5 Research Reports on Confidentiality
The society under our eyes, the report is very important, the report contains the title, body, and conclusion. So how is the general report written? The following is my collection of confidential work research report, just for reference, I hope it can help you.
Confidentiality research report 1
The company's confidentiality "investigation and research year" activities since the start of the company's departments to take action quickly, carefully planned, tight deployment, the departments "investigation and research year" activities started well, to advance Orderly. Now the work is reported as follows:
First, the confidentiality of the work carried out
1, attach great importance to the organization.
The company's departments to carry out "investigation and research year" activities as an effective measure to further enhance the level of confidentiality, as a way to strengthen and improve the company's work, improve the security and confidentiality under the new situation of the important hand, included in the annual key work, strengthen the organization and implementation. The company set up by the manager as leader, deputy manager as deputy leader, the company's leadership team as a member of the research group, for "investigation and research year" activities to provide an important organizational guarantee.
2, learning in-depth, rapid deployment.
Departments to quickly convey the study of "investigation and research" activities, combined with the actual company issued in the form of a document "XXX County XXX confidentiality "investigation and research" activities program, clear significance, guiding ideology, The program of activities for "investigation and research year" of XXX County XXX Company's confidential work is issued in the form of a document with the company's actuality to clarify the significance, guiding ideology, goal and task and work requirements. Focus on the organization of personnel to learn the theory, learning regulations, clear work tasks, in order to do a good job of research work to lay a solid foundation.
3, linked to the actual, focusing on the results.
In-depth study of the party and state secrecy guidelines and policies, laws and regulations, learning the party's tradition of secrecy, learning the basic principles of investigation and research work, requirements and methods, to further clarify the direction of the research work objectives, and constantly improve the scientific level of decision-making and management.
4, strengthen the technical defense measures to ensure the security of the secret
First, strict document management, do a good job in the receipt and distribution of documents and information, put, sorting, archiving, destruction, etc.; do a good job in the input of electronic documents, archiving, sending, printing, back-up, etc., to ensure the safety of electronic documents. At the same time to increase the daily management of the archive room, non-staff are generally not allowed to enter the archive room, to prevent the leakage of confidentiality. Secondly, the company has strengthened the hardware management of key confidential departments and positions, and fully equipped with confidential protection equipment and improved confidentiality precautions in accordance with national confidentiality regulations and standards. Thirdly, the company implemented complete physical isolation of internal and external networks, and installed anti-virus and desktop terminal management system software on computers in the internal network in accordance with the requirements of provincial and municipal companies. Fourth, the company has strictly implemented the "five prohibitions" (prohibiting the connection of confidential computers to the information intranet and extranet; prohibiting the processing and storage of confidential information on computers connected to the extranet; prohibiting the cross use of computers in the information intranet and extranet; prohibiting the cross use of ordinary mobile storage media in the intranet and extranet; prohibiting the cross use of computer peripherals, such as scanners and printers, in the intranet and extranet). (Computer peripherals are strictly prohibited from cross-use on the intranet and extranet).
Second, the results achieved
1, mapping the unit base, assess the risk factor of confidentiality. According to the spirit of the notice,
the company respectively on the construction of the system, the implementation of the responsibility system, the review system, the work carried out to determine the confidentiality of the confidentiality of the management of personnel involved in the management of confidential carriers, the management of confidential departments, confidentiality publicity, confidentiality commitment to sign the book, etc., against the bottom of the situation, to analyze and study each link, to investigate the details of the leakage of each classified link, to find a leakage of confidentiality events to prevent leakage of information, and prevent leakage of information at source from the entry point of the incident. The source to prevent the leakage of confidentiality events.
2, improve the awareness of confidentiality, strengthen the confidentiality of the system construction. According to the notification requirements, the company to strengthen the "Secrecy Law" re-learning, enhance the confidentiality of the confidentiality of personnel awareness and confidentiality skills, especially through the confidentiality mapping, will further standardize the confidentiality of the work of the system construction, from the system to block the leakage of the incident occurred.
3, to prevent the leakage of events, standardize network security management. The size of the company's network, topology, scope of use, information resources, the degree of confidentiality of the application system are in line with the requirements of the network network through technical means or physical isolation, there is no cross use of the situation, the network terminals do not violate the outreach situation. The server has a different user name managed by a person, are configured with a firewall; network terminals are equipped with a password that meets the requirements of the boot, are set up with professional antivirus software.
4, signed a commitment to confidentiality, the development of confidentiality something must be investigated system. According to the notification process, the company to confidentiality work "investigation and research year" activities as an opportunity, one is to organize and carry out the entire team of personnel confidentiality self-examination work, confidentiality commitment to sign; two is to develop confidentiality must be investigated system, clear confidentiality consequences, harm and responsibility. Third, to carry out "investigation and research year" activities as a way to strengthen and improve the confidentiality of the work, to improve the new situation of security and confidentiality of the important
Initiative. Through the above work, basically eliminate the leakage of hidden secrets.
Third, there are problems and difficulties
First, individual staff confidentiality on the work of the importance of insufficient understanding of the awareness of confidentiality is not very strong, but also need to further strengthen the confidentiality of education, and effectively enhance the awareness of confidentiality of employees. Secondly, computers, mobile storage media and network management still need to strengthen technical protection, improve protection measures, and further increase the supervision and inspection efforts.
Fourth, typical experience and improvement measures
Strengthen the leading cadres, classified personnel confidentiality education, the leading cadres of confidentiality education into the cadre training program. For classified personnel to carry out post education, through thematic education, conference education, special lectures, in and out of classified post training and other forms, so that classified personnel to truly achieve the requirements of learning the law, know the law, abide by the law, and use of the law.
Up to now, our company has not occurred a computer loss of confidentiality, leakage and illegal external chain accidents, to ensure the company's internal information security.
In the future, we will further consolidate the foundation of confidentiality work, enhance the overall level of confidentiality work, strengthen the education of confidentiality work, and effectively enhance the awareness of confidentiality of employees, while strengthening the technical protection of confidentiality work, and improve the protection measures, so as to make our company's confidentiality work to a new level.
Confidentiality research report 2Currently, the government system office automation network construction in the ascendant. Governments at all levels have increased investment in hardware and software to build an office automation network. With the expansion of the network scale, the level of office automation applications, data **** enjoy a higher and higher degree of everyone in the change of the old manual way of working at the same time also more and more dependent on the computer. Some important information in the network, involving a wide range, once the impact of the error is huge, the consequences are more serious.
Therefore, we are focusing on the construction of office automation network at the same time, but also to effectively strengthen the confidentiality of the office automation network, focusing on the development and use of effective confidentiality measures to achieve the sieve (information filtering system), locks (self-isolating system) and shields (protection system) integrated use, really set up a solid confidentiality protection system.
Office automation network information confidentiality Information leakage is one of the main confidentiality hazards of office automation network. The so-called information leakage, is deliberately or accidentally detect, intercept, steal, analyze, collect to the system of information, especially secret information and sensitive information, thus causing leakage events. As we all know, the network has three vulnerabilities in terms of confidentiality protection: first, the accessibility of data.
Data information can be easily copied by end users without leaving any trace. The second is the aggregation of information. When the information exists in a fragmented form, its value is often small, once the network will be a large number of related information gathered together, its value is considerable. Third, the difficulty of defense. Although layers of defense can be set up, but for a person familiar with network technology, some effort may break through these barriers to the confidentiality of the work has brought great difficulties. The confidentiality of the office automation network to prevent, can start from the following three aspects:
Physical isolation. According to the General Office of the State Council and the State Secrets Bureau of the government office automation network confidentiality requirements, office automation network must be implemented with the public information network physical isolation. In the information equipment connected to the public information network, may not store, process and transmit state secret information; government systems on the public information network information, must be reviewed for confidentiality, approved by the competent leadership, and the establishment of a registration and filing system.
Data encryption. Confidentiality of information is to prevent opponents from deciphering confidential information in the information system. Data encryption is an important means to achieve information confidentiality. Data encryption of office automation network, is through the network of encryption agencies, the original data information (plaintext), according to a specific encryption algorithm transformed into a completely different data information with the plaintext, that is, the ciphertext process. Currently commonly used data encryption technology, mainly link encryption, node encryption and end-to-end encryption and other three ways.
Make full use of the confidentiality measures provided by the system itself, some users do not know enough about the network, basically do not use or seldom use the confidentiality measures provided by the network operating system, thus leaving hidden dangers. In fact, the general network operating systems and applications, such as ware. Notes, etc., with their own good security measures, we have to take full advantage of. For example, NetWare, provides four levels of confidentiality measures: the first level is to enter the network confidentiality, the second level is to set the directory and file access rights, the third level of confidentiality of the attributes of files and directories, the fourth level is the security of the file server confidentiality.
Office automation network entity confidentiality Network entity refers to the implementation of information collection, transmission, storage, processing, processing, distribution and utilization of computers and their gold external equipment and network components. The following three measures can be taken to strengthen the confidentiality of network entities.
Prevent electromagnetic leakage. Computer equipment radiates electromagnetic waves when working, can receive it with the help of instruments and equipment within a certain range, especially the use of high-sensitivity instruments can be stable and clear to see the information being processed by the computer. In addition, network ports, transmission lines, etc. may be caused by poor shielding or unshielded electromagnetic leakage. Relevant experiments have shown that uncontrolled computer facilities begin to work, with an ordinary computer plus the interception device, can be copied within one kilometer of its content.
Therefore, we have to try to consider the use of low-radiation equipment. The monitor is the weak link of computer confidentiality, and stealing the contents of the display has been a mature technology, so it is necessary to use low-radiation monitors. In addition, distance protection, noise interference, shielding and other measures can be used to suppress electromagnetic leakage to a minimum.
Confidentiality research report 3In recent years, due to some staff network security awareness is not strong and the leakage of confidential documents occurred from time to time, resulting in incalculable losses, some of the organs and departments of the staff because of such incidents and was punished. Although the Bureau to increase the confidential network management efforts, but there are still some leaks of security risks.
First, a weak sense of confidentiality
As a result of a long period of peacetime, resulting in the Bureau of part of the classified personnel, especially the leading cadres of the sense of confidentiality and enemy concept diluted, the wrong idea, such as the earthquake in Sichuan, such a large disaster situation are open to the world, there is what can be guaranteed. Undeniably, with the continuous progress of our country's democratic and legal construction process, the scope of confidentiality and matters are gradually reduced, but this does not mean that there is no confidentiality can be guaranteed. We are facing the increasing threat of theft, the confidentiality of the situation is more serious, the task of confidentiality is more arduous. In this regard, we must pay great attention.
Second, the confidentiality of the facilities are not perfect
Some of the confidentiality of the key parts of the minimum "three iron" (iron door, iron windows, confidential cabinet) requirements are not implemented, there is a great security risks. Even the intranet and the Internet is directly connected, not really realize the effective physical isolation. Some comrades on the Internet release of information is not strict, did not implement strict confidentiality review, resulting in network leaks. In particular, the current management of our network, the means are still quite backward, basically in a state of no defense.
Third, the management of classified carriers is chaotic
Arbitrary copy of classified documents and information, classified magnetic media (U disk, mobile hard disk, etc.) has not established a strict management system. The confidential documents are placed haphazardly, and some even sell the confidential documents as scrap to individual scrap buyers, there is a serious loss and leakage of confidentiality hidden danger.
Fourth, the management of confidential key parts is not strict
The confidential key parts are not clear enough. The classified personnel working in the classified post education is not strict, management is not strict, not in accordance with the requirements of the implementation of the confidentiality of the responsibility system. Because of the responsibility is not clear, resulting in some important parts of the management out of control. To do a good job of confidentiality need to do the following:
1, to effectively strengthen the leadership
To conscientiously implement the confidentiality of leading cadres responsibility system, the unit a hand of the unit of the system is responsible for confidentiality, the leaders in charge of a specific grasp of a clear person responsible for the confidentiality of the work. To often ask about the confidentiality of the work, timely study and solve the specific problems of confidentiality work.
2, to carry out self-correction
All levels of departments should be in accordance with the confidentiality requirements, quickly on the system of this department's confidentiality of the situation of self-correction, focusing on finding confidentiality in the work of the weak links and weak parts. To pay special attention to the work of self-correction, the implementation of the investigation and correction. Self-examination and self-correction work can not engage in forms, go through the motions, rectification must be in place. In the process of self-correction of any problem, we must report to the appropriate confidentiality department in a timely manner.
3, to increase the management
First, the Internet is not allowed to cross with the intranet or classified computers using mobile U disk storage tools; secondly, you can not use the QQ online transmission of internal office documents and information; thirdly, the internal office documents, classified basic geographic information databases and maps can not be stored in the hard disk connected to the external network. The fourth is not allowed to deal with internal documents laptop computers, mobile media such as U disk, etc. to take home the Internet or office, etc..
4, clear confidentiality responsibilities
In the new situation of network security and confidentiality of the organizational management system should be in strict accordance with the "who is online, who is responsible for, who approves, who is responsible for" and "first review, after the open In the new situation of network security and confidentiality organization management system should be in strict accordance with the "who is responsible for the Internet, who is responsible for approval, who is responsible" and "first review, after the disclosure of" the principle of work, to strengthen the network security and confidentiality of the organization's leadership, the formation of a level to grasp a level, layer to layer to implement the good situation.
Confidentiality research report 4According to the requirements of the document [20xx] No. 2 of the Confidentiality Committee of China ***XX County Committee, the leading group of confidentiality of my field attaches great importance to the timely convening of a special meeting on the confidentiality of the self-inspection of the work of the layout, at the same time, the organization of the office of the relevant personnel of the confidentiality of the work of the comprehensive self-inspection. Now the self-examination report is as follows:
First, the basic situation of confidentiality organization
Confidentiality is a matter of national security and interests, and is related to the reform and opening up and the development of the overall situation of stability. I have always attached great importance to confidentiality work, always put the confidentiality of the work on the important agenda, and for personnel changes, the confidentiality of the leading organizations, confidentiality audit institutions and personnel to adjust and enrich, do a good job handover, to ensure the continuity of the work. I have a confidentiality leading group, headed by the deputy secretary of the party committee, members of the party and government team members and responsible for confidentiality work. The leading group set up an office under the director of the Party and Government Office as the director of the office, and at the same time to determine the two comrades are mainly responsible for confidentiality of the specific aspects of the work. Relevant personnel signed a "confidential personnel position confidentiality responsibility", effectively strengthen the confidentiality management, prevention and elimination of loss and leakage of confidentiality events.
Second, the confidentiality of the work carried out
(a) the confidentiality of the key departments, key parts of the strengthening of inspection and supervision work. Party and government offices, archives and other departments are confidentiality key departments and parts. I field leading group of these departments of the confidentiality of the work from time to time to check and supervise, to prevent the loss of confidentiality, leakage of confidentiality. In the daily work, I insist on starting from each link, the party and government office of the fax machine to implement a person in charge of sending and receiving documents, photocopiers by the staff of the printing room is responsible for the transmission of secret documents, internal information, recycling, write-offs are strictly in accordance with the relevant requirements of the higher level. At the same time, the content of the major meetings of the party government shall not be leaked to the outside. For the documents issued by the field and the superior documents to strengthen the management, shall not be thrown and put randomly.
(B) to strengthen the management of encrypted computers. In accordance with the requirements of the relevant departments at the higher level, the field of my designation to understand the business, will manage the staff specifically responsible for the management of encrypted computers, to strengthen the computer Internet checking work on the Internet computer registry, in the management of the heart to do so; to strengthen the computer information, 'custody, without the consent of the unit leader, is strictly prohibited to print or copy the unit software information to the outside unit personnel. At the same time, when the classified machine and classified soft, hard disk failure, by the office to identify the cause, contact a professional computer company to send technicians directly to the unit on the failure of the machine and magnetic media for on-site maintenance to ensure that the secret information is not leaked and stolen.
(C) the construction of confidentiality rules and regulations.
I field in accordance with the provisions of confidentiality work, the establishment of a sound confidentiality work rules and regulations. Further improve the "confidentiality system", "confidential personnel confidentiality management system", "computer confidentiality management system", "fax machine, photocopier and other office automation equipment confidentiality management system", "confidentiality of the meeting system", "confidentiality of the file management system" and other confidentiality rules and regulations, so that confidentiality of the work of the evidence to be relied on, there is a chapter to follow, strictly in accordance with the system to standardize the procedures.
(D) to carry out confidentiality publicity and education.
The party committee attaches great importance to confidentiality publicity and education work, take the form of posting slogans, pull the banner, etc., and use various opportunities to carry out regular confidentiality publicity and education work among cadres. Such as the use of village main cadres meeting, convey, learn about the confidentiality of the work of the documents, information, understanding of the confidentiality of the situation and the requirements of the higher level, so that cadres to enhance the concept of confidentiality, in order to do a good job in my field of confidentiality has laid a solid foundation for the masses.
Three problems and suggestions for improvement
Through this inspection, found that the whole system of confidential carrier confidentiality management work is basically good, did not find the loss of confidential documents and information. In recent years, the practice of confidentiality work has made us realize that it is very important to strengthen the confidentiality of the cadres of the organization's education to improve the confidentiality of each citizen's awareness. For example, the use of computer networks, e-mail to send out information has been very convenient and fast way, but therefore may also bring the risk of leaks. In this case, the need to strengthen publicity efforts to enhance people's awareness of confidentiality, improve the initiative and conscientiousness to do a good job of confidentiality, but also to develop appropriate rules and regulations, so that the prior behavior is regulated to block the possible loss of confidentiality, leakage of information, to eliminate hidden dangers, in order to ensure national security.
(2) to do a good job of confidentiality also need a strong material basis for guarantee. In addition to the necessary funds, equipment investment, should also strengthen the confidentiality of the staff's business training, improve the quality of confidentiality cadres. At present, the grass-roots full-time (part-time) confidentiality staff training is less, coupled with frequent personnel changes, so the confidentiality of the staff's business training needs to be strengthened.
Research Report on Confidentiality 5In China, work secrecy is a legal concept, which is regulated by our Civil Servants Law, Judges Law, Prosecutors Law, Police Law and other laws. However, as a whole, these provisions are relatively decentralized, not centralized, and too much principle, not specific, therefore, in practice, less operational, and lack of guidance for the work. In particular, with the promulgation and implementation of the "Regulations on the Disclosure of Government Information", how to accurately define the connotation and extension of the work of the secret, to achieve the law to protect the work of the secret and actively promote the unity of the disclosure of government information is an important issue that needs to be further strengthened research.
First, accurately define the necessity of working secrets
Favorable to prevent the infinite expansion of state secrets. Currently, China's confidentiality work there is a "messy secret" and other confidentiality arbitrariness problems, the reasons for this problem are manifold, and the concept of work secrets is unclear is one of the reasons. It is because the concept of working secrets is not clearly defined, the work secrets that do not belong to the state secrets are recognized as state secrets, thus leading to the infinite expansion of state secrets, which can neither be managed nor managed well, resulting in leaks from time to time, and posing a threat to the security and interests of the state. Accurately define the work of the secret to a certain extent can inhibit the infinite expansion of state secrets, reduce the cost of confidentiality, so that the real state secrets to keep, keep good.
Beneficial to actively promote the disclosure of government information. May 1, "Open Government Information Regulations" officially came into force. In the process of implementation, some government departments due to the concept of working secrets is not clear, resulting in a part of the government information that can be disclosed, due to confidentiality concerns and dare not disclose, unwilling to disclose, so that some of the information resources conducive to the work of the agency units are not effectively utilized, the public does not understand, there are complaints. Accurately define the work of the secret, on the one hand, can make the relevant departments to lift the concerns, proactive public government information; on the other hand, can also make the public clear what matters belong to the work of the secret, should not be disclosed, consciously limiting their own right to know, which is conducive to the positive promotion of the disclosure of government information.
In favor of safeguarding the proper exercise of authority. Working secrets are generated in the exercise of authority in the process, public or leaked will directly lead to impede the normal exercise of the relevant authority, damage to the interests of the public ****, reduce or detract from the effect of its governance of society, and even seriously affect social stability. Therefore, the organization has the obligation and responsibility to strictly protect it. At the same time, the determination of work secrecy is an administrative discretionary power, the abuse of this power will seriously affect the public's right to know, therefore, the organs and units should exercise this power cautiously. Therefore, the accurate definition of work secrecy, can make the organization clear that the determination of work secrecy and conservative is both the right and obligation, both power and duty, to protect the proper exercise of its powers.
Second, the conceptual analysis of work secrets
Work secrets as an important classification of secrets, its connotation of the extension in the end is what, the law is not clearly defined. Authoritative departments, local regulations and academic circles on the definition of work secrets are mainly three. One is the definition of the drafting department of the Civil Servants Law, which means: (1) Matters other than state secrets that may not be openly diffused in official activities. (2) Those which, once leaked, will bring passivity and damage to the work of the organ or organization. Second, the Guangzhou Municipal Regulations on Keeping Work Secrets: work secrets refer to the official activities and internal management at all levels of government and its administrative departments, which are not state secrets and should not be disclosed to the public, in accordance with the prescribed procedures and within a certain period of time is limited to a certain range of people to know the work of the matter. Third, the academic definition: working secret refers to the state organs at all levels in their official activities and internal management does not belong to the state secrets and should not be disclosed to the public.
These three definitions to a certain extent summarize the inner and outer characteristics of the work of the secret, but they are respectively the following defects: First, the subject of the work of the secret is limited to the state organs at all levels, the fact that some of the work of the secret and the need to accurately define the exclusion of the public **** enterprises and institutions; secondly, the essence of the work of the secret does not indicate that the characteristics of the secret lies in the safeguard of the state organs at all levels, the authorization of the unit to properly exercise their powers. Units in the proper exercise of their powers; Third, not summarized the procedural characteristics of the work of the secret, leading to the practice of determining the arbitrariness of the work of the secret; Fourth, the use of the "negative" to define the work of the secret does not say what the work of the secret, including what, the definition of the work of the secret must be a proposition of certainty. Based on this, the author believes that, from the perspective of safeguarding citizens' right to know and promoting the openness of government information, the so-called work secret refers to the state organs at all levels, authorized units in order to protect the proper exercise of their powers, based on the simplified procedure to determine and within a certain period of time is limited to a certain range of people to know the work of the matter.
Third, the characterization of work secrets
(a) the subject of the broadness
Undoubtedly, the state organs at all levels is the most important subject of work secrets and the need to regulate the most important, but in addition to the state organs at all levels, some of the authorization of the public *** enterprises and institutions are also the main body of work secrets and the need to regulate the most important. However, in addition to State organs at all levels, certain authorized public *** enterprises and institutions are also the main bodies that generate work secrets and need to be strictly regulated. In practice, with the gradual progress of China's rule of law strategy, certain enterprises and institutions to obtain authorization to engage in public **** business management, service activities, these enterprises and institutions to determine the work of the secret of the existence of public **** interests and the right of citizens to know the possibility of conflict, so the work of the secret of such subjects must also pay attention to and accurately defined.
(ii) the legitimacy of authority
Administrative organs, authorized units of the work of the secret involves the unit's internal management matters and external management matters, both internal and external matters and organs and units of the legitimate exercise of authority. According to the requirements of the development of democratic politics in modern countries, the process of exercising powers by governmental organs or authorized units should be made public in order to safeguard the citizens' rights to know, participate and supervise. However, it is indeed inappropriate to disclose some matters arising from the exercise of power by government organs or authorized units. For these matters, countries around the world have protected them as an administrative privilege of the governmental organ or authorized unit. It should be noted, however, that this prerogative can only be limited to safeguarding the proper exercise of administrative powers and authorizations, and cannot attempt to cover up administrative violations or administrative errors. Unlike this, the state secret is a matter of national security and interests, if the leakage will directly lead to the overall security of the country and the interests of the damage, is the most important administrative prerogative granted by the Constitution.
(C) the simplicity of the procedure
Administrative organs and authorized units of the work of the secret involves the citizens' right to know and the right to participate in, too much, too much of the work of the secret means that the citizens of the right to know, the right to participate in the realization of the degree of reduction. Therefore, in addition to the physical limitations on working secrets, it is also necessary to carry out procedural limitations on them. That is to say, the specific procedures for determining working secrets, determining and changing the period of confidentiality, labeling, classifying and declassifying them must be clearly defined. However, based on the consideration of the cost of confidentiality, the procedures for determining and protecting work secrets should not be equated with those for determining and protecting state secrets, but should instead be characterized by their simplicity. Simplified procedures mean that administrative organs and authorized units omit, simplify or combine certain steps and links in the procedure for the determination and protection of State secrets, so that the procedure for determining and protecting work secrets can be carried out within a relatively short period of time. Simplicity is not arbitrary, but relative to the legal and strict procedures for the determination and protection of state secrets, appropriately lower its standards.
(D) the confidentiality of the content
After a matter has been determined as a working secret, the relevant administrative organ or authorized unit shall make reference to the management regulations on the protection measures for state secrets, and make specific provisions for the generation, preservation, circulation and destruction of the confidential carrier of the working secret in all aspects, and reasonably delimit the scope of contact in accordance with the principle of the needs of the work. However, keeping working secrets is slightly different from keeping state secrets. State secrets are related to the security and interests of the country, and the absolute security of keeping state secrets is the highest goal and principle, for which there is no room for bargaining; while working secrets involve the principle of balance of interests or measurement of damages, i.e., when the boundaries between confidentiality and disclosure are blurred, and not easy to be determined, the decision of whether or not to protect working secrets should be made through the principle of balance of interests, based on the analysis of damages and benefits for the society, and the decision of whether to protect working secrets should be made through the principle of balance of interests. The damage and benefit analysis, to decide whether it should be kept secret and public.
(E) the administrative nature of the responsibility
Keeping work secrets is a legal obligation of the state civil servants, generally regulated by the Civil Servants Law. Article 12 of China's Civil Servants Law clearly stipulates that civil servants have the obligation to keep state secrets and work secrets. There are similar provisions in foreign countries, except that the provisions are broader, covering state secrets, work secrets and commercial secrets and personal privacy known in the course of work. For example, article 26 of the General Status of National and Local Civil Servants Act, enacted in France in 1983, stipulates that civil servants have a duty of confidentiality in respect of secrets, facts, documents and reports which they have acquired in the course of or as a result of the performance of their duties. If a civil servant in a government department or a clerk in an authorized unit discloses a working secret without authorization, he or she violates the Civil Servants Act and is subject to administrative liability under the law.
;