Previous 宿 食 宴 Next
Local Time: 09:21
Local Temperature: 18°C *
Home > NEWS > News Content
Granddaughter of former U.S. President Eisenhower Visited Taiwan and Stayed in the Elk Suite at Grand Hotel. Mrs. Eisenhower said: Thanks for reminiscing the scene in the past

 The Granddaughter of former U.S. President Eisenhower Ms. Mary Jean Eisenhower was invited to attend the opening ceremony of “Hello Mr. President! A Panorama review of R.O.C.-U.S.A. summit diplomacy” special exhibition and the forum “A Retrospective on R.O.C-U.S.A. Friendship” as the Director of People to People International. Ministry of Foreign Affairs especially arranged Mrs. Eisenhower to stay in the “Eisenhower Presidential Suite” at Grand Hotel. Mrs. Eisenhower has expressed her gratitude for this arrangement for her to realize and reminisce the scene in the past time.

     Mrs. Eisenhower arrived at the Grand Hotel at 22:30 on September 14th. Accompanied by the receiving staff, Mrs. Eisenhower visited the cultural corridor with many old photographs, and also saw the room furnishings, including a photograph of President Eisenhower and Mme. Chiang, President Eisenhower’s itinerary during his stay in Taiwan, and the thank you card to Grand Hotel from President Eisenhower etc. After Mrs. Eisenhower finished listening to the introduction, she said “My visit to the Grand Hotel is one I will treasure forever.  It could not have been more perfect and it was so fun to be in the same suite as my grandfather, 53 years later! ” In addition, we especially compiled the press clippings of President Eisenhower’s visit in 1960 into a book and presented to Mrs. Eisenhower by Chairman Lee Chien-Jong as a gift in order to relive the scene.

President Eisenhower visited Taiwan on June 18th in 1960. Till present, he was the only one who visited Taiwan with the identity of incumbent U.S. President. People extended warm welcome to him. The unprecedented entourage and equipment has become a record and there is no any other president has broken this record until now. At that time, the Grand Hotel had 100 rooms in total. The delegation has occupied 90 rooms. By reviewing previous data, we learned that those colleagues who have served President Eisenhower said he was an easy-going person. His punctual style even made him more admirable. Even the waitress was very impressed about President Eisenhower’s not-niggling style. Although President Eisenhower only stayed one night in the Grand Hotel, he has left a deep and great impression to everyone. Even just a smile or nodding to people, everyone can feel his unique charisma. He liked the elegant room prepared for him very much and appreciated the Chinese painting in the room. He was fond of Chinese food very much and his first meal in Grand Hotel was Chinese cuisine. Although he didn’t use chopsticks very well, that didn’t affect his appetite at all.

     According to historical archives, the suite room that President Eisenhower stayed was laid with red carpet. The room was gracefully decorated with roses and red gladiola. There were chrysanthemums paintings and landscape paintings hanging on the walls. Three “call bells” leading to three entourages’ room were prepared so that President Eisenhower could find them at anytime.

     53 years have passed since 1960, and the room has been rearranged and redecorated. However, the same style lamp, the copper lamp holder, the white square lampshade are still remained. The thank you card given by President Eisenhower and the picture taken with Mme. Chiang also describe the historical meaning and value of this suite room.

Privacy policy

Dear friends, welcome to the website of the Grand Hotel. To ensure your Internet safety and privacy when using our e-services, we have made a number of related policies as written in the following notice. Please read it carefully, as you will also get to know how the Grand Hotel collects, references and protects your personal information.

  • Applicability

    When a user uses the Grand Hotel’s e-services, the policies on the collection, referencing and protection of individual client information are applicable.

  • The collection and use of client information

    This website will not collect any of your personal information if you only browse the site or download files.

    When you use the hotel’s e-services, such as writing an email to the hotel team or making reservations online, you will be required to give some of your personal information, such as your name and email address.

    The website will then record the time when you use the services, as well as the pages your visit. Such information will only be used to conduct surveys on the website’s traffic and customer behavior within the company. This is done to improve our service quality only. We do not go into details of your other personal information.

  • Internet safety policies

    We use an intrusion detection system to monitor Internet traffic, make sure no uploads or change of information are made without authorization, and stop hackers from wrecking havoc on the hotel website.

    A fire wall system is also set up to avoid malicious intrusions or information thefts. We make sure the website is not destroyed by hackers and the rights of users are protected.

    We use anti-virus software to kills bugs on a regular basis. We do our best to provide a safe, clean e-network for our guests.

    We also patch computer programs regularly, as advised by our operating system providers.

  • E-mailing policies

    We will only email you hotel-related materials or send a reply to your account when you allow us to do so, such as when you register at our website, or when you undertake online application procedures. We always clearly state the hotel name in the emails, and we also offer a quick link to terminate subscriptions or access related information in the letters.

  • Information sharing

    The Grand Hotel will never sell, exchange or lease any of your personal information to other individuals, groups or private enterprises.

  • Privacy protection

    If you have any questions about our privacy protection policies, please email us to let us know.

Internet safety policies

All of the hotel staff is obliged to promote the following policies, so as to ensure the safety of the Grand Hotel’s information system, Internet network and related facilities.

  • Management goals
    •  Make sure the information system is in steady operations.
    •  Keep hackers and viruses from intruding or destroying the network.
    •  Prevent bad intent on and illegal use of the information system from happening.
    •  Avoid human error or accidents.
    •  Make sure the hotel’s physical surroundings are safe.
  • Information and software exchange management

    Such management includes receiving and delivering of information and software, setting up technical standards and operation process, establishing rules for identifying senders and recepients, settling on the responsibilities to take when information is lost, ensuring the ownership of such information and the intellectual property right of the software, making sure the information is kept safe, as well as taking measures to protect confidential or sensitive materials.

  • The planning and management of Internet safety
    •  A network operation and monitoring standard is established to ensure safe data transmission and Internet connections. This can also prevent unauthorized access from taking place.
    •  Examinations on Internet safety are conducted on a regular basis.
    •  A fire wall system is introduced to monitor the transmission of and access to data among nodes within and outside the hotel’s network.
    •  Experts on Internet safety are invited to detect network loopholes for the hotel.
    •  New safety measures will always be announced upon implementation.
    •  Sensitive information should be encrypted when transmitted via public Internet as such, or use VPN connections with the corresponding institutions.
  • Firewall management
    •  A firewall system is installed to ensure safe data transmission and data access among nodes within and outside of the hotel’s network.
    •  A military zone and de-military zone are established in the hotel’s fire wall system, so as to protect users according to the services they use. E-services based within the hotel’s network are located in the military zone, while ultra-network services like the World Wide Web and eBAS are set in the de-military zone.
    •  Users from outside the network have to apply in advance to use services provided in the military zone.
    •  The fire wall is installed according to the Internet safety regulations of the Grand Hotel.
    •  The firewall should be monitored by an expert team, and records should be examined at any time if needed.
    •  The administrator should use a terminal to access the system as the firewall host. Remote log-ins are strictly forbidden.
    •  Once the firewall is fully established, the system administrator should conduct all necessary tests to make sure the wall lives up to the required safety standards.
    •  When changes are made to the hotel’s Internet safety policies and regulations, the system administrator should review and adjust the setting and access of the firewall system, so as to keep the hotel network safe at all time.
    •  The system administrator is responsible for all issues related to Internet safety. S/he should also keep the system updated to refrain from various cyber attacks.
    •  If necessary, VPNs (virtual private networks) based of various safety levels should be established between the hotel and its corresponding institutions, so as to ensure safe data transmission.
  • Email system management
    •  Personal emails should be kept in the recipient’s own private account. They should be promptly deleted delivered to the hotel’s public email system.
    •  Confidential official documents should never be delivered via email. Sensitive information may be delivered online when necessary, but the letter(s) must be encrypted in advance.
    •  To avoid impostors from sending emails in the name of the hotel staff, an e-signature may be attached in the emails. This will also help identify the recipient/sender and ensure the authenticity of the documents.
    •  To avoid malicious file execution, suspicious emails should never be read. If the system is attacked in a case like this, please contact the system administrator.
    •  It is forbidden to send letters that make recipients feel uneasy or upset.
    •  Anonymous letters and forgery are also prohibited.
No.1, Sec. 4, Zhongshan N. Rd., Zhongshan Dist., Taipei City 10461, Taiwan (R.O.C.) Tel:+886-2-2886-8888 Fax:+886-2-2885-2885
The Grand Hotel Copyright (C) 2011 All Rights Reserved.