Information Security Risks Management

Company Information Security Policy

  • Ensure the confidentiality of the company’s trade secret (Business secret) and customer data
  • Ensure the availability and integrity of the information applications of the core business operations and their support services and equipment
  • Ensure the effectiveness and sustainability of the information security management mechanism

Information Security Policy Statement

  • In order to ensure the sustainable development of the company and fulfill customer commitments, the company had established the company’s information security policies, operating procedures and methods to improve information risk management, strengthen information security management mechanisms, implement information security protection, and improve the level of information security. Make relevant personnel and important partners of the company’s offices following these rules.

Information Security Organization and Responsibilities

  • The company set up an information security organization to handle matters related to information security prevention and crisis management to prevent trade secrets and information security crisis, maintain information system security, respond to emergencies quickly, return to normal operation in the shortest time and reduce the damage.
  • The information security organization consists of the general manager, the information security committee, the management representative, the Information security incident response team, and the information security implementation team. It also consults with outside scholars and experts, civil professional organizations and organizations to strengthen mutual cooperation and experience sharing. Moreover, Assessing that information security threats to develop and promote information security practices in a cooperative way.

Based on ISO 27001 principles, the company had established an information security management system with formal information security risk assessment and management processes. After establishing the above policies, procedures, and many other security measures, company ensure the appropriateness and effectiveness by continuously reviewing and evaluating cyber security regulations and procedures.

Information Security Policy

Company Information Security Policy

  • Ensure the confidentiality of the company’s trade secret (Business secret) and customer data
  • Ensure the availability and integrity of the information applications of the core business operations and their support services and equipment
  • Ensure the effectiveness and sustainability of the information security management mechanism

Information Security Policy Statement

  • In order to ensure the sustainable development of the company and fulfill customer commitments, the company had established the company’s information security policies, operating procedures and methods to improve information risk management, strengthen information security management mechanisms, implement information security protection, and improve the level of information security. Make relevant personnel and important partners of the company’s offices following these rules.

Information Security Organization and Responsibilities

  • The company set up an information security organization to handle matters related to information security prevention and crisis management to prevent trade secrets and information security crisis, maintain information system security, respond to emergencies quickly, return to normal operation in the shortest time and reduce the damage.
  • The information security organization consists of the general manager, the information security committee, the management representative, the Information security incident response team, and the information security implementation team. It also consults with outside scholars and experts, civil professional organizations and organizations to strengthen mutual cooperation and experience sharing. Moreover, Assessing that information security threats to develop and promote information security practices in a cooperative way.

Based on ISO 27001 principles, the company had established an information security management system with formal information security risk assessment and management processes.  After establishing the above policies, procedures, and many other security measures, company ensure the appropriateness and effectiveness by continuously reviewing and evaluating cyber security regulations and procedures.