Previous 宿 食 宴 Next
現地天気
現地時間: 11:18
現地気温: 15°C *
お役たち情報
このウェブを共有する
ホーム > 交通情報 > 旅ガイド
"台北忠烈祠"

中華民国成立前の革命烈士および中日戦争、国共内戦などで犠牲になった39万人の兵士、志士を祀っています。ここでは後世の我々は彼らの愛国精神に思いを馳せることができます。 忠烈祠の大門前に立つ衛兵は一人一人厳しく訓練されており、雄壮な雰囲気を漂わせながら直立しています。一時間ごとに衛兵交代の儀式が行なわれますが、これは観光客にとても人気があります。整然と画一された動作を迅速かつ確実に行ない、頭と胸を上げて歩を進めます。その厳粛な姿を記念撮影する行楽客が後を絶ちません。位置:台北市中山区北安路139号

フォト:交通部観光局 拍攝:銳志傳播 記事:台北観光サイト

 
"国立故宮博物院"

台北にある「国立故宮博物院」は、世界屈指の大型博物館です。数十万件を誇り、歴史ある所蔵品の数々は、中国古代芸術の最高傑作といって も良いぐらい、芸術的且つ文化的価値を備え、中華文化5000年の歴史を物語っています。位置: 士林区至善路二段221号

フォト:交通部観光局 拍攝:蕭惠玉 記事:台北観光サイト

 
"陽明山国家公園"

台北市街に隣接し、古くは「草山」と呼ばれていた。火山活動によってできた円錐状と吊り鐘状の火山体、火口湖、イオウガス噴出口、地熱、温泉など、陽明山公園はいろいろな表情を持ち、研究活動やレジャーに最適である。陽明山公園は台北の夜景スポットとしても有名で、ここから眺める台北の街はネオンがきらきらと輝き、まるで美しい絵巻物を見ているようである。

フォト:交通部観光局 拍攝:許旭同 記事:台北観光サイト

 
"士林官邸"

今日の総統官邸は、春を想わせる優美な庭園と憩いの場所となっています。風景は佳麗でそして何よりとても静かです。園内には蒋総統夫妻が好きだったとされる梅、菊、バラなどの花が一面に植樹されていて、それぞれの季節に満開に咲き誇。位置: 台北市福林路60号

フォト:交通部観光局 拍攝:徐世榮 記事:台北観光サイト

 
"士林観光夜市"

士林夜市は台北市最大の夜市であり、主に二つのエリアに分けられます。一つは、傳統陽明戲院の周辺から、大南路沿いの慈誠宮一帯までの区域です。もう一つは、士林市場に位置し、集中管理されている美食街です。MRT「劍潭」駅の出口に面しているこの美食街の屋台は、ずらりと並び、見尽くせないほど膨大なスケールに達しました。
 

フォト:交通部観光局 拍攝:吳志學 記事:台北観光サイト

 
"国立台湾科学教育館"

台湾科学教育館は科学教育のために建てられたもので、大人も子供も楽しめるスポットです。地下のコンピュータ教室では、マルチメディア教室とロボット教育センターがあります。ここでは機械の模型を自分で動かすことができます。

フォト:交通部観光局 提供 拍攝:徐世榮 記事:台北観光サイト

 
"台北市立美術館"

1983 年に正式に開館した台北市立美術館は台湾を代表する現代美術館としてその構想段階から高い理想と目標を掲げ、現代美術の展覧会の企画、台湾地区の代表的美術作品の収集と収蔵を行い、学術的な美術研究に従事するほか、美術教育や国際交流を積極的に推進、現代美術の人材を育ててきました。 位置: 台北市中山区中山北路三段

フォト:交通部観光局 拍攝:蕭綱侯 記事:台北観光サイト

 
"大龍峒保安宮"

保生大帝を祭る台湾道教のお寺で、福建省同安出身の創立者によって、「保佑同安」という意味から「保安」と名づけられました。何度もの改築を経て、三殿三進式の立派なお寺になり、国の二級古跡に指定されています。 位置: 台北市哈密街61号

フォト:交通部観光局 拍攝:上允傳播 記事:台北観光サイト

 
交通部観光局http://www.taiwan.net.tw/台北観光サイトhttp://www.taipeitravel.net/

Privacy policy

Dear friends, welcome to the website of the Grand Hotel. To ensure your Internet safety and privacy when using our e-services, we have made a number of related policies as written in the following notice. Please read it carefully, as you will also get to know how the Grand Hotel collects, references and protects your personal information.

  • Applicability

    When a user uses the Grand Hotel’s e-services, the policies on the collection, referencing and protection of individual client information are applicable.

  • The collection and use of client information

    This website will not collect any of your personal information if you only browse the site or download files.

    When you use the hotel’s e-services, such as writing an email to the hotel team or making reservations online, you will be required to give some of your personal information, such as your name and email address.

    The website will then record the time when you use the services, as well as the pages your visit. Such information will only be used to conduct surveys on the website’s traffic and customer behavior within the company. This is done to improve our service quality only. We do not go into details of your other personal information.

  • Internet safety policies

    We use an intrusion detection system to monitor Internet traffic, make sure no uploads or change of information are made without authorization, and stop hackers from wrecking havoc on the hotel website.

    A fire wall system is also set up to avoid malicious intrusions or information thefts. We make sure the website is not destroyed by hackers and the rights of users are protected.

    We use anti-virus software to kills bugs on a regular basis. We do our best to provide a safe, clean e-network for our guests.

    We also patch computer programs regularly, as advised by our operating system providers.

  • E-mailing policies

    We will only email you hotel-related materials or send a reply to your account when you allow us to do so, such as when you register at our website, or when you undertake online application procedures. We always clearly state the hotel name in the emails, and we also offer a quick link to terminate subscriptions or access related information in the letters.

  • Information sharing

    The Grand Hotel will never sell, exchange or lease any of your personal information to other individuals, groups or private enterprises.

  • Privacy protection

    If you have any questions about our privacy protection policies, please email us to let us know.

Internet safety policies

All of the hotel staff is obliged to promote the following policies, so as to ensure the safety of the Grand Hotel’s information system, Internet network and related facilities.

  • Management goals
    •  Make sure the information system is in steady operations.
    •  Keep hackers and viruses from intruding or destroying the network.
    •  Prevent bad intent on and illegal use of the information system from happening.
    •  Avoid human error or accidents.
    •  Make sure the hotel’s physical surroundings are safe.
  • Information and software exchange management

    Such management includes receiving and delivering of information and software, setting up technical standards and operation process, establishing rules for identifying senders and recepients, settling on the responsibilities to take when information is lost, ensuring the ownership of such information and the intellectual property right of the software, making sure the information is kept safe, as well as taking measures to protect confidential or sensitive materials.

  • The planning and management of Internet safety
    •  A network operation and monitoring standard is established to ensure safe data transmission and Internet connections. This can also prevent unauthorized access from taking place.
    •  Examinations on Internet safety are conducted on a regular basis.
    •  A fire wall system is introduced to monitor the transmission of and access to data among nodes within and outside the hotel’s network.
    •  Experts on Internet safety are invited to detect network loopholes for the hotel.
    •  New safety measures will always be announced upon implementation.
    •  Sensitive information should be encrypted when transmitted via public Internet as such, or use VPN connections with the corresponding institutions.
  • Firewall management
    •  A firewall system is installed to ensure safe data transmission and data access among nodes within and outside of the hotel’s network.
    •  A military zone and de-military zone are established in the hotel’s fire wall system, so as to protect users according to the services they use. E-services based within the hotel’s network are located in the military zone, while ultra-network services like the World Wide Web and eBAS are set in the de-military zone.
    •  Users from outside the network have to apply in advance to use services provided in the military zone.
    •  The fire wall is installed according to the Internet safety regulations of the Grand Hotel.
    •  The firewall should be monitored by an expert team, and records should be examined at any time if needed.
    •  The administrator should use a terminal to access the system as the firewall host. Remote log-ins are strictly forbidden.
    •  Once the firewall is fully established, the system administrator should conduct all necessary tests to make sure the wall lives up to the required safety standards.
    •  When changes are made to the hotel’s Internet safety policies and regulations, the system administrator should review and adjust the setting and access of the firewall system, so as to keep the hotel network safe at all time.
    •  The system administrator is responsible for all issues related to Internet safety. S/he should also keep the system updated to refrain from various cyber attacks.
    •  If necessary, VPNs (virtual private networks) based of various safety levels should be established between the hotel and its corresponding institutions, so as to ensure safe data transmission.
  • Email system management
    •  Personal emails should be kept in the recipient’s own private account. They should be promptly deleted delivered to the hotel’s public email system.
    •  Confidential official documents should never be delivered via email. Sensitive information may be delivered online when necessary, but the letter(s) must be encrypted in advance.
    •  To avoid impostors from sending emails in the name of the hotel staff, an e-signature may be attached in the emails. This will also help identify the recipient/sender and ensure the authenticity of the documents.
    •  To avoid malicious file execution, suspicious emails should never be read. If the system is attacked in a case like this, please contact the system administrator.
    •  It is forbidden to send letters that make recipients feel uneasy or upset.
    •  Anonymous letters and forgery are also prohibited.
〒10461台北市中山区中山北路四段一号 電話:+886-2-2886-8888 ファクス:+886-2-2885-2885
The Grand Hotel Copyright (C) 2011 All Rights Reserved.
loading
loading
loading...