• Information Security Risk Management Architecture

    As cyber threats become increasingly severe, to ensure the company’s information security, an information and communication security organization is established, with information security manager and personnel, and the general manager as the highest executive of the organization. The team is responsible for external information risk assessment and resource introduction assistance, information security system establishment, information security supervision and audit, and continuous strengthening of information security concepts.
    資訊安全風險管理架構_ENG
     
  • Information Security Policy

    In order to protect the rights and interests of the company and employees, implement the company's internal information security, establish a reliable information security operating environment to ensure the confidentiality, integrity and availability of information assets, maintain the continuous operation principle of information systems, according to the planning, execution, audit and action (PDCA) management cycle mechanism, and hold regular meetings every month to review the applicability of information security policies.
    資訊安全政策_ENG
     
  • Specific Management Plan for Information Security

    Project Operation Description
    Physical Security
    • Access control of the server room.
    • The server room should be equipped with uninterruptible power supply (UPS) to ensure the stability of the circuit and the supply of power to the computer system for emergency use.
    Cloud-Based Security
    • URL filtering to protect against malicious websites.
    • Spam defense system
    • Automatic email scanning threat protection, preventing unsafe attachments before users receive emails.
    • Phishing emails, spam, and expanding protection scope of preventing malicious links.
    Account and Permission Management
    • Change Passwords regularly and have a certain level of complexity.
    • The account of the departing employee shall be deactivated immediately
    Data Security
    • Perform off-site backup and restore drills.
    • Implement a data loss prevention system.
    Cybersecurity
    • Review firewall settings and connection rules to ensure blocking malicious attacks.
    Device Safety
    • Install anti-virus software on endpoint devices.
    • Automatically update the virus pattern.
  • Resources Invested in Information Security Management

    To strengthen information security, irregularly conduct information security promotion with current events cases and information security cases reflected by employees during their daily work, and allocate appropriate budget every year to strengthen information technology and security protection, and hold a monthly information security meeting at the beginning of each month to regularly review the information security policy, and report the operation and execution results of information security to the board of directors regularly every year. 

    The control measures and operation status of the Company's information security in 2023 have been reported to the 3rd meeting of the 7th session of the Board of Directors on November 11, 2024.
    • A total of 5 information security promotions were conducted in 2024.
    • Information security monthly meetings were held in 2024.
    • New employee education and training completion rate 100%.
    • Conducted email social engineering phishing email drill in 2024.
    • No major information security incidents caused business damage in 2024.
    • Completed information security education and training in 2024.

Inquiry+

Your inquiry list total 0 items

    Compare+

    Your comparison total0items

      依據歐盟施行的個人資料保護法,我們致力於保護您的個人資料並提供您對個人資料的掌握。
      按一下「全部接受」,代表您允許我們置放 Cookie 來提升您在本網站上的使用體驗、協助我們分析網站效能和使用狀況,以及讓我們投放相關聯的行銷內容。您可以在下方管理 Cookie 設定。 按一下「確認」即代表您同意採用目前的設定。

      Privacy preferences

      依據歐盟施行的個人資料保護法,我們致力於保護您的個人資料並提供您對個人資料的掌握。
      按一下「全部接受」,代表您允許我們置放 Cookie 來提升您在本網站上的使用體驗、協助我們分析網站效能和使用狀況,以及讓我們投放相關聯的行銷內容。您可以在下方管理 Cookie 設定。 按一下「確認」即代表您同意採用目前的設定。

      Manage preferences

      Necessary cookie

      Always on
      網站運行離不開這些 Cookie 且您不能在系統中將其關閉。通常僅根據您所做出的操作(即服務請求)來設置這些 Cookie,如設置隱私偏好、登錄或填充表格。您可以將您的瀏覽器設置為阻止或向您提示這些 Cookie,但可能會導致某些網站功能無法工作。