Skip to main content
:::

全字庫 CNS111643

Home   \   Privacy and Website Security Policy

:::

Privacy and Website Security Policy

Welcome to the “Master Ideographs Seeker for CNS 11643 Chinese Standard Interchange Code” (abbreviated as Master Ideographs Seeker) website. To help you understand how you are protected while using the website and how your personal information is collected, used, and secured, please read the following information:

  1. Scope

This privacy policy covers the collection, use, and security of information associated with visitor activity on this website.

  1. Collection and use of personal information

(1)This website does not collect personally identifying information during simple browsing or downloading.

(2)Visitors who use any of this website's mailbox or online application services will be asked to provide personal information necessary to process requests, which may include the visitor's name and email address.

(3)This website records visit-specific information such as visitor’s IP address, duration of visit, and pages viewed. This data is collected for internal use by website management to analyze site traffic and browsing behavior in order to improve this website's quality of service. Such analysis is performed in aggregate only and never applied to individual visitors.

  1. Use of cookies

This website uses the Google Analytics service provided by Google Inc. Google writes and reads cookies in visitors’ browsers and uses the information for web analytics. Visitors may opt to refuse cookies by adjusting browser settings to a high level of privacy.

For more information about Google Analytics’ use of cookies, please read the Google Privacy Policy.

  1. Data security

For the safety of the website and to ensure stable operations, the website has adopted the following safety measures:

(1)Installing a firewall and limiting connections from specific ports to prevent illegal invasion and use to guarantee users' rights.

(2)Using a detecting system for any network invasion, monitoring and controlling the flow so as to block the malicious behaviors of unauthorized uploads, alteration, or hackers.

(3)Using weakness detection software to a periodical scan for, reinforce, and correct network system weaknesses.

(4)Regularly making back-up files.

(5)Following security maintenance notifications from relevant operating system suppliers or application suppliers and installing proper PATCH.


Please contact us at any time for any suggestions for the website’s privacy and security policy.

The website’s privacy and security policy are subject to adjustment as needed at any time. Adjusted terms will be published on the website.