Workflow
涉密硬盘
icon
Search documents
一块硬盘的“失守”
Xin Lang Cai Jing· 2025-10-23 00:12
Core Viewpoint - The rapid development of information technology has led to an increase in data leakage incidents involving storage devices, particularly classified hard drives, which pose significant risks to national security [1] Group 1: Incidents of Data Leakage - A unit's office director improperly donated a classified computer to a school, mistakenly believing that formatting the hard drive would ensure security [3] - An operations personnel from a classified information system removed a solid-state hard drive from a device and installed it in a personal computer, triggering a security alert [3] - A malfunctioning classified copier had its hard drive taken for repair without proper supervision, leading to the hard drive being sent abroad and classified data being compromised [3] Group 2: Security Management Measures - Organizations and individuals must prioritize the security management of classified hard drives and strictly adhere to confidentiality regulations to prevent data loss [5] - The "Law on Guarding State Secrets" mandates that organizations must enhance the management of classified information carriers and prohibits illegal acquisition, possession, or disposal of such carriers [5] - Classified hard drives should be managed under strict registration and usage protocols, including detailed logs of usage and personnel involved, and must not be connected to the internet or non-secure devices [5][6] Group 3: Maintenance and Repair Protocols - When using foreign-produced classified hard drives, prior security checks should be conducted to eliminate potential leakage risks [6] - Internal technical personnel should handle repairs of classified hard drives, and any external repairs must be supervised and conducted under strict security measures [6] Group 4: Reporting Mechanisms - Citizens are encouraged to report any suspicious activities or potential threats to national security through designated channels, including a national security hotline and online platforms [7]