We Are apologized that your browser does not support JavaScript. If some webpage functions are not working properly, please enable JavaScript in your browser.
Friendly Print :
Please Press Ctrl + P to switch on the print function
Font Setting :
If your brower is IE6, please press ALT + V → X → (G)Larger(L)Medium-Large(M)Medium(S)Medium-small(A)small to adjust the font size,
Firefox, IE7 or above, press Ctrl + (+)Zoom in (-)Zoom out to adjust the font size。
Go To Content


Information Security Management Directions for the Executive Yuan and its Subordinate Agencies


Promulgated  by  Executive  Yuan  on  
September  15,  1999.

I.  Purpose  
1.  The  Executive  Yuan  has  promulgated  these  Directions  to  enhance  agencies’  information  security  management;  establish  a  safe  and  reliable  electronic  government;  ensure  the  security  of  information,  systems,  equipment  and  the  Internet;  and  protect  public  rights.  

II.  General  Provisions  
2.  Agencies  mentioned  in  these  Directions  refer  to  subordinate  ministries,  commissions,  councils,  banks,  directorates-general,  offices,  administrations,  museums,  Taiwan  Provincial  Government,  and  Taiwan  Provincial  Consultative  Council  and  its  subordinate  agencies  (institutions).  
3.  Agencies  should  conduct  information  security  risk  assessments  to  establish  the  required  security  standards  for  various  information  operations,  in  accordance  with  relevant  laws  and  regulations  and  in  consideration  of  administration  goals.  Agencies  should  adopt  appropriate  and  sufficient  information  security  measures  to  ensure  the  security  of  agency  information  during  collection,  handling,  transmission,  storage  and  distribution.  
4.  The  appropriate  and  sufficient  information  security  measures  mentioned  in  these  Directions  should  take  into  consideration  the  overall  importance  and  value  of  various  information  assets;  inappropriate  utilization;  leakage,  alteration  and  damage  of  agency  information  assets  due  to  human  error,  deliberation,  natural  disasters  or  other  risks;  and  the  degree  of  impact  on  or  damage  to  agency  functions.  The  adopted  management,  operational  and  technical  security  measures  should  match  the  value  and  cost  efficiency  of  information  assets.  
5.  Agencies  should  promulgate  the  implementation  of  information  security  plans  in  accordance  with  the  following  matters,  and  evaluate  implementation  performance  regularly:  
(1)  Promulgation  of  information  security  policy.  
(2)  Management  framework  for  information  security.  
(3)  Personnel  management,  and  information  security  education  and  training.  
(4)  Computer  systems  security  management.  
(5)  Internet  security  management.  
(6)  System  access  control  management.  
(7)  System  development  and  maintenance  of  security  management.  
(8)  Security  management  of  information  assets.  
(9)  Physical  and  environmental  security  management.  
(10)  Management  of  sustainable  operation  plans  for  agency  functions.  
(11)  Other  information  security  management  matters.  
6.  The  information  security  policies  mentioned  in  these  Directions  should  refer  to  operational  directions,  measures,  standards,  and  codes  of  conduct  promulgated  for  achieving  information  security  management  goals.  

III.  Establishment  of  Information  Security  Policy  
7.  Agencies  should  promulgate  information  security  policies  in  accordance  with  actual  functions,  and  request  compliance  from  their  personnel,  public  or  private  institutions  connected  via  the  Internet,  and  information  service  providers  via  written  communications,  e-mail  or  other  methods.  
8.  Information  security  policies  promulgated  by  agencies  should  be  reassessed  at  least  once  a  year  in  consideration  of  the  latest  developments  in  government  regulations,  technologies  and  functions,  and  to  ensure  the  effectiveness  of  information  security  operations.  

IV.  Organization  and  Accountability  
9.  Agencies  should  allocate  roles  and  responsibilities  to  relevant  departments  and  personnel  in  accordance  with  the  following  directions  for  labor  division:  
(1)  The  discussion,  establishment  and  assessment  of  directions  for  information  security  policies,  plans  and  technologies  should  be  conducted  by  the  information  technology  department.  
(2)  The  department  in  charge  of  this  function  should  be  responsible  for  meeting  requirements  regarding  the  discussion,  usage  management  and  security  protection  for  information  and  information  systems.  
(3)  The  civil  service  ethics  department  and  related  departments  should  be  jointly  responsible  for  maintaining  information  confidentiality,  and  auditing  the  utilization  and  management  of  information.  
If  organization  has  no  delegated  information  department  or  civil  service  ethics  departments,  the  agency  head  should  appoint  the  appropriate  department  and  personnel  to  carry  out  the  above  duties  for  agencies  .  
An  agency  head  may  adjust  organization  division  directions  prescribed  in  Paragraph  1  due  to  special  nature  of  that  agency’s  functions.  
10.  Agencies  should  conduct  information  security  audits  on  the  information  operations  of  subordinate  agencies  (institutions)  on  a  regular  or  irregular  basis.  
Agencies’  information  department  should  conduct  external  audit  operations  on  subordinate  agencies  (institutions)  jointly  with  the  civil  service  ethics  department  or  auditing  department.  
11.  Agencies  should  appoint  a  deputy  head  or  senior  supervisors  to  be  responsible  for  the  coordination  and  promotion  of  information  security  management  matters.  
Agencies  may  establish  an  inter-ministerial  promotion  task  force  for  information  security  with  regard  to  the  need  to  coordinate  and  discuss  the  overall  planning  of  information  security  policies,  plans,  resource  allocation  and  other  matters.  
The  department  appointed  by  the  information  department  or  agency  head  should  be  responsible  for  support  operations  of  the  information  security  task  force  mentioned  in  the  preceding  paragraph.  
12.  Agencies  should  appoint  appropriate  personnel  to  be  responsible  for  matters  related  to  information  security  with  regard  to  information  security  management  needs.  

V.  Personnel  Management  and  Information  Security  Education  and  Training  
13.  Agencies  should  conduct  a  security  assessment  for  information  related  duties  and  tasks,  and  assess  the  suitability  of  personnel  during  the  employment  process  and  when  assigning  duties  and  tasks.  Evaluations  may  be  conducted  necessarily.  
14.  Agencies  should  conduct  regular  information  security  management  education,  training  and  promotion,  based  on  management  needs,  functions  and  information,  to  establish  the  information  security  awareness  of  personnel.  
15.  Agencies  should  enhance  training  for  information  security  management  personnel  in  order  to  improve  their  information  security  management  capabilities.  
Scholars,  experts  or  professional  agencies  (institutions)  may  be  invited  to  provide  consulting  services  to  agencies.  
16.  Agency  personnel  responsible  for  the  management,  maintenance,  design  and  operation  of  important  information  systems  should  organize  accountability,  and  establish  a  balance  mechanism,  implement  personnel  rotations,  and  develop  a  manpower  support  system  with  regard  to  agency  requirements.  
17.  Agency  heads  and  function  supervisors  at  all  levels  should  be  responsible  for  supervising  the  security  of  information  operations  conducted  by  agency  personnel  to  prevent  illegal  and  inappropriate  actions.  

VI.  Computer  Systems  Security  Management  
18.  Agencies  should  propose  information  security  needs  when  outsourcing  information  functions.  Information  security  responsibilities  and  confidentiality  directions  for  suppliers  should  be  listed  clearly  and  included  in  contracts  for  suppliers  to  comply  with.  Suppliers  should  be  evaluated  on  a  regular  basis  
19.  Agencies  should  establish  a  control  system  for  system  modification  operations,  and  keep  records  for  later  reference  and  evaluation.  
20.  Agencies  should  duplicate  and  utilize  software,  and  establish  software  utilization  management  systems  in  accordance  with  relevant  laws  and  regulations  or  contract  regulations.  
21.  Agencies  should  adopt  necessary  preventive  and  protective  measures  in  advance  to  detect  and  prevent  computer  viruses  and  other  malicious  software,  in  order  to  ensure  normal  operation  of  information  systems.  

VII.  Internet  Security  Management  
22.  Agencies  should  assess  possible  security  risks  when  transmitting  information  or  conducting  transactions  via  public  networks,  to  ensure  that  security  requirements,  including  the  completeness  of  data  transmitted,  confidentiality,  identity  authentication  and  non-repudiation,  are  met.  Agencies  should  also  draft  appropriate  security  control  measures  for  data  transmission,  dial-up  lines,  Internet  lines  and  equipment,  external  connection  interfaces,  and  routers.  
23.  Agencies  should  carefully  concern  while  open  information  systems  for  external  connection  operations  of  the  importance  and  value  of  data  and  systems,  and  adopt  data  encryption,  identity  authentication,  electronic  signatures,  firewalls,  security  vulnerability  detection,  and  other  technologies  or  measures  at  various  security  levels  to  prevent  hacking,  damage,  alteration,  deletion  and  unauthorized  access  to  data  and  systems.  
24.  Agency  websites  connected  to  an  external  network  should  be  equipped  with  a  firewall  and  other  necessary  security  equipment  to  control  data  transmission  and  resource  access  between  external  parties  and  the  agency  intranet.  
25.  When  opening  up  information  systems  to  external  connection  operations,  agencies  should  ask  external  parties  to  access  data  via  a  proxy  server  to  prevent  these  parties  from  entering  the  information  system  or  database  directly  when  accessing  data.  
26.  Agencies  should  implement  a  data  security  rating  assessment  system  when  using  the  Internet  and  global  information  networks  to  publish  and  distribute  information.  Confidential,  sensitive  and  private  information  and  documents  which  may  not  be  used  without  proper  consent  may  not  be  published  on  the  Internet.  
Security  protection  measures  should  be  enhanced  for  websites  with  personal  data  and  files,  to  prevent  private  information  from  being  stolen  and  used  inappropriately  or  illegally.  
27.  Agencies  should  promulgate  e-mail  usage  regulations.  Confidential  data  and  documents  may  not  be  transmitted  via  e-mail  or  other  electronic  methods.  
Agencies  should  use  encryption,  electronic  signatures  or  other  security  technologies  for  sensitive,  confidential  data  and  documents  that  need  to  be  transmitted  with  regard  to  agency  needs.  
An  agency  may  use  security  technologies,  such  as  encryption  or  electronic  signatures  approved  by  the  competent  agency,  for  confidential  data  and  documents  transmitted  via  e-mail  or  other  electronic  methods  due  to  special  nature  of  that  agency’s  functions.  
28.  Agencies  should  procure  information  software  and  hardware  in  accordance  with  national  standards  or  government  information  security  directions  promulgated  by  the  competent  agency,  and  propose  information  security  requirements  to  be  included  in  the  procurement  specifications.  
Agencies  should  utilize  encryption  applications  approved  by  the  competent  agency  when  developing  and  using  encryption  technologies.  
Agencies  should  request  manufacturers  to  produce  an  export  permit  or  relevant  authorization  documents  when  purchasing  encryption  applications  manufactured  overseas,  to  ensure  the  security  of  these  products  and  avoid  the  purchase  of  products  with  key  escrow  or  key  recovery  function.  

VIII.  System  Access  Control  Management  
29.  Agencies  should  promulgate  system  access  policies  and  authorization  directions,  and  inform  staff  and  users  about  the  relevant  authority  and  responsibilities  via  written  communication,  e-mail  or  other  methods.  
30.  Agencies  should  grant  necessary  system  access  authority  to  staff  at  different  levels  in  accordance  with  information  security  policies  with  this  access  authority  limited  to  those  necessary  for  performing  statutory  duties.  Staff  granted  with  the  highest  level  of  system  administration  authority,  and  designated  staff  responsible  for  important  technologies  and  operational  control  should  be  assessed  carefully.  
31.  Agencies  should  terminate  information  and  resource  access  authority  for  staff  members  who  have  resigned  or  are  on  leave,  and  include  this  as  a  mandatory  procedure  in  the  resignation  and  leave  application  process.  
The  access  authority  for  agency  personnel  whose  functions  have  been  revised  or  transferred  should  be  adjusted  before  the  stipulated  deadline  and  in  accordance  with  the  directions  for  system  access  authorization.  
32.  Agencies  should  establish  a  user  registration  administration  system  to  enhance  the  management  of  user  passwords  for  access,  and  request  users  to  update  passwords  regularly.  An  agency  should  determine  the  password  update  cycle,  which  should  not  exceed  a  six-month  period,  with  regard  to  the  operating  system  and  security  management  needs.  
Agencies  should  create  a  list  of  personnel  with  special  access  authority  in  order  to  enhance  security  control,  and  shorten  their  password  update  cycles.  
33.  When  opening  up  information  systems  for  external  connection  operations,  external  parties  should  sign  contracts  or  agreements  beforehand  that  prescribe  directions,  standards  and  procedures  for  information  security,  and  responsibilities  to  be  complied  with.  
34.  Agencies  should  enhance  security  control  and  create  a  list  of  system  service  provider  personnel  who  conduct  system  maintenance  by  remote  log-in,  in  order  to  monitor  them  with  relevant  security  and  confidentiality  responsibilities.  
35.  Appropriate  and  sufficient  security  control  measures  should  be  adopted  for  the  filing  of  important  agency  information,  inner  or  outer  of  the  agency,  to  prevent  such  information  from  being  stolen,  modified,  sold,  leaked  and  duplicated  improperly.  
36.  Agencies  should  establish  system  audit  plan  and  an  information  security  audit  system.  Information  security  audits  should  be  conducted  on  a  regular  or  irregular  basis;  deletion  and  alteration  of  audit  records  stored  in  systems  should  be  prohibited.
IX.  System  Development  and  Maintenance  of  Security  Management  
37.  Agencies  should  take  information  security  requirements  into  consideration  during  the  initial  phase  of  the  system’s  life  cycle  when  developing  systems  independently  or  outsourcing  system  development.  Security  control  should  be  established  for  the  maintenance,  update,  online  implementation,  and  version  control  to  prevent  improper  software,  trapdoors  and  computer  viruses  from  damaging  the  system’s  security.  
38.  Agencies  should  prescribe  standards  and  restrictions  on  the  scope  of  systems  and  data  that  suppliers’  software/hardware  system  development  and  maintenance  personnel  come  in  contact  with,  and  strictly  prohibit  the  issuance  of  long-term  system  identification  and  access  passwords.  
Agencies  may  issue  short-term  and  temporary  system  identification  and  access  passwords  for  suppliers,  based  on  actual  operational  needs.  However,  access  authority  should  be  terminated  immediately  upon  completion  of  duties.  
39.  Suppliers  should  only  begin  the  construction  and  maintenance  of  important  software  and  hardware  for  outsourced  projects  under  the  supervision  and  accompaniment  of  agency  personnel.  

X.  Planning  of  Sustainable  Function  Operations  
40.  Agencies  should  promulgate  a  sustainable  operation  plan  for  agency  functions,  assess  the  impact  of  man-made  and  natural  disasters  on  normal  agency  operations,  establish  emergency  response  and  recovery  procedures,  prescribe  the  responsibilities  of  relevant  personnel,  conduct  drills,  and  adjust  and  update  plans  regularly.  
41.  Agencies  should  establish  an  emergency  management  system  for  information  security  incidents.  Emergency  security  incidents  should  be  managed  in  accordance  with  the  prescribed  procedures  and  reported  to  the  competent  department  or  personnel  immediately.  Response  measures  should  be  adopted,  and  prosecution,  police  and  investigative  department  should  be  contacted  to  assist  investigations.  
42.  Agencies  should  establish  and  differentiate  data  security  ratings  in  accordance  with  relevant  laws  and  regulations,  and  adopt  appropriate  and  sufficient  information  security  measures.  

XI.  Others  
43.  Agencies  should  promulgate  proper  physical  and  environmental  security  management  measures  for  equipment  installation,  the  surrounding  environment,  and  personnel  access  control.  

XII.  Supplementary  Provisions  
44.  An  agency  may  prescribe  relevant  directions  separately  due  to  special  nature  of  that  agency’s  functions.  
45.  Municipal  city  or  county  (city)  governments  which  have  not  promulgated  directions  for  information  security  management  may  use  these  Directions.