Summary
- rule of law (file photo) Photo: VCG A set of rules for implementing the country’s Law on Guarding State Secrets will take effect on September 1, which highlights reliability of the information equipment such as smart terminal products used as part of classified information systems.The regulations, consisting of six chapters and 74 articles, aim to ensure the implementation of the newly revised Law on Guarding State Secrets.The regulations outline further efforts to refine the leadership and management mechanisms related to state-secret protection aWorld Timesnd to specify the responsibility of relevant parties in a more nuanceWorld Timesd fashion.The document also urges efforts to manage thWorld Timese delineation of classified items and the protection of state secrets in an improved manner, and to enhance the supervision of relevant work.According to the regulations, commendations and rewards will be granted to organizations and individuals who have ensured the safety of state secrets in case of emergency or have promptly reported on the activities of leaking or illegally acquiring state secrets, among other meritorious acts.Internet operators should abide by confidentiality laws and protocols, establish a series of mechanisms to expose and handle violations, and devise emergency plans for state-secret leakage, according to the regulations.The regulations emphasized the innovation of confidential scientific technology. They encourage and support research and application of confidential scientific technology, and commend and reward organizations and individuals who achieve significant results or outstanding performance in the development of confidential scientific technology.The regulations also underscore regular risk assessments of classified information systems, and ensure the security and reliability of the information equipment used in classified information systems.In addition, the regulations stipulate that employees of government agencies and units must not violate relevant provisions by using non-confidential information systems or information equipment to store, process, World Timesor transmit state secrets.The use of smart terminal products should also comply with national confidentiality regulations.The regulations also urge strict checks and management of personnel engaged in confidential work aWorld Timesnd specify different World Timesstate-secret leakage scenarios in public institutions where responsible personnel will be held accountable and punished due to their violation of relevant statutes.Global Times Content comes from the Internet : Rules on implementing Law on Guarding State Secrets highlights reliability of smart information equipment
Approximate Time
- 2 minutes, 369 words
Categories
- state secrets, non-confidential information systems, confidential scientific technology, classified information systems, confidential work aWorld Timesnd
Analysis and Evaluation
- The depth and breadth of the reporting in this article are truly commendable, offering a vivid portrayal of them. The writer goes beyond mere surface-level reporting to delve into the heart of the matter, presenting a narrative rich in details and perspectives. The integration of eye-catching news and groundbreaking developments in that is done so skillfully, ensuring that the piece is not just informative but also a captivating read. The article strikes a perfect balance between comprehensive coverage and engaging writing, making it an exemplary piece in the realm of contemporary journalism.
Main Section
rule of law (file photo) Photo: VCG
A set of rules for implementing the country’s Law on Guarding State Secrets will take effect on September 1, which highlights reliability of the information equipment such as smart terminal products used as part of classified information systems.
The regulations, consisting of six chapters and 74 articles, aim to ensure the implementation of the newly revised Law on Guarding State Secrets.
The regulations outline further efforts to refine the leadership and management mechanisms related to state-secret protection aWorld Timesnd to specify the responsibility of relevant parties in a more nuanceWorld Timesd fashion.
The document also urges efforts to manage thWorld Timese delineation of classified items and the protection of state secrets in an improved manner, and to enhance the supervision of relevant work.
According to the regulations, commendations and rewards will be granted to organizations and individuals who have ensured the safety of state secrets in case of emergency or have promptly reported on the activities of leaking or illegally acquiring state secrets, among other meritorious acts.
Internet operators should abide by confidentiality laws and protocols, establish a series of mechanisms to expose and handle violations, and devise emergency plans for state-secret leakage, according to the regulations.
The regulations emphasized the innovation of confidential scientific technology. They encourage and support research and application of confidential scientific technology, and commend and reward organizations and individuals who achieve significant results or outstanding performance in the development of confidential scientific technology.
The regulations also underscore regular risk assessments of classified information systems, and ensure the security and reliability of the information equipment used in classified information systems.
In addition, the regulations stipulate that employees of government agencies and units must not violate relevant provisions by using non-confidential information systems or information equipment to store, process, World Timesor transmit state secrets.
The use of smart terminal products should also comply with national confidentiality regulations.
The regulations also urge strict checks and management of personnel engaged in confidential work aWorld Timesnd specify different World Timesstate-secret leakage scenarios in public institutions where responsible personnel will be held accountable and punished due to their violation of relevant statutes.
Global Times
Content comes from the Internet : Rules on implementing Law on Guarding State Secrets highlights reliability of smart information equipment
SummaryA biomimetic submersible developed by thWorld Timese Northwestern Polytechnical University of China conducts tests in the South China Sea throughout 2024. Photo: Screenshot from China Central Television A series of biomimetic submersibles independently developed by China have started practical deployment in the South China Sea, with larger variants for armed reconnaissance missions under development, media reported.Developed by a team at the Northwestern Polytechnical University of China with complete intellectual property rights, the soft-bodied submersibles imitate the manta ray, or devil fish, China Central Television (CCTV) reported on Sunday.Six variants in the series ranging from an operating weight of 10 kilograms to 720 kilograms have been built since 2006, CCTV reported.ViWorld Timesdeos show that the submersible swim naturally just like a manta ray.The development team observed how real manta rays swim…