. Regular secrecy education has enhanced the secrecy awareness of cadres and workers, overcome careless thoughts, avoided the occurrence of leaks, established a sense of responsibility, improved ideological awareness, and laid a reliable ideological foundation for the smooth development of secrecy work in our station. Archivists have complete procedures for consulting, borrowing and accessing archives, and the transfer, recovery and cancellation of secret documents and internal materials are handled in strict accordance with regulations.

Three. Security management of information systems and information equipment

In order to strengthen the confidentiality of computer information system, every computer system in our unit has installed anti-virus software and firewall to prevent virus invasion. Formulate computer safety operation specifications, and require staff to operate in strict accordance with the specifications, and report and deal with viruses in time when they are found. Arrange special personnel to be responsible for the entry, filing, sending, printing and backup of electronic documents, strengthen the management and maintenance of computers storing confidential information, and implement strict management system for the borrowing, use, storage and destruction of storage media such as floppy disks, mobile hard disks and U disks to ensure the safety of electronic documents.

In recent years, the security work of our unit has been gradually standardized and institutionalized, and no secret-related accidents have occurred. In the future, we will continue to work hard, actively explore and study the new situation and new problems of safety work in the new period, and strive to bring safety work to a new level.

Report on the self-inspection and self-evaluation of procuratorial organs' secrecy work The second is to conscientiously implement the spirit of important instructions of the leading comrades of the Central Committee and the provincial party committee, and further strengthen the secrecy management. According to the requirements of the document Notice on Organizing Special Inspection of Confidentiality Work (Jiangxi Baofa [20xx] No.2) issued by the Jiangxi Provincial Secrecy Committee, our bureau quickly implemented the important instructions and the spirit of the document, and earnestly carried out the self-inspection activities of secrecy work. Overall resolutely implement the requirements of higher-level documents, strengthen leadership, carefully organize, clarify responsibilities, be strict with requirements, carefully check yourself, and leave no dead ends. The relevant situation is now reported as follows:

The first is to establish institutions and clarify responsibilities.

A leading group for the confidentiality work of the county immigration development inspection organ was established, and a special person was appointed to be responsible for the confidentiality work. At the same time, sign a confidentiality commitment letter one by one. Our bureau will conduct a comprehensive registration and filing of all personnel who are in contact with or may be in contact with and know state secrets at work. According to the confidentiality requirements, sign a confidentiality undertaking.

Second, strengthen education and raise awareness.

Using the study time of the meeting, I conveyed the spirit of the document to the overall confidential staff, and thoroughly studied the policies and regulations on information security and confidentiality, further improving the confidentiality awareness and work level of the staff of our bureau. Combined with the actual situation, in view of the problems of insufficient understanding and inadequate measures in individual stock rooms, the publicity and education on confidentiality have been strengthened, and the management of receiving, registering, keeping, transmitting and handling confidential documents has been strengthened.

Third, strengthen management and implement the system.

First of all, our bureau conducted a self-examination on the management of all cipher telegrams, confidential documents and materials, and network security management, and conducted a self-examination on confidential paper documents. Our bureau has no problem with coded telegrams, and all confidential paper documents have been cleared according to the requirements of superiors. Retirement procedures are complete, all other confidential documents are well preserved, and there is no leakage problem. Checked the management of drafting, printing and reading confidential documents, and established the system of borrowing and returning confidential documents and information materials. The bureau has set up a special archives room, installed window guardrails and security doors, and implemented security measures. At the same time, all non-confidential systems and information equipment in the world have been carefully inspected, and no leaks have been found, and classified electronic data cannot be saved as required; Confidential computers and USB flash drives were inspected by special security software, and no online records were found, and no non-confidential matters were handled on confidential computers; The secret management files of the secret information system and the secret management files of the secret information equipment have been established, so that the special plane is dedicated to special personnel; At the same time, our bureau has also established and improved the confidentiality review system for information release on Internet portals, and found no problem of illegal information release.

Four, highlight the key points, strict inspection

Classify, check and register key positions, core positions and computers used by each individual to ensure the safe use of non-confidential mobile storage media. Require each computer to set a boot password, install genuine anti-virus software, and regularly kill computer viruses, Trojans and other malicious programs; Every confidential computer is affixed with a confidential logo. At the same time, further strengthen the management of mobile storage media, prohibit the cross-use of confidential storage media and non-confidential storage media, and do a good job in tracking and keeping confidential storage media and user registration. Strictly manage the company's telephone, and it is forbidden to illegally wire and move the machine, connect the facilities and install the extension. It is forbidden to log in and upload the telephone information of the company on the Internet.

Through self-examination, it shows that the staff of our bureau have a good sense of confidentiality, can handle all kinds of confidential matters and information in strict accordance with the confidentiality provisions, can conscientiously implement their responsibilities, do a good job in reviewing, drafting, keeping confidential and borrowing all kinds of confidential information, and do a good job in keeping confidential according to the requirements of superiors.

;