Link to Content Area
:::

Institute of Transportation, MOTC

:::
  • small size
  • medium size
  • large size
  • print
  • facebook
  • plurk
  • twitter

Web Security

Personal Information Collection and Use
  • Personal information will be used only for specific purpose related to the service we provide and will not be disclosed to any third party in accordance with the Computer-Processed Personal Information Law and other related regulations.
  • When you use our website, we automatically collect the following information: date and time, the webpage you request, URL you are on, browser type, and any action (such as downloads, etc), whether the action was successful or not. The information may help improve the efficiency of our website.
  • We monitor any action which may cause a heavy load on our website.
Information Security Procedure and Protection
  • We have operating procedures for information security issues, and impose necessary responsibility on employees concerned in order to tackle these matters rapidly and efficiently.
  • We have an informing system for changing the management of information facilities and systems to avoid loopholes in security.
  • We process and protect personal information cautiously in accordance with related provisions of Computer-Process Personal Information Law.
  • We carry system backup facilities, and update/backup necessary data and software periodically in order to be able to restore all data swiftly in case of damage or failure of saving media.
Management of Internet Security
  • We establish firewalls to monitor data transmission and resource access between the external and the internal network at our link, and strictly conduct identity recognition operations.
  • Any confidential and sensitive information or document is neither stored in an open system nor delivered by e-mail.
  • We periodically examine and inspect internal networks for information security, latest virus codes and other security measures.
System Access Control Management
  • We set up password issuance and change procedures depending on operation system and security management requirements, and keep records.
  • The information center management staff should assign authorization accounts and passwords for employees to log into each system according to the necessary authorization of each staff level, and update them regularly.
Top