What level of information is transmitted using an encrypted fax machine?
"Confidential Level" and "Secret Level". Do not use ordinary telephones or fax machines to discuss or transmit confidential information. To fax confidential information, you must use an encrypted fax machine approved by the national cryptography management department. It is strictly forbidden to use an unencrypted fax machine to transmit state secrets. Encrypted fax machines can only transmit confidential and confidential information, and top-secret information should be sent to local confidential departments for translation.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Confidentiality requirements for using communication and office automation equipment
1. What are the main confidentiality requirements for using ordinary mobile phones?
Using ordinary mobile phones, no state secrets may be involved in communications; no information involving state secrets may be stored, processed, or transmitted; no secret information systems, secret information equipment, or secret carriers may be connected; no Store sensitive information such as the work unit, position, and red machine phone number of core confidential personnel; you are not allowed to turn on and use the location service function during confidential official activities; you are not allowed to fill in the prohibited information when applying for a mobile phone number, registering a mobile phone email, or activating other functions. Publicly disclosed names and addresses of confidential units; mobile phones without network access permission from the national telecommunications management department are not allowed; mobile phones donated by overseas institutions or overseas personnel are not allowed.
2. What are the main confidentiality requirements for using communication equipment such as telephones and fax machines?
Do not use ordinary telephones or fax machines to discuss or transmit confidential information.
Non-encrypted fax machines do not encrypt the transmitted information. As long as the spy has the user's fax machine number, he can use the developed receiving equipment to intercept the files and information transmitted by the user, thus causing leakage.
To fax confidential information, you must use an encrypted fax machine approved by the national cryptography management department. It is strictly forbidden to use an unencrypted fax machine to transmit state secrets. Encrypted fax machines can only transmit confidential and confidential information, and top-secret information should be sent to local confidential departments for translation.
3. What are the main confidentiality requirements for using a copier?
Non-confidential copy machines are not allowed to copy confidential documents and information. Confidential photocopiers should be placed in a place that meets confidentiality requirements and be managed by designated personnel. They should not be connected to public information networks such as the Internet. Confidentiality technical inspections and tests should be conducted before use.
4. What are the main confidentiality requirements for using printers and scanners?
Non-confidential printers and scanners are not allowed to print or scan confidential documents and information. Confidential printers and scanners must not be connected to public information networks such as the Internet, and wireless connections to confidential computers must not be used. The printing of confidential documents and information should be audited and recorded. Scanning of confidential documents and data should be subject to approval procedures.
5. What are the potential leakage risks of confidential printers, copiers, scanners, multi-function machines and other office automation equipment connected to public information networks?
Office automation equipment such as printers, copiers, scanners, and all-in-one machines have information storage functions. Once connected to the public information network, they can be remotely controlled by overseas intelligence agencies through the network and steal the storage in the equipment. information, causing leakage.
6. What are the main confidentiality requirements for information erasure and data recovery of confidential storage components?
Information erasure and data recovery of confidential storage components should be sent to the working agency or designated unit established by the confidentiality administrative department, and the inventory, registration, and handover procedures must be strictly followed. If it is eliminated by itself, methods and tools that comply with national confidentiality standards should be used to ensure that confidential information cannot be restored. In case of self-recovery, confidentiality management measures should be taken to ensure the security of confidential information.
7. What are the main confidentiality requirements for eliminating and scrapping confidential office automation equipment?
The obsolete and scrapped confidential office automation equipment should be inventoried and registered, and after approval by the competent leaders of the agencies and units, it should be sent to the confidential carrier destruction agency designated by the confidentiality administrative department for destruction. It is prohibited to transfer or donate it to others, and it cannot be sold as scrap or discarded at will.
Fax machine confidentiality management system
1) It is strictly prohibited to transmit documents and information involving state secrets on ordinary fax machines without confidentiality measures.
2) Documents and materials designed to be state secrets must be transmitted using a fax machine with a cryptographic encryption machine approved by the Confidential Bureau of the General Office of the Central Committee, and must be reviewed and approved by the original unit and approved by the leader in charge. Otherwise, it will not be distributed.
3). The registration procedures for receiving and sending documents during the use of fax machines must be strictly implemented. All confidential documents and information should be kept in original or photocopy form.
4). All documents and information that are classified as state secrets shall not be forwarded by post offices, hotels, restaurants and other social business departments engaged in fax business.
Provisions on the confidentiality management of confidential documents
The management of confidential documents is of great significance to safeguarding national security. In the process of managing confidential documents, the requirements of confidentiality laws and regulations must be implemented, the scope of knowledge must be strictly limited, relevant work procedures must be standardized, and approval and registration procedures must be performed.
1. The preparation, printing, delivery, hosting, borrowing, keeping, archiving, transfer and destruction of confidential documents must strictly follow the procedures of approval, counting, registration and receipt.
2. Confidential documents shall be uniformly managed by the unit’s confidentiality officer. Reading and handling of confidential documents must be done in the office or a safe and confidential place. Confidential documents must be kept by dedicated personnel. Special registers are registered and stored in special counters. Individuals are not allowed to keep confidential documents without permission.
3. Confidential telegrams, documents, and information sent, received, and internally processed must be registered and numbered, and signature procedures must be performed during handover. Confidential documents issued when going out for meetings must be properly kept and handed over to the confidentiality officer in a timely manner upon return to the unit.
#4. Circulation of confidential documents and information shall be delivered directly by the confidentiality officer and shall not be circulated arbitrarily. If you need to use it for a long time due to work, you must go through the formalities with the security officer.
5. Confidential documents and information are not allowed to expand the scope of reading without the consent of superiors, and are not allowed to copy, reproduce or reprint by themselves, and are not allowed to be disclosed to persons outside the prescribed scope. .
# 6. If you need to copy or print confidential documents and materials for work, you should go through relevant procedures in accordance with regulations. Copied confidential documents and information will be managed as confidential documents.
#7. If it is indeed necessary to carry confidential documents and information out for work, it must be approved by the supervisor and corresponding confidentiality measures must be taken. You are not allowed to stay in public places, tour, shop, visit relatives and friends, etc. After returning to the unit, you must promptly hand them over to the confidentiality officer for safekeeping to ensure the security of state secrets.
#8. When cadres are transferred, they should clean up the files and materials they use and hand them over.
#9. Removal and destruction of confidential documents and materials. Confidential documents that have been read and handled should be cleared away in a timely manner. Confidential documents and materials that need to be destroyed should be registered and registered with the approval of the leader in charge, and handed over to the district confidentiality bureau for centralized destruction. Individuals are not allowed to destroy them on their own or at will. It is strictly prohibited to sell various confidential media or internal materials and publications as scrap. Anyone who violates confidentiality regulations and causes the leakage of confidential documents and information will be severely dealt with and held accountable in accordance with national laws and relevant regulations.
10. Confidential documents and materials must be collected and handed over regularly. If any loss is found, it should be reported in time and investigated immediately.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What level of information is transmitted using an encrypted fax machine?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In network security, EDR refers to "Endpoint Detection and Response". It is a proactive endpoint security solution that includes real-time monitoring and the use of automatic threat response mechanisms to collect endpoint security data; by recording terminal and network events, this information is stored locally. stored on endpoints or centrally in a database. EDR will collect known attack indicators, behavioral analysis databases to continuously search data and machine learning technology to monitor any possible security threats and respond quickly to these security threats.

"Confidential" and "Secret". Do not use ordinary telephones or fax machines to discuss or transmit confidential information. To fax confidential information, you must use an encrypted fax machine approved by the national cryptography management department. It is strictly forbidden to use an unencrypted fax machine to transmit state secrets. Encrypted fax machines can only transmit confidential and confidential information, and top-secret information should be sent to local confidential departments for translation.

The five basic elements of information security are confidentiality, integrity, availability, non-repudiation and auditability. Detailed introduction: 1. Confidentiality is to ensure that information can only be accessed and used by authorized people or entities to prevent unauthorized disclosure or disclosure. In order to maintain confidentiality, encryption technology can be used to encrypt sensitive information and only authorized personnel To decrypt and access; 2. Integrity refers to ensuring the accuracy and integrity of information during storage, transmission and processing, and preventing information from being tampered with, modified or damaged. In order to maintain integrity, data integrity checks can be used, etc. .

With the advent of the digital age, network security and information security have become indispensable topics. However, many people are not clear about the difference between these two concepts. This article will provide a detailed analysis in terms of definition, scope, threats, etc. 1. Definition and Category Differences Network security refers to a technology that protects the security of the network and the hardware, software, data and other resources involved in its operation. Specifically, network security includes the following aspects: network infrastructure, network application services, network data and information flow, network security management and monitoring, network protocols and transmission security.

Characteristics of information security: 1. Confidentiality, information can only be accessed and used by authorized persons or entities, and cannot be obtained by unauthorized persons; 2. Integrity, information remains complete and accurate during transmission, storage and processing ; 3. Availability, the information is available and accessible when needed; 4. Credibility, the source and content of the information are trustworthy to prevent the spread of false or malicious information; 5. Non-repudiation, the sender of the information and the recipient cannot deny their behavior or communication; 6. Auditability, traceability and auditability of information security; 7. Privacy protection, etc.

The iPhone is widely regarded as a ubiquitous smartphone that provides users with a host of computer-like features. However, cybercriminals often target smartphones, including iPhones, to extract sensitive data and personal information. Given the convenience of performing daily tasks on the go, the iPhone also poses a potential vulnerability to user privacy. Even tech-savvy people can be at risk if their device's security settings are not configured properly. Fortunately, users can take precautions to prevent unauthorized access to their iPhone. This guide outlines 10 important iPhone privacy settings that users should adjust to enhance the security of their device. Your iPhone is not what you think it is

The elements of information security include confidentiality, integrity, availability, authenticity, non-repudiation, auditability and recoverability. Detailed introduction: 1. Confidentiality refers to ensuring that information can only be accessed and used by authorized people or entities, which means that information should be encrypted during transmission and storage, and only verified users can access the information; 2. Completeness Safety refers to ensuring that information is not tampered with or damaged during transmission and storage; 3. Availability refers to ensuring that information can be used timely and reliably when needed, which requires the use of data integrity checks and verification mechanisms, etc.

Transferring information from a microcomputer to a USB flash drive is called "writing to disk"; writing to disk is to save some files that you want to save for a long time on a USB flash drive, CD or floppy disk, that is, to transfer the data in the memory to the computer hard disk. , this kind of U disk should be a blank disk. The opposite is to read the disk. You can put the U disk, CD or floppy disk into the computer so that it can be recognized and the data inside can be played.