Information Security

Information Security Policy
- Protect the information system from unauthorized access.
- Prevent revisions that are not yet approved to protect information integrity.
- Ensure authorized users can access information safely and steadily.
- Ensure that the procedures comply with the legal requirements and continue the validity check.
Information Security Targets
- Ensure the continuity, stability, and security of information services.
- Ensure information asset protection integrity, accuracy and security.
Concrete Management Plan
Information Usage Security
- Network and device security:
- Implement device control with the introduction of the email security system, intrusion detection and prevention system, ransomware protection system, and Endpoint protection system.
- Continue to perform social engineering practice drills and improve employee security awareness in device use.
- Access security for APPs:
- Establish the security policies on access behavior to be applied throughout the company’ s devices and strengthen the setup for information security to ensure the authorization and secure access of programming.
- Gradually replace login technology applications and systems with low level of security.
Authorization of Access Security
- Accounts and permission management
- Build a single log-in certification mechanism and integrate the management platforms.
- Evaluate the introduction of multi-factor authentication (MFA) system.
- Information security monitoring and maintenance
- Build network and systems reliability to monitor the alert system.
- Continue to monitor unauthorized and abnormal access alerts.
- Continue to track various information security vulnerability protection information for instant updates or to take on protection countermeasures.
- Introduce information security vulnerability scanning system, conduct regular monitoring and make improvements to the occurrence of system vulnerabilities.
- Personnel and physical security
- Continue and instantly update personal identification system to ensure strict control and prevention of personnel and visitors moving from the security office to core confidentiality area.
Information Asset Protection
- Information security
- Sensitive company data shall be stored in the safe area and personnel can only make entry and exit after identity verification.
- Centralized storage for the data of every department shall be placed in the engine room and authorization for access permission is given based on job level.
- Sign the confidentiality agreement with external vendors to ensure the protection of company business secrets against leaks.
- Through instant backup system and backup copy 321 principle, the double mechanism ensures data retention.
- Enhancing information
- Introduce corporate document digital version management to establish document security protecting corporate business secrets