National Chiang Kai-shek Memorial Hall
Sitemap Home FAQ RSS Traditional Chinese version(Open a new window)
About Us Hot News Indoor Instruction Introduction to The Halls Exterior Visitors Information Annual Report Exhibition Yearbook
Concept of Design
Administrative Directions
Hot News
>>Home / Privacy Policy & Security Policy BACK
Welcome to the official website of the Environmental Protection Bureau, National Chiang Kai-shek Memorial Hall (hereafter referred to as “this site”). This section is devoted to outlining this site’s privacy protection policy in order for you to feel peace of mind in using all services and information available at this site, and to protect your rights. Please take the time to read the following content:
The scope of application of privacy protection policy and the content thereof, including how this site handles your personal identity information that is collected when you use the services provided by this site.
The privacy protection policy does not apply to related links or websites outside this site, nor does it apply to personnel who are not entrusted by the website or anyone who is not involved in the management of this site.
◎Methods to Collect and Use Information
To provide the best possible interactive service at this site, you may be asked to provide personal information under the following circumstances:
1. When you use an interactive function, such as the service mailbox or questionnaire, your name, e-mail address, contact number(s), and time of use will be retained at this website.
2. The server automatically records the paths you use to browse this website, including the your IP address, time of use, your browser, browsing record, and the data that has been clicked on, etc. as reference for improving our website service. The records are for internal use only and will not be publicly announced.
3. To provide more precise service, we conduct statistical analysis on the questionnaires we collect, and the results are shown in the forms of statistically processed data and verbal texts with explanatory purposes. In addition to internal use, we may also make the data and verbal text public without revealing any specific individual information.
4. Unless with your consent or otherwise stipulated by other laws and regulations, this site will not reveal your personal information to a third party or use it for any purpose other than collection.
◎Data Protection
Various information security equipment and necessary security protection measures, such as firewalls and anti-virus systems, are established for this site’s servers to protect the website and your personal information.
Strict protection measures are adopted to ensure that only authorized personnel have the access to your personal information. All personnel who are to be involved in handling your personal information have signed a confidential contract stating that any action that violates the confidentiality obligation will be punished according to law.
Should it be required that related organizations are to be entrusted by this bureau for the provision of service, this site will also demand that the entrusted party strictly observe confidentiality obligations and take necessary procedures to ensure the most stringent observation.
◎External Linking of the Site
Webpages of this site provide links to other websites, which enable you to click and access other websites via this site. Please note that this site’s privacy protection policy does not apply to the links it provides. You must refer to the privacy protection policy of each of the linked websites.
◎The Use of Cookies
To provide optimal service for you, this website will place a cookie in your computer. If you do not wish to accept the cookie, set a high privacy level for your computer from the browser’s function menu to refuse acceptance of the cookie. Note, however, that doing so may also keep certain website functions from operating normally.
◎Revision of Privacy Protection Policy
This site’s privacy protection policy is subject to revision at any time as necessary. The revised terms and articles will be posted on the site.

◎Collection and Application of Personal Information
1. In accordance with the “Electronic Personal Information Protection Law” and associated laws and regulations, the information collected will only be used for the provision of service for the purposes specified and will not be arbitrarily revealed to any third party
2. When you use this website, it automatically collects the following information: date and time, the webpages you access, the website you access information from, your browser type, the actions you have taken on the website’s pages (e.g. download, etc.)
3. Supervision will be conducted on websites and IP addresses where behavior that causes a heavy burden upon this site come from.
◎Authorization and Duties concerning Information Security and Education Training
1. For personnel who handle sensitive and confidential information and personnel whose work requires system management authorization, appropriate division of labor as well as distribution of authorization and duties should be carried out, assessment and evaluation systems should be established, and a personnel mutual-support system should be created if needed.
2. For personnel whose employment has been terminated, who are suspended from duties, and who leave their posts temporarily, authorization to using all system resources should be immediately cancelled in accordance with management procedures that govern the termination of employment, duty suspension, and leaving a post temporarily.
3. Education training and orientation should be given to personnel of all levels based on their roles and competence to promote employees’ understanding of the importance of information security and various security risks in an effort to improve their security awareness and to encourage their observation of information security regulations.
◎Information Security Operation and Protection
1. Operational procedures for handling information security incidents should be established with necessary responsibilities assigned to associated personnel so as to handle information security incidents efficiently and effectively.
2. An alteration management reporting system should be established for information facilities and systems to prevent any loopholes in the system security.
3. Personal information is handled and protected carefully in accordance with the “Electronic Personal Information Protection Law” and associated regulations.
4. System backup equipment is established for regular data, software backup, and relocation operations so that operations can return to normal in the shortest time possible should any disaster occur or storage media break down.
◎Network Security Management
1. Firewalls are established for intra-sites that link to the extranet to control and manage data transmission and resource access and to conduct careful identity management.
2. Confidential and sensitive data or documents will not be stored in information systems that are open to the outside world and will not be transmitted via e-mails.
3. Regular checks are conducted on the network information security facilities and anti-virus functions. Virus patterns in the anti-virus system will be updated while various security measures will be taken on a regular basis.
◎System Access Control Management
1. Access codes will be issued and alteration procedures be established and recorded in accordance with the operation system and security management requirements.
2. IDs and passwords for logging on each operation system that are set up, authorized, and regularly updated by the information system administrators will be granted to personnel of all levels as required by their tasks.
Send Send
Print Print
Back Back
You are the 3220921 visitor Update:2017-11-01
Flash download(Open a new window) Privacy Policy & Security Policy RSS Direction
A+ ccessibility(Open a new window) ADDRESS:No.21, Zhongshan S.Rd., Zhongzheng Dist.,Taipei City 10048, Taiwan (R.O.C)  TEL:886-2-2343-1100
Used Microsoft Internet Explorer 5.0 1024*768  Copyright © National Chiang Kai-shek Memorial Hall. All Rights Reserved.
Republic of China (Taiwan) Government Entry Point(Open a new window)