Security Value Pulling Full Technology Assistance+National Shield Building a Legal Defense Line for State Secrets
2025-06-03
There is an ancient saying that goes, "Things are formed by secrecy, and words are destroyed by leakage." From the "iron cabinet key" of paper documents to the intelligent "encryption defense line," from "physical isolation" to "data security," the requirements for confidentiality are constantly being redefined with the changing times. The newly revised Law of the People's Republic of China on Guarding State Secrets and its implementing regulations are in line with the changing tide of the times, promoting a new stage of more precise, intelligent, and scientific confidentiality work, and building a solid defense line for national security. Strengthen institutional norms - clarify classified authority. The "Confidentiality Law" further establishes and improves the system of responsible persons for classified information, clarifying "the main responsible persons of organs and units and their designated personnel" as the responsible persons for classified information, which is conducive to clarifying classified responsibilities, limiting classified authority, regulating classified behavior, and is a vivid practice of "power in the cage" of confidentiality work. ——Optimize confidentiality management. The "Confidentiality Law" refines the three-level system of "top secret, confidential, and secret", clarifies that "the determination of the scope of confidential matters should follow the principles of necessity, reasonableness, and scientific evaluation", and requires agencies and units to review the determined state secrets every year, installing a dynamic management engine for confidentiality work and making it more precise and scientific. ——Clarify the decryption mechanism. The Confidentiality Law stipulates that if the confidentiality period of state secrets has expired, they shall be declassified on their own. At the same time, it has clarified the classification level, confidentiality period, and scope of knowledge of state secrets, which should be changed in a timely manner according to changes in the situation, effectively promoting the orderly disclosure of historical archives in accordance with the law, and promoting the rational use of information resources in accordance with the law. Adapting to technological development - strengthening information encryption. Under the guidance of the Confidentiality Law, cutting-edge technologies such as quantum communication and blockchain are continuously applied to information encryption work, building a full chain encryption system that integrates transmission, storage, and use. With technological self-reliance as the fulcrum, the sovereignty connotation of cyberspace is reconstructed, ensuring the stability of the digital security foundation and the increasingly stable information security boundary. ——Strengthen carrier control. The Confidentiality Law requires government agencies and units to strengthen the management of state secret carriers, and clarifies the full cycle management requirements for state secret carriers from production, receipt, transmission, use, replication, preservation, maintenance to destruction. Under the guidance of the Confidentiality Law, technologies such as radio frequency identification, anti duplication, and quantum encryption for controlling classified carriers have been continuously popularized, giving wings to the control of classified carriers. ——Strengthen space protection. The Confidentiality Law requires that key departments and parts must be equipped and used with necessary technical protection facilities and equipment in accordance with national confidentiality regulations and standards. Under the guidance of the Confidentiality Law, the security and confidentiality products and technologies used to protect state secrets continue to iterate and upgrade, making the storage space for state secrets more secure and the security barrier more solid. Improve the governance system - perfect the responsibility system. Traditional confidentiality responsibilities are mainly concentrated in government agencies. The "Confidentiality Law" includes enterprises and institutions engaged in business involving state secrets into the responsibility system, dynamically adapts their rights and responsibilities, and implements graded and classified management while expanding their main body. Through the full chain of confidentiality, there is a penetrating accountability system, allowing statutory responsibilities to run through the entire confidentiality process. ——Improve regulatory mechanisms. The Confidentiality Law stipulates that the administrative departments for confidentiality management at or above the city level with districts shall establish a confidentiality risk assessment mechanism, monitoring and early warning system, and emergency response system. Government agencies and units shall construct confidentiality self supervision facilities, timely discover and dispose of security and confidentiality risks and hidden dangers. ——Promote universal governance. The Confidentiality Law authorizes the administrative departments responsible for confidentiality to organize and carry out confidentiality publicity and education in accordance with the law. When state personnel or other citizens discover that state secrets have been leaked or may be leaked, they should immediately take remedial measures and report to relevant authorities and units in a timely manner. Through publicity and education, they should promote the formation of a new pattern of "everyone is responsible" for group prevention and control of confidentiality. (New Society)
Edit:Luo yu Responsible editor:Jia jia
Source:Ministry of State Security WeChat official account
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com