- Scope of Use：
The following privacy policies apply when you are browsing the National Science and Technology Museum Website (any page with the domain name nstm.gov.tw). These policies concern the collection, use, and protection of personal data. The said policies shall not apply to any activity you might initiate by virtue of passing to a different website as the result of a search on a NSTM web page or by other means, however. Protection of your personal data while browsing other web pages depends on the individual privacy policies of the websites involved.
- Scope of Use：
Depending on the service being provided, all or part of the following user data may be collected from visitors:
This website will not collect personal information about the identity of any person who is purely browsing or downloading files from it. When you participate in an online event, you may be asked to provide your name, ID number, address, telephone number, and e-mail address. Some events may be limited to registered members. While you are browsing the National Science and Technology Museum Website, the server will automatically produce a log file. This file includes your IP address, duration of visit, and record of your browsing behavior. Information about pages viewed and time spent on-site is used to improve the quality of the National Science and Technology Museum Website content and service.
- Information security and protection：
Any uploading to or alterations to the services and related information without authorization is strictly forbidden and may be a violation of the law. For the security of the network and its continuous service for all users, it offers the following safeguards: 1. A firewall is installed to avoid illegal intrusion, destruction or theft of information to avoid the website being illegally used and to guarantee the rights and interests of users. 2. Virus scanning software is installed and scans regularly so as to provide a safer environment for users to browse web pages. 3. Randomly simulated Hacker attacks, to prepare the system for recovery when a security event occurs, and to provide the appropriate level of security protection. 4. Automatic receipt of all security maintenance email notices from the operating system and application program suppliers. Appropriate patches will be installed according to the advice in the emails