:::
tiaat logo
關於展覽顯示圖
:::

Government Website Data Open Declaration

Dear website visitors, the Council of Indigenous Peoples, Indigenous Cultural Development Center (hereinafter referred to as “the Center”), places great importance on and respects copyright laws. Please carefully read the following copyright statement on this website, as it will help you understand the policies and principles regarding copyright law when using the services provided on this website and its related service websites.

Copyright Statement of the Government Website Data Open Declaration

(1) All content posted on the online exhibition website of the Council of Indigenous Peoples, Indigenous Cultural Development Center (hereinafter referred to as “the Center’s website”) is protected by copyright law, except for subjects not covered by copyright law as defined in Article 9 of the Copyright Act (such as the Constitution, laws, orders, speeches prepared by public officials in the course of their duties, and press releases).

(2) Any materials not subject to copyright as mentioned above can be freely used by anyone, and we welcome its wide usage.

(3) For information content on the Center’s website protected by copyright law, except in cases of reasonable use, permission or authorization from the Center should be obtained before use. If it involves content by other copyright holders, their permission or authorization should also be obtained.

(4) The term “reasonable use” is explained as follows:

  1. Works published under the name of the Center on the Center’s website, where the author is the Center, may be reproduced, publicly broadcast, or publicly transmitted within reasonable limits. When used, please cite the source.

  2. Information on the Center’s website may be reproduced for personal or non-profit family purposes.

  3. For reporting, commentary, teaching, research, or other legitimate purposes, information on the Center’s website may be quoted within reasonable limits. When quoting, please cite the source.

  4. For other reasonable use situations, please refer to the provisions of Articles 44 to 65 of the Copyright Act.

(5) Except for cases specified in Article 80-1, Paragraph 1 of the Copyright Act, and cases where, due to technical limitations, removal or alteration cannot be legally carried out without recording or transmitting system conversion, the electronic rights management information marked on the Center’s website should not be removed or altered without permission.

  1. Links to the Center’s Website

Any website can link to the Center’s website without the need for the Center’s permission, but the link must clearly indicate the Center’s name. If the link could mislead users, the Center will not permit such linking.

  1. Related Links on the Center’s Website

For the convenience of internet users, the Center’s website only provides links to related websites. The Center is not responsible for the actions of users related to the content on those websites.

  1. Disclaimer

The web pages or data provided by the Center’s website for related linked websites are provided by the linked websites, and the relevant rights belong to those websites or legitimate right holders. The Center does not guarantee their accuracy, timeliness, or completeness.

Information Security Policy

  1. Information Security Policy (CIA)

To ensure the smooth operation of the Center and to prevent unauthorized access, use, control, disclosure, alteration, destruction, tampering, or other violations of information or information and communication systems and to ensure their confidentiality (Confidentiality), integrity (Integrity), and availability (Availability), the following policy is established for all employees to follow:

  1. A mechanism for managing information security risks should be established to review the effectiveness of information security risk management.

  2. The confidentiality and integrity of sensitive information and information and communication systems should be protected to prevent unauthorized access and tampering.

  3. The resilience of core information and communication systems should be strengthened to ensure the continuous operation of the Center’s business.

  4. Information security education and training should be conducted to increase the awareness of information security among Center employees.

  5. Rewards should be given to personnel who have performed well in carrying out information security tasks.

  6. Do not open emails from unknown sources or those where the sender cannot be clearly identified, or click on links or download images.

  7. It is prohibited to share a single information and communication system account among multiple users.

  8. Unauthorized software installations are prohibited.

  9. Information Security Objectives

(1) Quantitative Objectives:

  1. LAN availability exceeds 98% (Downtime/Total Operation Time ≤ 2%).

  2. Awareness of information security incidents, and the ability to complete notification, response, and recovery within the specified time.

  3. The email open rate and attachment viewing rate for email social engineering drills are less than 10% and 6%, respectively.

(2) Qualitative Objectives:

  1. Achieve the requirements of information security responsibility level classification and reduce the threats of information security risks.

  2. Increase employee awareness of information security protection, enhance vigilance, and promote a culture of shared responsibility among all employees.

SHARE +
facebook 分享連結 email 分享連結 pinterest 分享連結