About us

Information Security Management Policy

To ensure that the Company’s information security management is fully implemented, operates effectively, is properly supervised, and continues to improve, and to protect the confidentiality, integrity, and availability of the Company’s critical information systems, this Information Security Management Policy is hereby established.

 

The purpose of this policy is to provide clear guidelines for employees in their daily work. All employees are obligated to actively participate in the promotion and implementation of the Information Security Management Policy to ensure the secure and stable operation of all personnel, data, information systems, equipment, and networks within the Company. It is expected that all employees will understand, implement, and maintain the policy to achieve the goal of continuous information operations. For regulations regarding the use of general information equipment and various network services, please refer to the “General Information Equipment Security Management Standard Operating Procedures.”

 

  • “Implement information security to enhance service quality.”
  • “Strengthen information security training to ensure continuous operations.”
  • “Improve emergency response and enable rapid disaster recovery.”

 

All employees shall fully implement information security management. All information-related operational measures must ensure the confidentiality, integrity, and availability of business data, preventing risks such as leakage, damage, or loss caused by external threats or improper internal management. Appropriate protective measures shall be selected to reduce risks to an acceptable level. Continuous monitoring, review, and auditing of the information security management system shall be conducted to strengthen service quality and enhance service standards.