Information Security
I. Framework:
- The "Information Security Committee" was established to promote, coordinate and supervise information security operation. The updated status shall be reported to board of directors at least once a year. In addition, the company has obtained international information security certification to reduce security risk and protect customer privacy.
II. Policy:
- Purpose: Strengthen security management, ensure confidentiality, integrity and availability of the relative information to build up a sustainable information environment for sales operation; while comply with government regulation and external/ internal stakeholders ’requirements to avoid any intentional or accidental threats at the same time.
- Target:
- Ensure the correctness, completion and practicality of the company’s information.
- Ensure the confidentiality of the company's important information and implementation of data access control. Information access or storage shall only be conducted with the approval of authorized personnel.
- Ensure the compliance with legal regulations.
III.Plan:
In order to enhance information security management, the company has obtained ISO 27001 "International Standard for Information Security Management System" in 2022. The certificate is valid from November 22, 2022 until October 31, 2025. The standard-based mode and guideline were executed and implemented into daily operation to further improve security protection. The company has set concrete management plans as follows:
- The company regularly conducts propaganda and promotes the importance of information security. New employees must participate in educational training to enhance the awareness of information security protection.
- Build up a safe and reliable information environment to enable sustainable operation.
- Appropriate backup or monitoring mechanisms should be established for important information systems or equipment. Regular drills should also be conducted to assure availability.
- Anti-virus software should be installed in every employee’s computer and virus code should be checked regularly. Unauthorized software is prohibited.
- Accounts, passwords, and authorizations held by individual should be fully maintained and replaced periodically.
- Design appropriate response and notification procedures to respond immediately to information security incidents.
- The company has conducted information security risk assessment and audits every year to ensure the effectiveness of management and compliance with regulations. Risk of information security is not a major issue and there is no need for insurance currently.