※ On mobile devices, you can swipe horizontally to view all table columns; on desktop, the full width is displayed without truncation.
In order to ensure that the Company’s information security management system is fully implemented, operates effectively, is properly supervised and continuously improved, and to protect the confidentiality, integrity, and availability of the Company’s critical information systems, this Information and Communications Security Management Policy is hereby promulgated.
This Policy is intended to provide employees with clear guidelines in their daily work. All employees are obliged to actively participate in promoting information and communications security management so as to ensure the secure operation of the Company’s personnel, data, information systems, equipment, and networks. The Company expects all employees to understand, implement, and maintain these requirements to achieve the goal of continuous information operations.
(1) Implement information and communications security and enhance service quality:
All employees shall fully implement information security management. All information-related operational measures must ensure the confidentiality, integrity, and availability of business data and protect it from external threats or risks arising from improper internal management. Appropriate protection measures shall be selected, and information security management systems shall be continuously monitored, reviewed, and audited to enhance service quality and standards.
(2) Strengthen information security training and ensure business continuity:
The Company supervises all employees in implementing information and communications security management and conducts appropriate training every year to establish the concept that “information and communications security is everyone’s responsibility.” This helps employees recognize its importance, comply with regulations, and enhance their response capabilities to reduce information security risks.
(3) Establish emergency response and rapid disaster recovery:
The Company formulates emergency response and disaster recovery plans for critical information assets and key operations and conducts regular drills to ensure that systems can be quickly restored in the event of system failures or disasters, thereby maintaining operations and reducing losses.
(4) Conduct regular audits and manage effectiveness:
The Company conducts internal audits annually to ensure the effectiveness of information security and personal data protection management. Hardware and system software maintenance, information security inspections, and personal data protection management are included as yearly audit items (at least once a year), and the results are reported to the Board of Directors along with the issuance of the Statement on Internal Control System.
No major information and communications security incidents occurred in the most recent year that resulted in losses, potential impacts, or required specific response measures.