laitimes

The confidential "net" in the office artifact of the workers

author:Beijing-France Internet Affairs

With the rapid development and widespread application of informatization and digitization, the difficulty of managing state secrets is increasing, and the importance of network information secrecy prevention and management is becoming more and more prominent. On February 27, 2024, the eighth meeting of the Standing Committee of the 14th National People's Congress revised the Law of the People's Republic of China on Guarding State Secrets (hereinafter referred to as the "Secrecy Law") for the second time, further improving the management system for online information confidentiality, which will come into force on May 1 this year.

In the office artifact of our workers

There are many secret "nets" hidden

Do you know what they are?

Artifact 1

【File Transfer Assistant】

Scene reenactment

Approaching the end of work, Xiao Wang received a confidential document asking for feedback the next day. Considering the time constraints, Xiao Wang sent it to WeChat [File Transfer Assistant] and stored it on his mobile phone, wanting to take it home to "pick up the lights and fight at night" in order to complete the task as soon as possible.

The confidential "net" in the office artifact of the workers

Confidentiality Reminder

Eliminate the use of social software such as WeChat and QQ to store, process, and transmit state secrets and work secrets.

Links to legal provisions

Article 29 of the Secrecy Law

It is forbidden to illegally copy, record, or store state secrets.

It is prohibited to transmit state secrets on the Internet and other public information networks, or in wired and wireless communications, without employing effective secrecy measures in accordance with state secrecy regulations and standards.

It is forbidden to involve state secrets in private contacts and correspondence.

Artifact 2

【Image and text recognition applet】

Scene reenactment

In order to quickly convey the spirit of the meeting to colleagues in the department, Xiao Wang wanted to use the [Image and Text Recognition Mini Program] to take pictures of the secret documents and send them to the WeChat work group.

The confidential "net" in the office artifact of the workers

Confidentiality Reminder

It is strictly forbidden to scan, edit, or transmit confidential and internal sensitive information by using image and text recognition applets.

Links to legal provisions

Article 31 (3) of the Secrecy Law

Organs and units shall strengthen the management of the secrecy of information systems and information equipment, establish secrecy self-supervision facilities, and promptly discover and address hidden security and secrecy risks. No organization or individual may engage in the following acts: (3) Using non-classified information systems or equipment to store or process state secrets.

Artifact 3

【AI Intelligent Generation】

Scene reenactment

After work on Friday, Xiao Wang received a notice to write a report based on a certain classified document, which he used during a meeting on Monday. Considering that he had already arranged a trip for the weekend, Xiao Wang wanted to "take a shortcut" to transfer the content of the file to the AI program to automatically generate a report.

The confidential "net" in the office artifact of the workers

Confidentiality Reminder

Prohibit the use of the Internet to exchange, process, and disseminate work-related sensitive information, especially confidential information.

Links to legal provisions

Paragraphs 1 and 3 of Article 36 of the Secrecy Law

The carrying out of data handling activities involving state secrets and their security supervision shall comply with state secrecy provisions.

Organs and units shall strengthen security management of aggregated and linked data in accordance with law.

Artifact 4

【Internet Network Disk】

Scene reenactment

Xiao Wang is about to be transferred from the confidential position, thinking that he may use the many documents, reports, summaries and other materials he wrote before in his work, considering that the file occupies a large amount of memory, Xiao Wang wants to upload the materials to the Internet network disk for future use.

The confidential "net" in the office artifact of the workers

Confidentiality Reminder

It is strictly forbidden to use non-classified equipment to process classified information, or to store state secrets and internal sensitive information in Internet cloud disks.

Links to legal provisions

Article 57(5) and (10) of the Secrecy Law

In any of the following circumstances, sanctions shall be given in accordance with law in accordance with the severity of the circumstances, and where there are unlawful gains, the unlawful gains shall be confiscated: (5) illegally copying, recording, or storing state secrets; (10) using non-classified information systems or non-classified information equipment to store or dispose of state secrets.

The hidden danger of leakage is all around us, and it is our duty to conscientiously study the relevant provisions of the new "Secrets Law" and beware of the risk of loss and leakage of secrets behind the office "network".

Image source network

Contributed by: Beijing No. 1 Intermediate People's Court

Editor: He Wanshan Xiao Fei

Review: Zhang Lei

Read on