Privacy Policy
1. Collecting and Storing Information Automatically: Federal Customs Authority (FCA) collects and stores information related to visiting its website. The Authority does not define any user. It collects and store the following information automatically:
1.Surfing field
2.Kind of the surfer and the operating system used to enter the website
3.Time and date of entering the website
4.Pages visited
2. (FCA) website contains many external links to other networks and websites. The Authority does not assume any responsibility for these links because they are considered as information service only. The user is responsible for assessing the content and usefulness of information obtained. Once a user visits FCA website, he will be subject to the website’s Information Security and Privacy Policy.
3. Changes in Privacy Statement: FCA has the right to modify privacy statement at any time. In case of applying such changes, the FCA will inform stakeholders and their clients about them.
4. Cookies:
1. Cookies Definition: A text file (not a programme or encrypted software) that does not need a password. The website will find it through cookies put in the hard disk on the first visit.
2. How to Prevent Receiving Cookies:User should prepare the browser before saving any cookies on the hard disk. To do so, you should follow certain technical and technological steps. It is allowed to refuse receiving cookies file (the text file) or remove it from browser by using its browser.
5. Information Security:
1.FCA applies various regulative and security precautions to protect its website data from manipulation or destruction. These precautions also prevent any unauthorized person to access to these data. FCA encrypts data to protect them from exploitation by any other party. It constantly reviews data in line with modern technological developments.
2.Use Purposes:Data are used to provide the user and the visitor with services requested, in addition to giving approvals if it is laid down in laws or legislations.
3.Security Definitions: We see it is important to add the following security definitions:
1.Availability of Information: Ensuring access to information and using it in a reliable and timely manner.
2.Adequate protection: It is necessary to provide protection commensurate with the risks and extent of damage caused by information loss, misuse, modification, or accessing illegally to them.
3.Ratification: is a comprehensive assessment of administrative and functional security controls in governmental services. This helps to adopt information security determining the accuracy level of implementing controls and operating according to plan. This also secures getting out with the result required in respect of meeting the requirements needed to face risks seen by government services.
4.Confidentiality: is important to maintain the licensing restrictions on access to information and disclosure. It includes means of protecting personal privacy and information privacy.
5.Information security:protects information systems and information from illegal misuse, hacking, disclosure, destruction and modification. It aims at providing confidentiality and accuracy and availability of information.
6.Malicious Code: it is a programme meant to do undesirable act. This will negatively affect the confidentiality, accuracy and availability of information in systems.
7.Privacy: it is information related to a particular person or group. They monitor and manage information even after exchanging them voluntarily with a third party to avoid its disclosure. Disclosure can lead to devastating consequences. Information security must include the implementation of controls of private information. It includes best practices that can provide a justification for the need to use information, instead of using an alternative plan of identification.
8.Risks: It is important to know the effect of threats and possibility of their occurrence on governmental services, properties or persons.
9.Risks Treatment: It includes choosing a series of procedures meant to decrease risks, in addition to implementing these procedures.