- Home
- Information Security
Privacy and Security
1. Statement:
-
The Directorate General of Customs (hereafter referred to as the bureau) core operation is Cargo Clearance Automation System and its related operations. In order to protect the bureau core relevant information assets security (information assets include data, systems, equipments, and etc.), avoid external threat or inside personnel improper management and use, cause the risk of garbled, disclosed, destroyed or lost etc., we redact Information Security Policy (hereafter referred to as the policy).
2. Conformity:
-
The policy is defined according to including “Executive Yuan and its subordinates Information Security Management Point”, “Executive Yuan and its Subordinates Information Security Management Constraint”, “Ministry of Finance and its Subordinates Information Security Management Principle”, “Directorate General of Customs, Ministry of Finance and its Subordinate Offices Information Security Management Operation Regulation”, “Customs Law”, “Data Protection Law” relevant decrees and regulations ,etc. and considering customs clearance requirement.
3. Vision:
-
The bureau vision is: To provide convenient, efficient and safe customs clearance service.
4. Information security policy:
5. Scope of application:
-
This policy is suitable for all colleagues of the bureau (including skilled worker, employed-by-contract, work-study and alternative-military-service) in every tariff bureau, signing vender, the outsourcing vender and relevant information assets.
6. Responsibility:
7. Risk assessment and management:
-
The bureau accords with the quantitative and qualitative policy goal in order to reach the vision, Specially make risk assessing and procedure, in order to manage the information assets risk, reduce the risk to accept the range.
8. Compliance of the information security policy:
9. Revision of the information security policy:
-
This policy should be reappraised at least once a year to reflect up-to-date status of government regulation, technique and operation and to ensure effectiveness of information security practice.