Error, relatively secure wireless microphones cannot be used in confidential meeting venues. Because the wireless microphone is a device with wireless interconnection function, the signals it processes and transmits information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing.
#The operating environment of this article: windows10 system, thinkpad t480 computer.
Error, relatively secure wireless microphones cannot be used in confidential meeting venues.
Confidential meetings and activities should be held in places that meet confidentiality requirements. The electronic equipment and facilities such as loudspeakers and recordings used should be tested for safety and confidentiality. The carrying and use of audio and video equipment should be approved by the sponsor. Unit approved. Wireless equipment or devices such as mobile phones, walkie-talkies, cordless phones, wireless microphones, wireless keyboards, wireless network cards, etc. are not allowed to be used, and video and telephone conferencing systems that do not meet confidentiality conditions are not allowed to be used.
Wireless microphones, wireless keyboards, wireless network cards and other wireless equipment or devices, the signals they process and transmit information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing.
Related expansion:
Confidential information generally refers to top-secret documents and information and contents of confidential facilities in the fields of national government affairs, security, science and technology, military, etc. The general scope is internal affairs Confidential and external confidentiality. The other category is the information content of commercial confidential documents of corporate entities.
Our country’s state secrets are divided into three levels: secret, secret and top secret. Secret-related information is also managed hierarchically according to the three levels: secret, secret and top secret. According to the confidentiality management principle of "whoever is in charge, who is responsible", the unit using confidential information should be responsible for the specific implementation of the hierarchical protection of confidential information in the unit.
The hierarchical protection of confidential information is a complex systematic project, involving the confidentiality, business secrets, informatization, business work, password, security and personnel departments within the unit. All relevant departments can only work closely together , Coordinated implementation can ensure the smooth progress of the entire work.
If you want to read more related articles, please visit PHP Chinese website! !
The above is the detailed content of Is it correct to use safer wireless microphones in confidential meeting venues?. For more information, please follow other related articles on the PHP Chinese website!