Information Security Policy
Information Security Objectives
- Ensure the confidentiality, integrity, and availability of business-related information to protect the company's information security.
- Ensure the integrity and availability of information services to provide reliable and stable IT support for all employees.
- Enhance information security defense capabilities to achieve the goal of continuous business operations.

Information Security Strategies
- Assess the security needs of information operations, and establish procedures, develop strategies, management frameworks, and standards to ensure the confidentiality, integrity, and availability of information assets.
- Establish an information security organization and define responsibilities and roles to facilitate the implementation of security operations.
- Formulate classification guidelines for information security incidents to ensure proper handling of necessary actions.
- Establish a reporting and response mechanism for information security incidents to ensure prompt, proper handling and control, minimizing impact and damage.
- Regularly enhance employee awareness of information security to reduce human-caused security incidents.
The company will implement the following information security management measures to achieve the goals of the information security policy
- Mobile Device Management:Ensure all mobile devices are approved before accessing the company's network and operational environment.
- Remote Work Management:Regulate access permissions for all remote work to ensure information security.
- Access Control:Establish comprehensive physical and logical access controls and record all user access activities.
- Encryption Management:Encrypt data, documents, or messages classified as 'Confidential' level.
- Key Management:Regularly review the effectiveness of keys used by the company.
- Physical Security:Implement access controls to prevent unauthorized access or damage to company information assets.
- Desktop Clear Policy:Specify that employees should not store 'Confidential' level information on their desktops.
- Backup Policy:Backup information systems and data according to availability requirements and conduct regular preservation and restoration tests.
- Outsourced Vendor Information Security Policy:Ensure outsourced vendors meet information security management requirements and conduct necessary management and audit activities.
- Awareness and Training:All employees must undergo relevant information security education and training.
- Information Asset Protection:Provide appropriate protection for critical information assets required for the operation of each department.
- Administrative Oversight:Department heads must ensure the effective implementation of this policy within their departments.
- Reporting and Handling:Establish reporting and handling procedures for information security incidents.
We expect all employees to collectively uphold the information security of the company and adhere to this policy.