依據歐盟施行的個人資料保護法,我們致力於保護您的個人資料並提供您對個人資料的掌握。
按一下「全部接受」,代表您允許我們置放 Cookie 來提升您在本網站上的使用體驗、協助我們分析網站效能和使用狀況,以及讓我們投放相關聯的行銷內容。您可以在下方管理 Cookie 設定。 按一下「確認」即代表您同意採用目前的設定。
Information Security Policy
1.Purpose
In order to strengthen the information security management of our company, ensuring the confidentiality, integrity, and availability of its information assets to provide a conducive environment for continuous business operations, and to comply with relevant regulations, thereby protecting against intentional or accidental threats, this policy is established.
2.Scope
This policy covers 34 management items across four major areas, comprehensively preventing the occurrence of unauthorized use, disclosure, alteration, destruction, and other incidents of information due to human error, natural disasters, and other factors that may pose risks and harm to our company. The management items are as follows:
2.1 Organizational Security (8 items)
2.2 Personnel Security (9 items)
2.3 Operational Environment Security (8 items)
2.4 Technical Security (9 items)

3.Definition
Information security refers to the application of management processes and security measures to various information operations, including information system software and hardware assets, files and media storing various information and data, and various paper reports and documents produced as outputs. This is done to ensure the security of information collection, processing, transmission, storage, and circulation.
4.Information Security Policy: Information Security Policy of Our Company
S:Security : Implement information security, enhance service quality.
T:Tenable : Ensure processes are easy to comply with, and maintain continuous compliance.
A:Available : Carefully choose technologies to maintain system availability.
R:Resilient : Prepare for emergencies and strengthen post-disaster recovery.