公司治理
Corporate Governance

Risk Management

風險管理

Information Security Risk Management Framework

The company's information security authority is convened by the CEO and organizes the Information Management Center, which has a chief information officer and several professional information personnel responsible for coordinating and implementing information security policies, disseminating information security information, raising employees' awareness of information security, and collecting and improving technologies, products or procedures for the performance and effectiveness of the organization's information security management system.


The audit office conducts annual information security audits on the internal control system (information system management information security inspection operations) to evaluate the effectiveness of the company's internal controls over information operations.


The information security policy and its implementation are reviewed and reported to the Board of Directors on an annual basis.

Information Security Policies

  1. Ensure the continuity of the Company's business operations and the stability of the information services provided by the Company.
  2. Ensure the confidentiality, integrity and availability of information assets in the Company's custody and to protect the privacy of personnel information.

Specific Management Programs for Information Security

1. Network information security control

  • Establishment of next-generation firewall
  • Regular virus scanning of computer systems and data storage media
  • The use of each network service shall be carried out in accordance with the information security policy.
  • Regularly review the System Log of each network service item to track irregularities.
  • Occasional vulnerability scans, social engineering exercises, and protection system effectiveness checks


2. Information access control

  • Computer equipment should be kept by dedicated people with account and password created.
  • Different access rights according to the function.
  • Cancellation of original authority for transferred personnel
  • Remove or overwrite confidential, sensitive information and copyrighted software before disposing of equipment
  • Remote access to the management information system should be properly approved


3. Response and recovery mechanism

  • Regular review of emergency response plans
  • Regular annual rehearsals for system recovery
  • Establish system backup mechanism and implement off-site backup
  • Regular review of computer network security controls


4. Promotion and inspection

  • Promote information security information at all times to raise employees' awareness of information security
  • Regularly perform annual information security inspections and report to the CEO

The Resources Devoted in Information Security Management

  1. Drill practice for information personnel was conducted on October 16, 2021.
  2. We have conducted 5 information security educational trainings this year with a total of 51 people-time and a total of 133 person-hours.

Semiconductor Component Inquiry Form
If you have any questions related to our products (qutation, technical support, product documents, sample request, cooperation, etc), please kindly fill the inquiry form. Your inquries will be replied as soon as possible.
Privacy Policy

STEP

01
!

Marked Please fill in the required field, thank you.

Need
Industry

Product

Notes

Next, fill in contact information

STEP

02
!

Marked Please fill in the required field, thank you.

Company Name
Department
Contact Person
Title
Phone number
eMail
Address
Delivery Address
Same trade or not
Verification Code
Subscribe to Newsletter
!

Marked * Please fill in the required field, thank you.

Company Name
Department
Name
Title
Contact Number
Select preferred newsletter language
Email
Verification Code