---
title: 隱私保護及資訊安全政策 | en
tags: Terms, EN
GA: UA-155999456-1
---
{%hackmd @docsharedstyle/default %}
# TWCC Privacy Protection and Information Security Policy
##### Version 2025/06/05 V5.0 | [<ins>Prior version(s)</ins>](https://man.twcc.ai/@preview-twccdocs/SJCkbCro_)
To protect your privacy and information security, National Center for High-performance Computing, National Applied Research Laboratories (hereinafter as “NCHC”), the provider of this website, implements internationally recognized standard such as ISO 27001, ISO 27017, ISO 27018, BS 10012 into our managing systems, and regularly has the systems verified by independent third parties. The Privacy and Information Security Policy is created to explain how we collect, use and protect your personal information.
### I. Policy Applicability
This Policy applies to the collection, use and protection of your personal information regarding your activities in this website. However, it does not apply to any non-NCHC website that you may access via this Website. The privacy protection and security policy of non-NCHC websites are governed by the privacy statements of such other websites.
### II. Collection, Process, and Use of Data
1. This Website will not collect any personal information when you simply browse, search for information and/or download files from this Website.
2. When you sign up for membership from this Website, this Website will provide you with a “Personal Information Consent Form”. Please direct link to the registration page to browse and sign up for the form.
3. This Website will record the following data of users: source IP, session time, and browsing activities. Such data is collected for the aggregate analysis of site traffic and user network behavior. No analysis on specific users will be conducted.
### III. The Use of Cookies
Cookies is a mechanism used by web server to communicate with the users. It may then be stored on your computer's hard drive for identification. This helps us to develop and improve this Website to offer more personalized service. You can choose to block cookies at any time by activating the setting on your browser or change what types of cookies you accept. However, if you use your browser settings to block all cookies, you may not be able to use some of the personalized services or access parts of this Website.
### IV. Links to Other Websites
This Policy applies to this Websites only. You may access via the hyper link of this Website to other non-NCHC websites. The privacy policy of NCHC does not apply to other websites, regardless of whether such other websites have privacy policy or the contents of such policies.
### V. Emails
With your consent, this Website will distribute membership messages to your email accounts, including business campaigns. These emails will state they were sent by this Website, and provide you with instructions on how to opt out of receiving these emails.
### VI. Website Security Measures and Protocols
1. Any unauthorized attempt to access or alter the services or information provided by NCHC is strictly prohibited and may be in violation of the law. To protect the security of this Website and to assure that all services can be provided to the web users, the following security measures are adopted by this Website:
(1) Utilize intrusion detection system to monitor network traffic and identify unauthorized attempt to upload, modify, or damage data.
(2) Install firewall to prevent illegal invasion, information stealing or damaging and other improper usage of this Website and to protect the rights and interests of users.
(3) Install anti-virus system to provide users with a more secure online environment.
(4) Conduct regular scans to identify system vulnerabilities.
(5) Website data is backed up daily and stored on a backup server.
(6) Security and update notices from operating systems and application providers are automatically received. Patches will also be installed appropriately in accordance to the recommendations of such notices.
2. Information Security Roles and Responsibilities
The NCHC is responsible for the information security of TWCC's infrastructure, including the maintenance and operation of virtual machines, virtual networks, containers, HPC high-speed computing, data storage and related infrastructure, applications and networks.
Users are responsible for the security configuration, system updates and vulnerability remediation of the containers, virtual hosts, virtual information security devices and other virtual network devices leased by TWCC.
3. The Internet is not an absolutely secure environment. NCHC endeavors to protect the security of your personal information. We will use Transport Layer Security (TLS) and encryption technologies to ensure data transmission security. However, the data transmission process is influenced by your own Internet surfing environment. As we cannot guarantee the security of the data transmission from this Website, you must pay attention to and assume the risks involved in Internet data transmission. Please understand that any consequence arising from this is beyond NCHC’s control.
### VII. Changes to Privacy and Information Security Policy
Due to rapid technological advancement, the unfinished implementation of relevant regulations, and other future unforeseeable environmental changes, this Policy is subject to be changed by NCHC as required to ensure proper Internet security protection. After NCHC has completed the amendments to the Policy, we will immediately publish the new policy on this Website, and make it clear on this Website for your reference.
### VIII. Information Security Incident Notification Response
In the event of abnormal behavior of the TWCC service rented by the user, please notify NCHC through the service channel. In compliance to the Cyber Security Management Act, NCHC may notify the user to cooperate on the security measures or suspend service provision as necessary, and the suspension period will be handled in accordance with the content of TWCC's computing facility service level agreement.
### IX. Rights and Interests of Personal Data Parties
You may request to exercise your personal rights under Article 3 of the Computer-Processed Personal Data Protection Law, including.
1. to make inquiries or requests for access
2. to request a copy.
3. to request a supplement or correction.
4. to stop the collection, processing or use of personal information
5. to request deletion.
In addition, the NCHC also provides services such as personal information dispute restriction, personal information portability, and the right to automated decision making and analysis. The request should be made in writing by the party concerned, specifying the type and content of the rights to be exercised and the contact information of the party concerned.
### X. If you encounter any problems that may damage our operation or information security, please contact our service personnel (phone number: 0809-091-365, email address:iservice@niar.org.tw)