top of page

Information Security Policy

Last Updated: 2025-03-01

To ensure the smooth operation of our information systems, services, and network infrastructure- and to minimize risks caused by human error, malicious intent, or natural disasters - we have established this Information Security Policy. This policy is designed to prevent unauthorized access, use, control, disclosure, damage, alteration, destruction, or other forms of harm. It aims to safeguard the confidentiality, integrity, and availability of our information assets.

  • Establish and implement various information security management regulations in compliance with government laws and regulations (i.e. Information Security Management Act and related sub-laws).

  • Monitor trends in information security, identify internal and external changes, and interact with the needs and expectations of stakeholders. Analyze risks, devise countermeasures, and take actions to reduce operational impact.

  • Set up an information security organizational framework with clearly defined duties and responsibilities to promote protective measures and ensure management accountability.

  • Conduct regular information security training to enhance employees' awareness and understanding of their responsibilities, improving protective consciousness.

  • Regularly inventory information assets and utilize risk assessment mechanisms to effectively control potential impact areas.

  • Strengthen physical and equipment security measures, and perform regular maintenance to ensure normal operation.

  • Establish network transmission rules to protect sensitive documented information and prevent unauthorized access or tampering.

  • Conduct information security audits to identify and address issues, propose countermeasures, and take corrective actions.

  • Implement emergency response plans and conduct regular drills to prepare for unexpected incidents and quickly restore operations.

  • Require outsourced vendors and personnel to sign confidentiality agreements per contractual terms before executing information-related operations.

  • The information security policy should be periodically evaluated to reflect updates in information security management, laws, technology, and operations. Ensure the practicality and effectiveness of information security practices.

If you have any questions regarding the above terms, please feel free to contact us through the following channels:

bottom of page