How to destroy the storage medium of classified information

Updated on technology 2024-03-26
6 answers
  1. Anonymous users2024-02-07

    Formatting, the best low grid.

  2. Anonymous users2024-02-06

    All classified carriers shall not be destroyed without authorization, and it is strictly forbidden to use classified carriers as waste products**. The destruction of secret-related materials shall comply with the "National Provisions on the Administration of the Destruction of Secret-related Carriers", and use destruction equipment and methods that meet the national secrecy standards to ensure that state secret information is not restored. "Unrecoverable" means that there is no readable confidential information on the residue or fragments formed after the destruction of the carrier and cannot be recovered by existing technical measures.

    The basic procedures for destroying secret-related carriers: Before sending them for sale, the ** government agencies and units shall conscientiously perform the inventory and registration procedures, report to the competent departments of the ** organs and units for approval, and store them in a special place that meets the requirements of security and confidentiality. **Institutions and units should carry out safe classification, packaging and transportation when sending sales, and send special personnel to supervise sales on site.

    It should be noted that the materials involved in secrets must be sent to a special destruction agency or an underwriting unit designated by the secrecy management department for destruction, and it is forbidden to send them to any other unit for destruction. In actual work, some first-class institutions and units will have a small number of classified carriers that need to be destroyed immediately, and they can destroy them on their own, but they must strictly perform the inventory, registration and approval procedures, and use destruction equipment and methods that meet the national secrecy standards. The equipment destroyed and used by organs and units shall be inspected by the administrative department for secrecy.

    Records of the registration and approval of the destruction of secret-related carriers shall be kept for future reference for a long time.

  3. Anonymous users2024-02-05

    BMB21-2007 "Requirements for the Security and Confidentiality of Carrier Destruction and Information Elimination Involving State Secrets" is there, but it itself is secretive, and it cannot be on the Internet, unless you need to be exposed to secrets in your future work, you can see this technical standard.

    1) For the destruction of secret carriers, it is necessary to carry out inventory and registration procedures, and it is strictly forbidden to destroy them without permission with the approval of the competent leaders of the organs and units.

    2) When destroying, make sure that the contents of the secret carrier cannot be restored. The destruction of magnetic media, optical discs, and other secret carriers shall be completely destroyed, and when necessary, methods such as crushing, burning, or chemical corrosion shall be employed.

    3) When destroying the secret carrier, there shall be relevant personnel present to supervise the sale, and the supervision personnel and the destruction personnel shall jointly sign, and it is forbidden to treat the secret carrier as a waste product**.

    4) The secret carrier must be sent to the unit designated by the Ministry of Secrecy for destruction.

  4. Anonymous users2024-02-04

    The BMB standards are all secret, and if necessary, you can apply to the Secret Bureau for inquiry.

    To put it simply, carrier destruction and information erasure should at least ensure that the data is unrecoverable.

  5. Anonymous users2024-02-03

    Confidential documents and materials shall be disposed of and destroyed in accordance with the following specifications:

    Article 1: The preparation, printing, transmission, undertaking, borrowing, keeping, archiving, transferring, and destruction of documents involving secrets (including documents, materials, charts, publications, and teaching materials that determine the classification level) must strictly carry out the formalities of approval, inventory, registration, and signature.

    Article 2: The reading and handling of documents involving secrets must be carried out in an office or in a safe and confidential place, and documents involving secrets should be stored in an iron cabinet. Top secret documents must be kept by special personnel, registered in special registers, and stored in special counters.

    Article 3: Confidential documents read and handled by all departments of the college shall be returned in a timely manner. Under normal circumstances, top secret documents and documents should not exceed one month, and documents below classified level should not exceed three months. If it is truly necessary to extend the use, the borrowing formalities shall be handled in the secret room.

    Fourth, when going out with confidential documents, the top secret level must be approved by the leaders of the college, and the confidential level must be approved by the leaders of the department, department, department, and affiliated hospital. It is strictly forbidden to bring confidential documents to public places or to visit relatives and friends.

    Article 5: Internal materials and publications that are not suitable for disclosure to the public shall be properly kept, and periodically cleaned up and destroyed.

    Article 6 The destruction of documents involving secrets shall be registered and examined and approved in accordance with regulations, and two or more persons shall go to a designated place to supervise the sale. It is strictly forbidden to treat all kinds of confidential carriers or internal materials and publications as waste**.

    Article 7: The archives department shall indicate the destroyed archives in the file catalog, and arrange the appraisal worksheets in numbered order and bind them into a book, and form an appraisal work volume together with materials such as the report made by the appraisal worker Huishen and the destruction of the inventory, and put them in the whole file for permanent preservation.

    Article 8: When the archives management personnel are transferred to work, they must complete the file transfer procedures before they can leave their posts.

  6. Anonymous users2024-02-02

    The continuous development of network information technology and the continuous improvement of hardware configuration will inevitably mean that old equipment will be eliminated, but what should be done with the storage media of those classified computers that are to be eliminated?

    Solution: 1.Before the use of office automation equipment such as computers involving secrets is eliminated, technical equipment that meets national confidentiality standards shall be used to remove information related to secrets or sensitive internal information, so as to ensure that it cannot be restored.

    2.Send the secret-related computers and other secret-related office automation equipment that are about to be phased out to the destruction agency set up by the department for the administration and management of secret-guarding or the designated underwriting unit for destruction.

    It is difficult to completely erase the information by simply deleting or formatting the information from the computer or removable storage media, but it can still be recovered by relevant technical means.

    Therefore, it requires the use of specialized technology for destruction. The destruction of professional secret-related carriers refers to the use of special technical means to completely eliminate confidential information stored in confidential computers and confidential mobile storage media, so that the information content cannot be recovered by any technical means. Obsolete and scrapped classified computers and classified mobile storage media are still secret carriers and cannot be transferred, donated or used as scrap at will.

Related questions
11 answers2024-03-26

A large number of classified documents is a problem faced by many enterprises: >>>More

15 answers2024-03-26

You look at the properties to see what policy is causing the warning, and then disable it in the local user policy. >>>More

6 answers2024-03-26

This major is very good, I am this major.

If you want to do technology research and development, find a way to improve your hands-on ability, you can start with a single-chip microcomputer to learn, do more by yourself, if the conditions are met, you can choose a single-chip microcomputer development board, which is conducive to quickly mastering the knowledge of single-chip microcomputer, and choose some technical support Good, similar to Wu Jianying single-chip microcomputer development board. >>>More

12 answers2024-03-26

This was set up not long ago. You need to completely delete and add it again. And it's an active addition. Otherwise, the black party will still not be able to send a message to the other party!

10 answers2024-03-26

My Computer - Right-click - Tap Properties, you can see CPU memory, etc. >>>More