Copyright ©2010-2024 Shenzhen Innotrik Technology Co., Ltd. All Rghts Reserved
1、Mentally "tighten the strings"
The key to confidentiality lies in people. At present, the application experience confidentiality knowledge of video conferencing among cadres of organs are generally lacking, situations such as misoperation illegal operation in practice are repeated one after another, resulting in occasional cases of leakage of secrets. For example, a secret-related unit held a video conference during which a secret-level state secret information was mentioned, but the relevant participants recorded the meeting as a video uploaded it to the Internet, resulting in leakage.
Therefore, to do a good job in the confidentiality of video conferences, we must give priority to the confidentiality management of "people" put it in a prominent position。
It is necessary to carry out targeted education on the awareness of secrecy the common sense of secrecy, eliminate paralyzing thoughts, build a solid inner line of defense.
Carry out regular confidential reminders, give "prevention shots" early recite "tightening spells" frequently, so that government officials can master the basic methods of video conferencing risk investigation, mitigation disposal, ensure that risk awareness responsibility awareness are transmitted to everyone. , effectively enhance the "immunity" of confidentiality prevention.
2、Institutionally "drawing boundaries"
“Secrets are not used online, the Internet is not related to secrets. According to Article 5 of the Measures for the Investigation Hling of Leakage Cases, the transmission discussion of state secret information through video conferencing will be "treated as leaking state secrets."”。
To do a good job in the confidentiality of video conferences, it is necessary to pay close attention to the implementation of the confidentiality system, strictly draw a clear line between "secret" "non-secret", make it clear that video conferences are limited to the discussion of general information that is well-known, must not involve state secrets, work secrets, preferably not commercial secrets or personal privacy。
Strictly distinguish between office information equipment personal information equipment, prohibit the storage processing of confidential or sensitive information in information equipment connected to the Internet, prohibit unauthorized use of personal information equipment to record meeting audio video or download data materials.
At the same time, it is not recommended to mix work accounts with personal accounts, use personal social media accounts to log in to video conferencing software or publish share meeting links to avoid account association or meeting information leakage.
3、Technically "armed"
The openness of the Internet, the security vulnerabilities of the software itself, the lack of protection of some terminals have led to the risk of hacking, eavesdropping, impersonation, tampering with content when holding video conferences。
To do a good job in the confidentiality of video conferences, it is necessary to take the prevention of theft leakage of secrets as the starting point focus of efforts, implement confidentiality prevention measures in the front。
Ensure that the information equipment used for video conferencing meets the requirements of confidentiality management, install security protection software such as anti-virus software firewalls, regularly check the security of the operating system, patches in a timely manner, check kill viruses, ensure that unknown links are not clicked, unknown files are not downloaded, malicious intrusions are not given opportunities.
Ensure real-time attentionVideo conferencing softwareIn the case of vulnerability s, upgrade the software to the latest version as much as possible, actively set frequently replace the strong login password, such as length greater than 8 digits, uppercase lowercase English letters, numbers special symbols, etc., to ensure the security of the account password.
4、Management "stare to the end"
“If you are cautious as you started, there is no failure. "To do a good job in the confidentiality of video conferences, we must assume the main responsibility for security confidentiality management."
Before the meeting, strictly review the electronic meeting materials to ensure that they do not involve state secrets or sensitive internal information; Verify the equipment systems that participants intend to access one by one, strictly control the "access customs".
During the meeting, the confidentiality discipline was emphasized, online management was strengthened, strict authority control was carried out for participants who passed identity authentication, internal violations external risks were "patrolled" to prevent personnel outside the scope of knowledge from obtaining the content of the meeting.
After the meeting, according to the confidentiality management requirements of the unit, clean up the data stored in the recording server information equipment as appropriate。