Share on facebook
Share on linkedin
Share on email

Privacy and security policies

I. What this privacy policy covers

This policy covers how we treat personal information that we collect and receive, including information related to your past use of our service. 
This policy does not apply to external websites, and people who we do not employ or authorize.

II. Information Collection and Use

For the better of interactive service, we may ask for your personal information, such as:

  When you access our interactive functions such as writing e-mail to our service or filling in questionnaire, we will record your name, e-mail address, and the way of contact or time of use etc.
  When you browse our site, our server will automatically record the related path, including IP address, time, browser type, and the page you request as reference for our website service. They are internal use only, and not open to the public.
  To provide precise service, we will analyze the content and statistics of questionnaires. The result of analysis will translate the data into description. Other than internal study, we may publish the data and description if necessary, but any specific personal information is not included.
  We will not disclose your personal information to any third party or for other purposes beyond the original intent except for your permission or special provision of other regulations.
III. Information Protection

Our website is equipped with firewalls and anti-virus related information security facilities, and we take the necessary precautionary measures against any leak of your personal information. 
With strict protection measures, only the authorized staffs are allowed to access your personal information. All related staffs are required to conclude a confidentiality agreement. If there is a violation of such agreement, the person will be punished according to relevant laws.

Where service is indeed required from any of our units to carry out business, we will strictly require employees to conform their confidentiality duty, and adopt necessary inspection procedures to ensure they fully comply with duty.

IV. Link to external websites

We provide hyperlinks from our website to other external websites. However, our privacy policy does not apply to other external websites. You have to refer to privacy policy of the linked sites.

V. Use of Cookies
  To provide better service, our website will set and access cookies in your computer. If you are unwilling to accept the cookies, you may set the privacy protection level to “high” in your browser and refuse acceptance of cookies. But it may cause some functions of the website unable to be executed normally.
VI. Changes to this Privacy Policy
  We may update the privacy policy to meet the requirement at any time, and the revised version will be published on our site.


Personal Information Collection and Use
  Personal information will be used only for specific purpose related to the service we provide and will not be disclosed to any third party in accordance with the Computer-Processed Personal Information Law and other related regulations.
  When you use our website, we automatically collect the following information: date and time, the webpage you request, URL you are on, browser type, any action (such as downloads, etc.) whether that action was successful or not. The information may help improve the efficiency of our website.
  We monitor any action which may cause a heavy load to our website.
Confidentiality Security and Training
  For employees who deal with sensitive and confidential information, and those who are entitled to manage systems because of job requirement, clear division of job in order to disperse rights and duties should be arranged; and evaluation and examination systems should be established; as well as mutual support systems.
  For employees who resign (ask for leave, suspended from duties), all related matters must follow concerned procedures and the authorization for all systems must be cancelled immediately.
  Based on the position and occupational ability of different levels of employees, education and training for information security should be conducted depending on the actual situation in order to make employees understand the importance and all possible risks, and enhance awareness to conform to the relative regulations accordingly.
Information Security Procedure and Protection
  We have operating procedures for information security issues, and impose necessary responsibility to employees concerned in order to tackle with these matters rapidly and efficiently.
  We have informing system for change management of information facilities and systems to avoid loophole in security.
  We process and protect personal information cautiously in accordance with related provisions of Computer-Process Personal Information Law.
  We carry system backup facilities, and update/backup necessary data and software periodically in order to be able to restore all data swiftly in case of damage or failure of saving media.
Management of Internet Security
  We establish firewalls to monitor data transmission and resource access between the external and the internal network at our link, and strictly conduct identity recognition operation.
  Any confidential and sensitive information or document is neither stored in open system nor delivered by e-mail.
  We periodically examine and inspect internal network for information security, latest virus code and other security measures.
System Access Control Management
  We set up password issuance and change procedures depending on operation system and security management requirement, and record it.
  The information center management staff should assign authorization account and password for employees to log in each system according to necessary authorization of each staff level, and update them regularly.
Close Menu