Frame of Cyber security Management
The IT team of the company is responsible for devising and executing the company's IT security policy, and regularly reports to the Board of Directors.
The audit department is responsible for supervising IT security and conducting inspections based on computer operating system controls, including IT security inspections. We conduct regular follow-ups to mitigate risks.
Cyber security policy and implementation
To mitigate the risks of tampering, theft, and destruction of company information from internal and external threats, we ensure the integrity, confidentiality, and availability of information. The key points of relevant management measures are as follows:
The IT department is responsible for installing, managing, and monitoring software such as operating systems, anti-virus programs, and security software to ensure the integrity and security of the company's information technology infrastructure.
To prevent illegal intrusions by hackers, it is essential to strengthen network controls and configure enterprise-level firewalls. Regular cyber security audits should be conducted in collaboration with customers to meet the high standards expected by both parties.
Non-employees are strictly prohibited from utilizing any company-owned computers, equipment, accounts and passwords. Only essential services such as email, file sharing, and internet access will be permitted through approved devices.