Specific Information Security Management Plans and Resources
2-1. Physical and Environmental Security Management
Computer equipment security and data center control management encompass hardware environment control, power supply, cable security,
and equipment maintenance.
The disposal of physical information assets and equipment is managed uniformly by the Information Department in accordance with the
procurement process and disposal procedures to prevent the leakage of personal information.
2-2. Software Usage Security Management
Our company strictly prohibits and forbids the use of illegal pirated software. The software used within the company has been authorized
by the respective vendors. Without prior consent from the company's management and the head of the Information Management Department,
downloading or installing software is strictly prohibited to avoid any infringement of intellectual property rights, violation of laws,
or activation of malicious executables.
2-3. Perimeter Security Management
To achieve effective security control, personnel entering and exiting must carry identifiable identification cards and use personal fingerprint
recognition. Information support or maintenance service personnel are only allowed access when accompanied by Information Management Department personnel or when granted specific authorization. Records of entries and exits should be maintained.
2-4. The resources for network security and information communication security management
2-4-1. The resources for network security management :
The Information Department manages the network system to ensure its smooth operation. It installs devices such as firewalls and information
security protection to prevent illegal intrusions that could compromise the company's trade secrets and personal data. Additionally, the
internal network and host systems retain complete records of all personnel logging in and out of the system。
2-4-2. Data Security Management:
Access control and data storage security are strictly enforced through password management and regular data and software backups. For critical information, a mechanism of storing data in remote locations is implemented.
2-4-3. Data Encryption Management:
A. To maintain the confidentiality, integrity, and availability of our company's assets, document files and research development drawings
undergo document data encryption management. Additionally, there is control over the usage of USB drives.
B. Any document taken out or provided to suppliers requires a decryption request process. Decryption can only be done with the approval and
signature of the General Manager. Graphics files need to be archived by document control personnel before being forwarded by IT personnel
via the company's dedicated email.
|