Customer Complaint Hotline 0800-006-889

Information Security Policy

Information Security Objectives
  1. Ensure the confidentiality, integrity, and availability of business-related information to protect the company's information security.
  2. Ensure the integrity and availability of information services to provide reliable and stable IT support for all employees.
  3. Enhance information security defense capabilities to achieve the goal of continuous business operations.



Information Security Strategies
  1. Assess the security needs of information operations, and establish procedures, develop strategies, management frameworks, and standards to ensure the confidentiality, integrity, and availability of information assets.
  2. Establish an information security organization and define responsibilities and roles to facilitate the implementation of security operations.
  3. Formulate classification guidelines for information security incidents to ensure proper handling of necessary actions.
  4. Establish a reporting and response mechanism for information security incidents to ensure prompt, proper handling and control, minimizing impact and damage.
  5. Regularly enhance employee awareness of information security to reduce human-caused security incidents.



 

The company will implement the following information security management measures to achieve the goals of the information security policy

  1. Mobile Device Management:Ensure all mobile devices are approved before accessing the company's network and operational environment.
  2. Remote Work Management:Regulate access permissions for all remote work to ensure information security.
  3. Access Control:Establish comprehensive physical and logical access controls and record all user access activities.
  4. Encryption Management:Encrypt data, documents, or messages classified as 'Confidential' level.
  5. Key Management:Regularly review the effectiveness of keys used by the company.
  6. Physical Security:Implement access controls to prevent unauthorized access or damage to company information assets.
  7. Desktop Clear Policy:Specify that employees should not store 'Confidential' level information on their desktops.
  8. Backup Policy:Backup information systems and data according to availability requirements and conduct regular preservation and restoration tests.
  9. Outsourced Vendor Information Security Policy:Ensure outsourced vendors meet information security management requirements and conduct necessary management and audit activities.
  10. Awareness and Training:All employees must undergo relevant information security education and training.
  11. Information Asset Protection:Provide appropriate protection for critical information assets required for the operation of each department.
  12. Administrative Oversight:Department heads must ensure the effective implementation of this policy within their departments.
  13. Reporting and Handling:Establish reporting and handling procedures for information security incidents.
The company will continually enhance and improve the information security management system to address potential future information security threats and ensure that our data and systems operate in a secure environment.
We expect all employees to collectively uphold the information security of the company and adhere to this policy.