Circular 33/2015/tt-Bca: Guide The Implementation Of A Number Of Articles Of Decree No. 33/2002/nd-Cp Dated 28 March 2002 Detailing The Government's Enforcement Of The Ordinance On Protection Of State Secrets

Original Language Title: Thông tư 33/2015/TT-BCA: Hướng dẫn thực hiện một số điều của Nghị định số 33/2002/NĐ-CP ngày 28 tháng 3 năm 2002 của Chính phủ quy định chi tiết thi hành Pháp lệnh Bảo vệ bí mật nhà nước

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$20 per month, or Get a Day Pass for only USD$4.99.
MINISTER OF SECURITY
Number: 33 /2015/TT-BCA
THE SOCIALIST REPUBLIC OF VIETNAM.
Independence-Freedom-Happiness
Hanoi, July 20, 2015

IT ' S SMART

Instructions to do some things N Number one. 33 /2002/NĐ-CP March 28, 2002

of - The government rules out the details. Pl The order B Home secret defense. c

_________________________

The French base of the State Secret Service. 30 /2000/PL-UBTVQH10 December 28th, 2000;

Base of Protocol 33 /2002/NĐ-CP March 28, 2002 of the Government rules the implementation of the Law of Protection of State Secret Service;

Base of Protocol 106 /2014/ND-CP November 17, 2014 of the Government stipulated the function, mandate, jurisdiction and organizational structure of the Ministry of Public Security;

On the recommendation of the Director General of the Directorate of Security;

Minister of the Ministry of Public Security to guide the implementation of the Digital Protocol 33 /2002/NĐ-CP March 28, 2002 of the Government Regulation Law enforcement of the State Secret Protection Command.

Chapter I

GENERAL REGULATION

What? 1. The tuning range and subject apply

1. This information instructs some of the provisions of the Digital Protocol 33 /2002/NĐ-CP March 28, 2002 of the Government Regulation Law enforcement of the State Secret Protection Command (later called the Digital Protocol). 33 /2002/ND-CP), including: Set, modify, add, secure a state secret catalog; the text rules the density for each document type, the state secret item; the responsibility of the agency, the organization and the citizens of the protection of the state secrets; the password and the banned sea sample.

2. This information applies to state agencies, political organization, political organization-social organization, social organization, economic organization, people's armed unit (the latter is the agency, the organization) and every citizen.

What? 2. Explain the word

1. The density is the critical level of state secrecy, the extent of the damage if the news, the state secret document is revealed.

2. The state secret catalog is a law-based law that is issued by a competent authority that regulates the density for protection under regulation.

3. The state carrying a state secret is the object including the document, the material, the machinery which is contained, containing the state secret.

4. The state secret of the classified state is the news of the incident, the work, the document, the material, the location, the time, the word (the following is the document, the state secret object) that has a particularly important content of the state secret portfolio led by the Prime Minister. decision to issue, which is only popular to the person with responsibility and if the disclosure will cause serious special consequences for the benefit of the Socialist Republic of Vietnam.

5. The state secret of the state of secrecy is the documents, the state secrets that have a very important content of the state secret portfolio issued by the Prime Minister, which is common only to those and the relevant unit and if the disclosure will be revealed. It ' s a very serious consequence of the interests of the State of the Socialist Republic of Vietnam.

6. The secret state secret is the documents, the state secrets that have important content of the state secret catalog issued by the Minister of Public Security and the Secretary of Defense, if it is revealed that it will damage the interests of the state. The Socialist Republic of Vietnam.

7. The authorized authority in the Digital Decree 33 /2002/NĐ-CP is the Chief of Staff of the Central Committee; Head of the Committee of the Communist Party of Vietnam; Chairman of the Office of the National Assembly; Chairman of the Office of the President of the Water.

8. The prohibited area, the prohibited site of the state secret range are those set up for protection, management, tight control of human activities, the means of maintaining order, security, room, anti-invasion, sabotage, income, and more. State secrets in the area, that location.

9. Document security, a state secret object that removes the specified density of the document, the state secret item.

10. Disorder of the document, which carries the state secret is the determined density of the document, the state secret item.

11. Increased the document, which carries the state secret is to increase the density that has been identified by the document, the state secret item.

12. The document publication, the state secret object, is a public announcement for everyone who knows to approach.

13. Document security, the state-secret object is automatically deleting the density of the document, which carries the state secret without the need to proceed with the prescribed security procedures.

Chapter II

SPECIFIC REGULATION

What? 3. Set, edit, add, secure state secret catalog

1. The base stipulated at Articles 5, 6 and 7 of the State Secret Protection Command, the head or authorized person of the agencies, organized within the functional range, its mission to organize the object to determine the extent of the absolute state of state. The secret, the secret, the Secret of the Agency, the unit, the system, the system along the head of the body, the head of the Central Committee, the Chairman of the Provincial People's Committee, the Central Committee of the Central Committee, to consider establishing a state secret manifest in accordance with Article 3 of the United States. Number 33 /2002/NĐ-CP.

2. The Secret State Secret Service and the Secret Service are sent to the Ministry of Public Security to determine before the Prime Minister decides. The secret state Secret Service sent the Minister of Public Security.

3. On the basis of the proposal by the head of the agency, the organization in Central; the Chairman of the Provincial People ' s Committee, the Central City of Central, the Prime Minister and the Minister of Public Security with the responsibility to enact the state secret portfolio of each organ, the organization. in the Central and Common category of all the provinces, the Central City of Central.

4. At the first quarter of the year, agencies, organizations in the Central Committee, the Provincial People 's Committee, the Central Committee of the Central Committee to consider the agency' s state secret catalog, the organization itself was granted the authority to review the board; the case saw the catalogue no longer. In accordance with the need to change the density, to secure or identify new content that needs to be secure, it is a competent, authorship procedure that decides to modify, add a state secret catalog, or change the density, to address the state secret catalog of the agency, I don't know.

What? 4. The text rules the density for each document type, the specific state secret object.

The state secret catalog base has been granted a decision authority, the head or the authorized body of the agency, the organization must have a specific regulatory text: The type of document, the secret state of the state of secrecy; the type of document, the secret object. The state of the state of secrecy; the kind of document, the secret state of the state of the Secret Service, organized by the organization.

What? 5. Identitiate the density for records, documents, state secret items

1. The base on the state secret catalog has been granted a decision authority, the redaction must propose the density of each text in the text editor; the written scribe is responsible for deciding the closure of the density (classified, classified, confidential,). Honey), the circulation range, the number of releases; the clerk’ s office is responsible for closing the seals on the decision by the browser to sign the state secret document.

2. The state's secret service, state secret records are identified and stamped on the outside of the state-secret object and outside the file's highest density of documents stored inside the state's secret, state secret records.

What? 6. Authority permission to print, star, document photo, state secret items

1. The person responsible for establishing a state secret catalog specified at Article 1 and Article 2 of the Digital Protocol 33 /2002/NĐ-CP can authorize the authority to authorize printing, star, document-taking, state-secret items for the lower level, in particular:

a) The organ leader, the organization of the authority to print, copy the document, the secret state secret, the Secret, the Secret;

b) Senior (or equivalent) to the agencies, organizations in the Central and the Director of the Department (or equivalent) local authorities allow printing, stars, documents, secrets of state secrets, Cile;

c) Chief of the office, Head of the Administrative Room or Head of a number of agencies, the unit has the authority to allow the printing, star, document, which carries a secret state secret.

2. The authorization of the printing authority, so, is to be specified specifically at the agency ' s state secret protection statute, the organization.

What? 7. Transport, document delivery, state secret items

1. The document, which carries the state secret when the transport must be contained in the packaging is sure by the appropriate type of material; when required by regulation; there is a safe transport; the required case is required for the maintenance of the maintenance. The transportation of documents, secrets of state secrets.

2. All transactions, documents, state secret items must enter a confidential document transfer window and sign between the transaction and the document. If transportation, post-mail delivery must follow the postal service of the postal service.

3. Send documents, state secrets:

a) The password text is registered to a separate book system;

b) Enter: Before sending the document, the object carrying the state secret must enter the "register of the secret text." The "classified text register" template is carried out in accordance with the Appendix VII of the Digital Information. 07 /2012/TT-BNV November 22, 2012 of the Ministry of Internal Affairs Guide to Text Management, file and file filing, document to the agency archive (separately for the classified document only is weak only when the text player agrees);

c) The packaging: Document, which carries the state secret when sent to its own packaging. The packaging paper must use a strong, durable, waterproof paper, not seen through it; the glue is sticky, it is hard to exploit;

The document, which carries the state secret of the "Great Secret" state, is sent in two layers of envelopes: Bì in the number of records, the symbol of the document, the recipient's name, which seals the secret in the foreskin. If it is a document, a state-secret object to a man whose responsibility is to solve it, "only the name of the newly encased name". External packaging: Write as a regular document and seal an "A" sign in the outer envelope;

The document, the secret state secret state, and the password are sent in an envelope, outside the packaging that stamped "B" and the letter "C" corresponding to the density of the file inside the package;

4. Receivable, state secret object:

a) When receiving the document, the object carries the state secret, the letter must enter the "secret document registration book". The "secret text register" template is made in accordance with the Annex II of the Digital Information. 07 /2012/TT-BNV.

The document, the state secret object, can be registered with a database management database coming on the computer. The document, the state secret object that was registered to the database management database, came to be printed out of paper to sign the primary and close to management.

The computer used to register the document, the state secret object not to connect the networks (internet, internal network and wide network ...);

b) If the document, the state secret object, the envelope marked "Only the name of the new name is unsealed", the letter to the book according to the epidermal symbol and the immediate transfer of the name on the envelope. If a man has a name on the empty envelope, and on the envelope, there's a speed mark that moves to the unit leadership. The office was not opened.

c) The case of the document, the hidden object of the state sent to without the correct implementation of the secret protection of the state, moved to the person responsible for the settlement, and rereported the site in order to withdraw experience and have timely remedied. If the document is discovered, the state's secret items sent to a sign of exploitation, packaging, or documents swapped, lost, damaged, the recipient must report to the head of the unit for timely treatment.

5. The documents, the state secret objects stamped "The recall document", the document, or the spokesperson must have the responsibility to recover or return the correct time of writing on the text. Upon receiving, as well as when the check is checked, the document ensures that the document is not lost.

The recipient of the document, the secretary of state, is responsible for returning the "revoked document" on time of regulation. In the absence of the material, the consequences of the violation are processed by the rule of law.

What? 8. Save, preserve, use documents, state secrets, state secrets.

All documents, state secrets, must be kept, preserved, and used correctly.

The document, which carries the state secret after processing must be classified, kept in the file, put into the cabinet, the chest or the safe, not automatically carried out of the agency. It is necessary to bring the document, the subject of a state secret to work, to take home, and be agreed upon by the head of the head of the agency, the organization, to register with the security department and to have strict security methods. In any case of the discovery of the document, the hidden object of the state was lost, changed, damaged, or the state secret was exposed to the head of the agency, the organization for a timely resolution.

What? 9. The review procedure provides documents, state secrets to the organization, foreign individuals, and other countries.

1. Agency, organization and citizens of Vietnam relations with the organization, foreign individuals are not disclosed state secrets. The provision of information belonging to the state secret to the organization, foreign individual must follow the correct regulation at Article 19 of the Digital Protocol. 33 /2002/NĐ-CP.

2. When conducting an international cooperation program or the implementation of the service if required to provide information that is in the state of the state secret to the organization, foreign individuals must comply with the principle:

a) Protect the national interest;

b) Only those issued to the competent authorities;

c) The request for the recipient to use the correct use of the agreement and not be disclosed to the third party.

3. The recommended granting jurisdiction allows the provision of a state secret range to the organization, the foreign individual must be written in writing, which specifies the person or organization of the provision; the type of state secret that will provide; organization, individual. Foreign countries will receive the information; the scope, the purpose of using the news.

4. Text offers to provide classified information sent to the Government Office to present the Prime Minister. The text offers to provide information within the secret state of the state of secrecy sent to the Ministry of Public Security to the Minister of Public Security (except for the field of defence). The text offers to provide information within the secret state secret range sent to the head or authorized person of the agency, the Central Committee, the Chairman of the Provincial People's Committee, the Central Committee of the Central Committee.

In the slowest period of 30 days from the date of receiving a valid offer text, the person with the prescribed authority is responsible for a written responsibility for the agency, holding the request for consent to the provision of the news or refusal to provide news and reason to deny it. offers.

What? 10. The procedure for carrying documents, which carries state secrets to foreign countries

The person carrying the document, the hidden object of state abroad must have the required text and the authority of the agency or the authority of the agency, the organization in the Central Committee, the Chairman of the Provincial People ' s Committee, the Central City of the Central Committee. You have to specify the person who carries the document, the hidden object of the state abroad; the document, the object, the scope, the scope, the purpose. When the context of a document must be presented with the approval of the grant grant authority, entry at the store.

What? 11. Destroy the document, the state secret

1. The principle of destruction of the document, the subject of state secrets:

a) To protect the interests of the State of the Socialist Republic of Vietnam;

b) Make sure to request not to reveal, to document, to carry a secret state;

c) The destruction of the document, the state secret object must ensure the burning, shearing, small grinding, which changes shape, feature, effect, cannot be restored.

2. The base for the destruction of the document, which carries the state secret: The base to the document, the state secret object no longer worth the use or no longer the value stored on the fact.

3. The authority to destroy the document, which carries a state secret:

a) The destruction of the document, subject to state secrecy in the agencies, organization in the Central Committee due to the rank of the Secretary (or equivalent) decision;

b) The destruction of the document, which carries the state secret in the provinces, the Central City of Central City due to the Director of the Department (or equivalent) decision;

c) The destruction of the cipher is carried out by the provisions of the Government Mechanic Ban;

d) The person responsible for printing, why, take documents, the state secret objects that are responsible for the destruction in place of the excess, which is broken after the completion of the printing, star, photo.

4. The sequence, the destruction procedure:

a) Every year, the direct unit of management, document retention, state secret objects responsible for the creation of the Board of Destruction of the document, which carries the secret state: Representative of the direct unit of the unit to hold, manage the document, the secret household. Water, cadres are assigned to hold, manage documents and represent other relevant departments. The Council is responsible for reviewing, reviewing, statistics of documents to suggest a competent person under the provisions of Article 3 This Article allows for the destruction;

The Board of Destructs works according to the collective regime and decides to follow a majority, self-dissolution after the destruction is conducted;

b) The destruction of the document, the state secret object was only made when it was decided to agree with the written consent of the competent person;

c) The destruction of the document, the state secret object must be established with the confirmation of the person who carries out the destruction and leadership of the unit of management, the retention of the document, the state secret object destroyed;

d) The entire process of destruction of the document, the state secret object must be set up, including: The decision to establish the Destruction Council; the catalogue of documents, the state secret object proposed to destroy; the presentation of the documents, the secret object. The state offered to destroy it; the decision to allow the destruction of the authority, which was written about the destruction.

Records of the destruction of the document, the subject of state secrets must be kept, preserved at the agency, organized by the provisions of the law of storage.

5. In the special case if the document, the hidden object of the state that is not destroyed soon will cause serious consequences for security, defense or other interests of the State, the person who is managing the document, the state secret carrying the right to freedom. destroyed but soon afterwards must report in writing with the head of the agency, the organization and the public safety agency. If the self-destruction of the document, the subject of state secrets has no good reason, the culman is accountable to the law.

What? 12. Privy, classified security, increased file of documents, state secrets brought by agencies, organized by the organization.

1. The principle of security, loss of honey, increased the document, the state that carries the secret state to protect the interests of the State of the Socialist Republic of Vietnam.

2. Base to recommend security, security, security:

a) The base is on the state secret catalog issued by competent authorities to scrutinate and propose security, security, security, and security.

b) The base to the change of the actual situation that proposes security, loss of honey, increased density;

c) Based on the contents of each document, the subject of a specific state secret, if the disclosure is not harmful to the interests of the State of the Socialist Republic of Vietnam, the secret solution;

d) Based on the whole or part of the document, the state secret object was published in the other document.

3. Privy of security, security security, increased security: The head of the agency, the organization that determines the security, the security, the security of the documents, the secret state of the state, the drafting organization.

4. Time of security, security loss, security:

a) At the first quarter of the year, the agencies, the organization were responsible for sweeping the security, the security, the security of the documents, the secret state of the state, organized by the authorities.

b) In the event of a break-up of security, security, increased density of documents, state secrets to service, agency, organization can conduct security, security, security, and security procedures.

5. Presentation, security procedure, security loss, password increase:

a) After conducting a sweep of the documents, the secrecy of the state secret balance, security, security, security, and unit entrusted to the establishment of the Privy Council, the security, security, and security of the Council of the Council; The department represents the direct division of the document, the secret state of the state, and the representatives of other parts that are relevant.

The security council, lowering the honey, increased the work density according to the collective regime, decided to follow the majority and self-dissolution after the security, security, increased density;

b) The security, security, increased density of research, review, assessment of the head of the head of the agency, the organization that determines the security, loss of honey, increased honey.

In the case of need, the Privy Council, the security, increased honey may apply for the participation of the agency, the organization involved;

c) The document category, the state secret object that offers the security, the security, the security of the Council must be expressed in writing. The security, security process, increased density must be established and stored in the security, security, and security.

Security records, security security, increased document passwords, state secret items including: Decision to establish a Privy Council, a security loss, increased honey; catalogue of documents, state secrets, state secrets, security, security, security, increased security; the presentation of the solution. Honey, security, increased honey; the Council meeting; the security decision, the security, the increased density; the participation of the functional bodies and other documents that are relevant;

d) After the resolution of the security, security, increased density, the document was responsible for closing the security, security, security, and security.

e) After 15 days since the document, the state-secret object of the state was classified, security, security, the security operation, the responsibility to inform the agencies, the organization that received the knowledge to make a classified, classified, classified, classified security. I don't know.

6. The document, the state secret object will automatically resolve in the following cases:

a) Subscription on the agency ' s electronic information page, unit;

b) published on the popular media;

c) Post the report;

d) At headquarters, units or at other locations;

e) Other forms of public publication.

After the document, the state-secret object is automatically classified, the document is responsible for closing the classified security.

7. The archives have a state secret content when it is filed into the Party Central Archives and the Central Committee documents are classified as defined by the Central Secretariat of the Communist Party of Vietnam.

What? 13. Document Archive at History Archive

1. The principle of the security of archives at the Historic Archive of the state secret content (later known as archive document) must ensure protection of the interests of the State of the Socialist Republic of Vietnam.

2. Base to propose a storage document security:

a) The base of the state secret catalog issued by the authorities.

b) Based on the contents of each particular archive, if the disclosure does not pose a danger to the interests of the State of the Socialist Republic of Vietnam;

c) The base to the change of the actual situation;

d) The base at the duration of the storage document is widely used under the provisions of the Archives Law;

e) Base for the whole or part of the archives published in the other document.

3. Privy jurisdiction: The head of the body that performs the task of managing the state of the mail, storing the grants that determine the security of the archives at the same level.

4. Presentation, security procedure:

a) After conducting a sweep of the stored-to-security archives, the head of the agency performs a mission to manage the state of the document, the retention of the establishment of a secure document of the archives at the same level, including: The head of the agency. The task of managing the state of the office, hosting as the President of the Council; the unit leader directly preserved the archives and representatives of the agencies, the organization has a classified file document.

The Privy Council works according to the collective regime, which decides to follow the majority and self-dissolution after the secret process;

b) The archives of the archives of archives at the Historic Archive of the Licensed Materials research, review, evaluation of the head of the agency to carry out the task of managing the state of the state of the mail, storage at the same level of the security of the archives. Yeah.

For the historical archives of the Secret Service, prior to the process of the General Assembly, the Council must be responsible for the opinions of the ministries, the relevant sector, before the leadership report has the authority to decide;

c) The archive of the archive document must be established as a record and save at the agency, the organization that performs a security mission.

The archives of the archive document include: The decision to establish the archive of the archive of the archives; the portfolio of the document that offers the security; the demonstration of the security; the Council meeting; the Security Decision; the participation of the agencies, the organization. and other documents that are relevant;

d) After the decision to secure the archive document, the document is responsible for closing the classified solution;

e) The notification of the catalogue of archives documents has been made in accordance with the provisions of the storage law.

What? 14. Property facilities, technical service engineering, state secret protection.

1. The site of the facility ' s facilities, the technique of serving the secret protection of the state by the head of the agency, the organization decided.

2. The funding for the state secret protection of the agencies, the organization is implemented in accordance with the guidance at Digital Information. 110 /2013/TT-BTC August 14, 2013, the Minister of Finance provides for the establishment of the bill, which manages, uses, and decides that the state budget budget guarantees the task of specialized protection of state secrets.

What? 15. Inspector, test, breach of the breach and address of the complaint, denouncing in the state secret defense.

1. The Ministry of Public Security conducts inspections, periodic checks or mutations in the field of state secret protection against the agencies, organization.

The inspector is conducted periodically every three years, the inspection is conducted annually; inspectors, the test of the mutations are conducted upon the discovery of the agency, the organization, the individual with signs of breach of the law on the protection of the state's secret protection. Detective, check.

2. The head of the agency, the organization that performs periodic checks or mutations in the field of state secret protection against units within its management range under the regulation at the 3 and 4 Articles 24 of the Digital Protocol (s). 33 /2002/NĐ-CP.

3. The person with a violation of the law of state secret protection is subject to the nature of the behavior of violations that dealt with discipline, disposal of administrative violations, or in search of criminal liability.

4. When there is a complaint, denouncing in the area of state secret protection, the Ministry of Public Security is in charge of coordination with the agencies, the relevant organization to resolve under the rule of law on the complaint, denouncing.

What? 16. Secret pattern and forbidden sea sample

1. The font used for the honey and seal samples is the Vietnamese font of the Unicode character code under the Vietnam Standard TCVN 6909:2001.

2. The ink used to close the honey seals is bright red ink.

3. The location of the secret seals that are executed by Annex III issued to this message. No printing is available solely to the state secret document. In the special case, the document, printed books, published in large quantities, must print a bright red ink density on the outside of the document, the book cover.

4. The password template includes:

a) The "ABSOLUTE SECRET" pattern: The rectangular shape, the 40mm x 8mm size, has two surrounding contours, the distance between the two contours is 01 mm; the inside of the two contours is the letter "ABSOLUTE HONEY" is presented with a flower print, the bold, bold; the way all borders The external side is 02mm (classified as the following instructions in Appendix I);

b) The "DARK" pattern: The rectangular shape, the size of 30mm x 8mm, has two surrounding contours, the distance between two contours of 1 mm; the inside of the two contours is the letter "DARK HONEY" is presented with the letter in flower, the type, bold; the way the border is on the side. in addition to 02mm (the top-secret pattern performed in Appendix I);

c) The "HONEY" pattern: The rectangle, size 20mm x 8mm, has two surrounding contours, the distance between two contours is 01mm; the inside of the two contours is the letter "HONEY" presented with a flower print, a standing, bold style; the way the outline is outside. 02mm (the HONEY prototype performed in Annex I);

d) The "SECRET" PATTERN: The rectangle, size 30mm x 13mm, has two surrounding contours, the distance between two contours is 01 mm; the inside has two rows 02mm apart and the way the border is outside 02mm; presented with the uppercase, the letter. standing, bold: The first row is the phrase "SECURITY", the second row is the "TYes: ....." at the end of the row and the dots to the end (the security pattern is made in accordance with the Appendix I).

After closing the "SECURITY" line at the line "TYes: ....." must specify a time of security starting from the date, month, the year the leader has the authority to sign the security decision;

e) A password drop pattern includes:

The "DARK DOWN" PATTERN: The rectangle, size 55mm x 13mm, has two surrounding contours, the distance between two contours is 01mm; inside there are two rows of letters 02mm and the way the border is outside 02mm; presented with a flower print, The first line is the letter "DOWN TO THE TOP OF THE SECRET", the second line is the letter "TYes: ..." at the end of the row and the dots to the end (the "DROP TO THE TOP").

-"DOWN TO HONEY": The rectangle, size 50mm x 13mm, has two surrounding contours, the distance between the two contours is 01mm; inside there are two rows 02mm apart and how all the border outside 02mm; is presented with a flower print, style. The first row is the letter "REDUCED TO HONEY", the second line is the "TYes: ..." in the surrender and the dots to the end (the "drop to the honey" form in the direction of Appendix I);

After closing the "DOWN TO SECRET" mark and the "DROP TO HONEY" line in the line "Tyes: ..." must specify the time of the reduction in honey from the date, month, year the leadership has the authority to sign the security decision;

g) The pattern of increased density includes:

The "GREAT INCREASE IN HONEY": The rectangle, size 55mm x 13mm, has two surrounding contours, the distance between the two contours is 01mm; inside there are two rows 02mm apart and the way the border is outside 02mm; presented with a flower print, The first line is the "INCREASE IN SECRET" line, the second line is the "TYes: ....." at the surrender and the dots to the end (the "EXCELLENT INCREASE" pattern is performed in Appendix I);

-"INCREASE IN DENSITY": The rectangle, size 50mm x 13mm, has two surrounding contours, the distance between two contours is 01mm; inside there are two rows 02mm apart and the way the border is outside 02mm; presented with a flower print, The first row is the "INCREASE TO SECRET" line, the second line is the word "Tyes: ....." at the end of the row and the dots to the end (the pattern "INCREASED TO THE TOP SECRET" in accordance with the instructions on Appendix I);

After closing the "ABOVE CLASSIFIED" mark and the "INCREASE IN HONEY") in the line "Tyes: ...." has to clear the time of increased nectar starting from the date, month, year the leadership has the authority to sign a security decision;

h) The "RECOVERED DOCUMENT": The rectangle, the size 55mm x 13mm has two surrounding contours, the distance between the two contours is 01mm; the inside has two rows 02mm apart and the way the border is outside 02mm; presented with printed text. The first row is the "RECALL DOCUMENT" line, the second line is the "DEADLINE" line at the surrender and the dots to the end (the recall document).

The recovery document is used in the case of state secret documents that were issued for a certain period, the user was used only in that deadline and then handed back to the document where the document was issued. After closing the "RECOVERY DOCUMENT" in the "DEADLINE" line must specify a time of document recovery before date, specific time;

i) The "ONLY PERSON TO BE EXPLOITED": The rectangle, the size 70mm x 9mm, has two surrounding contours, the distance between the two contours is 01mm, inside is the letter "ONLY THE NAME OF THE NEWLY EXPLOITED". bold; the way the border is outside of 02mm (the only person named the newly-exploited name is in the Appendix I);

The "only known name" is used in the event of a transfer of documents, a secret state secret, which only the recipient of the recipient to secure the secret of the document, the outlaw noted the recipient, the transfer department must be transferred. And his hand was in his hand,

The "A" pattern: Circle, 15 mm diameter, there are two surrounding contours, the distance between the two contours is 01mm, the height of the letter "A" is 10 mm, shown in the middle of the circle, in uppercase, bold, bold (pattern "A"). lead at Appendix I);

The "A" pattern is used to close outside the document that has a Content-based content.

l) The "B" pattern: Circle, 15mm diameter, which has two surrounding contours, the distance between the two contours is 01mm, the height of the letter "B" is 10mm, presented in the middle of the circle, in uppercase, bold, bold (pattern "B"). lead at Appendix I);

The "B" specimen was used to close outside the contents of the document with a dark degree content;

m) The "C" pattern: Circle, 15mm diameter, which has two surrounding contours, the distance between the two contours is 01mm, the height of the letter "C" is 10mm, shown in the middle of the circle, in uppercase, bold, bold (pattern "C"). lead at Appendix I);

The "C" pattern is used to close outside the document that has a density content;

5. The forbidden pattern includes:

Sea sample "RESTRICTED AREA": the horizontal rectangle, measuring 80cm x 60cm, is made of durable material; black writing on a white background; in flowers, style, bold; phrase "RESTRICTED AREA" written in Vietnamese (in the upper line), height The letters are 12cm and English ("RESTRICTED AREA" and "NO TRESPASSING") in two lower lines, the height of the letter is 10cm (sea sample "RESTRICTED AREA" performed in the direction of Appendix II);

The "RESTRICTED AREA" sample used to prohibit in areas granted jurisdiction identified as a restricted area is prohibited;

b) The pattern "FORBIDDEN SITE" rectangular shape of 60cm x 40cm, made of durable material; black writing on white sea background; in flowers, style, bold; written in Vietnamese ("PLACE FORBIDDEN") in the upper line, height of 8 cm and more. English ("RESTRICTED PLACE" and "NO TRAIL ASSING") in two lower lines, the height of the letter is 6cm (sea sample "LOCATION FORBIDDEN").

The "LOCATION FORBIDDEN SITE" sample is used to prohibit at licensed sites identified as a prohibited site.

Chapter III

THE ORGANIZATION.

What? 17.

This announcement comes into effect from September 7, 2015 and replaces the Digital Digital. 12 /2002/TT-BCA September 13, 2002 of the Ministry of Public Security implementing the Digital Protocol. 33 /2002/NĐ-CP March 28, 2002 of the Government Regulation Law enforcement of the State Secret Protection Command.

What? 18.

1. The ministries, peer agencies, government bodies; the People's Committee of the Provinces, the Central City of Central; the Supreme People's Court; the Supreme People's Court; the political organization; the social organization; the social organization; the economic organization; The other organization is responsible for this practice.

2. In the course of execution if there is difficulty, the entanging is timely to reflect on the Ministry of Public Security to be guided ./.

Minister.

(signed)

General Chen Kuang