Information Security Management Policy

Purpose

In light of the widespread use of computers and the Internet in recent years, this policy is established to ensure the security of the company's data, information systems, equipment, and the Internet. This serves as the basis for all employees regarding information security.


Information Security Risk Management Framework

A

The company has established an Information Security Task Force to coordinate, plan, audit, and promote information security management matters.

B

The task force consists of all personnel from the Management Department, including the Manager, IT Specialist, Documentation Specialist, General Affairs Specialist, and HR Specialist.

C

The IT Specialist is responsible for discussing, establishing, and evaluating information security policies, plans, and technical specifications. The IT department operates independently of user departments.

D

The entire Management Department is responsible for information confidentiality maintenance and security audits.


Information Security Policy:

To ensure the accuracy of information processing, the reliability of equipment (including computer hardware, software, and peripherals) and network systems, and to protect resources from interference, destruction, intrusion, or any adverse actions, appropriate system planning, procedural norms, and administrative management are coordinated to prevent internal and external threats and maintain system security.


Operational Content

A

Personnel security management, responsibility, and education training.

B

Computer system security management.

C

Network security management.

D

System access control.

E

Education and training.

F

Security management of system development and maintenance.

G

Security management of information assets.

H

Physical and environmental security management.

I

Business continuity planning and management.


Specific Management Methods

A
Internet and Information Security Control:
  • Set up firewalls and use UTM to block vulnerabilities.
  • Regular system virus scanning and updates.
  • Supervised maintenance by external vendors.
  • Personnel access control.
B
Data Access Control:
  • Dedicated personnel manage information equipment, set accounts and passwords, and conduct asset management.
  • Grant different access permissions based on job functions.
  • Modify or revoke permissions for departing personnel.
  • Log out or shut down the system when not in use.
C
Contingency and Recovery:
  • Annual disaster recovery drills.
  • System and data backups.
  • Regular fire drills.
  • Periodic UPS system checks.
D
Advocacy and Audit:
  • Ongoing information security awareness campaigns.
  • Regular internal and external audits, with audit reports to the Board of Directors.

Resources Invested in Information Security Management

A

Network hardware equipment such as firewalls, email antivirus, and spam filtering.

B

Software systems like endpoint protection and VPN authentication.

C

Telecommunication services such as backup lines and UTM intrusion prevention.

D

Human resources for daily system checks, weekly backups, security awareness, annual disaster recovery drills, internal audits, and CPA audits.

E

Information security personnel: Establish an Information Security Task Force responsible for security architecture design, maintenance, monitoring, incident response, policy review, and annual reporting to the Board of Directors.


Implementation Status

A

No major incidents causing business damage have occurred.

B

Information security policies and related regulations are regularly reviewed and evaluated to reflect government laws.

C

Information personnel continue to receive security training to ensure the latest technical and business developments.


Impact of Information Security Risks on the Company's Financial and Business Operations and Mitigation Measures

01
Information Security Risks
  • The main risks involve third-party attacks that could paralyze systems, steal confidential information, and disrupt operations or harm the company's reputation. These activities affect the normal operation of information systems and facilities.
02
Information Security Management Measures
  • Implement recovery and protection measures according to security management standards, including off-site backups and disaster recovery drills. Systems used in operations are mostly developed externally, with maintenance contracts and confidentiality agreements with vendors. Maintenance is performed under supervision. Regular system updates and endpoint antivirus installation, with external network defense through firewalls and UTM services.

Through the continuous improvement, updating, and implementation of security policies, the company effectively reduces the probability and impact of various information threats, achieving risk control. Overall, the information risk is low, with minimal impact on finance and operations. The company will continue to improve and cooperate with TWCERT/CC, referring to international standards to establish security KPIs and enhance security measures.