Article 23 of the Regulations for the Implementation of the Law of People's Republic of China (PRC) on Guarding State Secrets is classified into top secret, secret and secret according to the classification. Organs and units shall determine the security level of classified information system according to the highest security level of information stored and processed by classified information system, and take corresponding security and confidentiality protection measures according to the requirements of classified protection.
Extended knowledge
1. What is the security specification for using unclassified information systems?
Security laws and regulations for the use of non-confidential information systems such as the Internet mainly include:
1. It is forbidden to use non-confidential computers and non-confidential storage devices to store and process state secret information.
2. It is forbidden to exchange information between classified information systems without protective measures and the Internet and other public information networks.
3. It is forbidden to transmit state secrets on public information networks such as the Internet or in wired or wireless communication without security measures.
4, the Internet, mobile communication networks and other public information networks and other media information editing, publishing, should comply with the relevant confidentiality provisions, prohibit the involvement of state secrets.
5. Operators and service providers of public information networks such as the Internet shall cooperate with public security organs, state security organs and procuratorial organs to investigate cases of leaks; If it is found that the information released through the Internet or other public information networks involves the disclosure of state secrets, it shall immediately stop the transmission, keep relevant records, and report to the public security organ, the state security organ or the secrecy administrative department; Information involving the disclosure of state secrets shall be deleted according to the requirements of public security organs, state security organs or secrecy administrative departments.
2. What security issues should I pay attention to when buying a confidential computer?
When purchasing network terminal equipment such as classified computers, government agencies and units shall take corresponding security measures:
1, adhere to the principle of domestic priority, and choose domestic equipment as much as possible. If it is really necessary to purchase imported computers and equipment, computers and equipment that have been tested and approved by the relevant competent departments of the state must be purchased.
2. Buy at will, don't book in advance. Once selected, you should immediately purchase and pick up the goods to prevent someone from setting up and installing a secret stealing device.
Don't buy a computer with wireless network card and wireless interconnection function. If you have purchased and prepared for handling confidential information, you must remove or shield the wireless function hardware module before using it.
4. Before using the computer, it shall carry out necessary security and confidentiality technical tests to confirm that there is no risk of leakage and security risks before it can be used to process confidential information.