Provisions on confidentiality of police work of public security organs

Legal analysis: it is the responsibility and obligation of public security organs and people's police to keep state secrets and police secrets in public security work according to law. The specific scope of police work secrets:

(a) all kinds of documents, manuscripts, telegrams, letters, statistical data, lists, electronic documents, audio-visual materials, files, pictures, magnetic cards, floppy disks, etc. Having secret contents;

(two) the contents and minutes of the party group meeting, the office meeting of the procurator-general and the secret meeting of the procuratorial committee have not been published;

(three) the contents of various confidential meetings and activities attended by the leaders of the hospital have not been announced;

(4) The confidential work of various organs and departments, including the organization and personnel, the case, technical investigation methods, action plans, places of detention, and case-related files, inquiry transcripts, report materials, letters and visits, etc. ;

(5) Relevant documents, materials and contents of confidential faxes and teleconferences;

(six) confidential departments (parts);

(seven) the allocation, shipment and storage of weapons and ammunition by procuratorial organs;

(eight) the equipment and materials of procuratorial technology;

(9) confidential telephones, cipher machines, keys, etc. ;

(10) seals, seals, certificates, etc. ;

(eleven) other matters that need to be kept confidential.

Legal basis: Article 24 of the Law of People's Republic of China (PRC) on Guarding State Secrets, organs and units shall strengthen the management of classified information systems, and no organization or individual may commit the following acts: (1) Connecting classified computers and classified storage devices to the Internet and other public information networks; (2) exchanging information between the classified information system and public information networks such as the Internet without taking protective measures; (3) Using unclassified computers and unclassified storage devices to store and process state secret information; (4) Uninstalling or modifying the safety technical regulations and management regulations of classified information systems without authorization; (5) Giving away, selling, discarding or transferring classified computers and classified storage devices that have not been processed by security technology for other purposes.