Information Security Policy Development and Purpose
Based on the consideration of the operation of information system and the extension of the management mechanism, the University has introduced the Information Security Management System (ISMS) since 1983, in order to establish a highly secure and reliable information operating environment, and to strengthen the information security management for the whole process of teaching and learning.
Scope of application
Internal parties include officers, students, and hired staff, while external parties such as friendly units, CAS, suppliers, contractors, and family members of officers, students, and family members have the responsibility to follow the university's regulations.
Points to note
All internal and external personnel are required to comply with national laws and regulations such as the “National Confidentiality Protection Law,” “Personal Information Protection Law,” “Criminal Law,” “Information Security Management Law,” and other related requirements of the Ministry of Defense. If a breach of these regulations results in a breach of confidentiality or a violation of the law, they will be held accountable in accordance with the law.