In today's increasingly popular digital office, mobile phones have become an important tool for work communication. Various mobile communication and office software are widely used in office scenarios due to their instant and convenient nature. However, this may also lead to confidential information breaking through physical protection boundaries and entering digital communication networks, posing hidden risks of leakage and becoming a hidden danger to national security. The dangerous' window breaking moment '- the leakage risk of instant messaging tools. There are public cases showing that the Education and Sports Bureau of a certain county received a secret level document from the Provincial Party Committee, and the director's instructions were conveyed to all schools for implementation. Hu, a seconded personnel from the office of the bureau, directly took photos of the entire document and sent them to the principal work groups of various schools in order to facilitate quick communication. Zhang, the principal of a certain school, did not carefully review the content of the document and forwarded the photo to the teacher work group of the school, causing the document to immediately spread in multiple groups and resulting in a leak. After the incident, both Hu and Zhang were given disciplinary and administrative sanctions. ——Security risks of third-party applications. There is a public case showing that Sun, the director of a confidential unit's office, illegally took confidential level documents for work convenience and converted them into electronic documents using a graphic and text recognition mini program. Little did they know, the mini program they used automatically stored this confidential content on a third-party server. When Sun believed that the operation was secretive and that deleting local files would make everything fine, employees of a small program development company actually packaged and resold confidential files. After the incident, the employees involved were held criminally responsible in accordance with the law, and Sun was also severely punished for seriously violating confidentiality regulations. ——The 'time bomb' in the circle of friends. There is a public case showing that Jiang, a newly appointed cadre of a municipal government agency, took a photo of the homepage of a secret level document he received at a meeting of the municipal party committee and uploaded it to his friends' circle without authorization in order to show off his identity as a civil servant. Although the photo was urgently deleted under the order of the leader 10 minutes later, the friend's screenshot saving and forwarding have formed a transmission chain, causing a leak. Afterwards, Jiang was given disciplinary and administrative sanctions. The "three talismans" of confidentiality defense - technical protection: putting a "golden shield" on information. Build an intelligent protection network, make good use of dynamic monitoring systems and artificial intelligence response mechanisms, and automatically trigger warnings for files involving sensitive vocabulary and confidential formats; Identify deep forgery attacks, intercept zero day vulnerability exploitation, and promptly block security threats such as malicious software and phishing links. ——Disciplinary Code: Establish a bottom line for security and confidentiality. Only by understanding the laws and regulations and mastering the rules of law can we strictly enforce the rule of law and act in accordance with the law. Actively learn the newly revised "Law of the People's Republic of China on Guarding State Secrets", "Implementation Regulations of the Law of the People's Republic of China on Guarding State Secrets", "Interim Provisions on the Administration of State Secrets Classification" and other laws and regulations, familiarize oneself with the rules and regulations of our unit, understand the basic concepts, management systems and legal responsibilities related to confidentiality, and enhance security awareness and rule of law awareness. ——Awakening of Consciousness: Making Confidentiality a 'Muscle Memory'. A large number of "secret hunters" lurk in the Internet space. The public needs to strengthen their understanding of the "goose passing and leaving traces" characteristics of social media in warning cases, and deeply recognize that every violation of regulations may become a "breakthrough point" that endangers national security. When the slogan 'No internet access for classified information, no internet access for classified information' turns into an unconscious action, and when we ask 'Can this content be sent?' before clicking 'send', we can build the strongest 'confidentiality firewall' on social networks. National security agencies remind that national security is not a trivial matter, and do not be careless when leaking secrets at your fingertips. The Law of the People's Republic of China on Guarding State Secrets stipulates that it is prohibited to transmit state secrets on the Internet and other public information networks or in wired and wireless communications without taking effective security measures in accordance with the provisions and standards of state secrecy. In the current era of rapid development of information technology, mobile phones are not only communication tools, but also the forefront of national security. If the masses of the people find acts endangering national security and related suspicious situations, they can report them directly to the local national security authorities through the 12339 national security organ reporting acceptance telephone, the online reporting platform (www.12339. gov.cn), the WeChat official account reporting acceptance channel of the Ministry of National Security or the local national security authorities. (New Society)
Edit:Wang Shu Ying Responsible editor:Li Jie
Source:Ministry of State Security Official Account
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com