Information security risk management
Information and communication security risk management architecture
- The Company's "Cybersecurity Management Office" is responsible for formulating internal cybersecurity policies, planning and implementing cybersecurity operations, and promoting and enforcing cybersecurity policies.
- The Company's Audit Office is the auditing unit for cybersecurity supervision. If deficiencies are found during audits, the audited unit will be immediately required to submit relevant improvement plans to the Board of Directors, and the effectiveness of improvements will be regularly tracked to reduce internal cybersecurity risks.
- Organizational Operation Model - Adopting PDCA (Plan-Do-Check-Act) cyclical management to ensure reliability, goal achievement, and continuous improvement.
Cybersecurity Policy
- Maintain the continuous operation of all information and communication systems
- Prevent hacking, virus intrusion, and damage
- Prevent unauthorized and illegal use by human agents
- Prevent the leakage of sensitive information
- Avoid accidents caused by human error
- Maintain the security of the physical environment
Resource investment in information and communication security
The "Cybersecurity Management Office" is staffed with a dedicated cybersecurity supervisor and a staff member, who is concurrently a colleague from the company's IT department. They conduct quarterly reviews of cybersecurity management. The IT department reviews and plans the implementation of critical cybersecurity tasks, such as operating system or critical software upgrades for mainframes and disaster recovery drills, quarterly. Through unscheduled cybersecurity health checks, they assess for vulnerabilities in IT equipment resources and system configurations, and implement cybersecurity budgets accordingly. Furthermore, they have signed cybersecurity protection agreements with judicial authorities to establish a collaborative cybersecurity defense mechanism.
Emergency notification procedure
When an information security incident occurs, the unit where the incident occurred shall notify the Information Department, determine the type of incident and identify the problem, handle it immediately and keep a record.
Specific Management Plan for Information and Communication Security
| Category | Description |
| Computer equipment security management |
|
| Network security management |
|
| Virus protection and management |
|
| System Access Control |
|
| Ensure the continuous operation of the system |
|
| Cybersecurity awareness and training |
|
