Management Staffing |
1. The Company has established an Information Security Management Team, with two dedicated personnel responsible for executing related operations.These responsibilities include policy planning and implementation, management of user computer and corporate network access permissions, firewall and antivirus software administration, as well as data backup planning, redundancy, and recovery drills.
2. In 2024, the Company’s information security personnel received training on the Personal Data Protection Act (Security Maintenance), social engineering, and cybersecurity control guidelines, totaling 32 participant-hours.
In 2025, the personnel completed cybersecurity courses offered by the Taiwan Academy of Banking and Finance, totaling 14 participant-hours, and passed the related assessments. |
Information security and control measures |
1. In 2024, three security patches were applied, and real-time disconnection alerts were added to enhance network incident response capabilities.
2. A filtering mechanism was configured on the email server to prevent the spread of spam messages. A migration to a cloud-based solution is planned for 2025.
3. System network operations utilize MPLS VPN connections to prevent unauthorized external access. In addition, HiNet enterprise security services are employed to block external attacks.
4. Antivirus software was renewed in June 2022 under a three-year contract. The software is in its third year of use as of 2025. Security patches for operating systems on servers are reviewed monthly and updated in real time.
5. Logging into company-issued personal computers and accessing internal systems requires account ID and password authentication. Passwords must be changed every three months; accounts will be locked if the password is not updated within the required period, and access will be suspended until a formal request is submitted. Passwords must be at least 8 characters in length and include a combination of numbers and letters.
6. In July 2024, a review of ERP system access permissions was completed, confirming the accuracy of the user list. The review for 2025 is scheduled to be conducted in July.
7. In 2024, vulnerability scans were completed on six servers and penetration tests were conducted on three servers. This included operating system upgrades and remediation of application vulnerabilities based on OWASP guidelines. The 2025 assessments are scheduled for September. |
Information Equipment Security |
1. Critical system servers are housed in a professional data center with access control measures in place to regulate personnel entry.
2. In 2024, a maintenance inspection was conducted on information servers at all locations to reduce the risk of equipment failure, and hardware warranty contracts were completed. In 2025, server inspections and maintenance at all locations have also been completed.
3. In 2024, a full backup of the core systems—including programs and data—was completed, in compliance with the 3-2-1 backup security standard. Critical system data is backed up twice daily on a scheduled basis, and the backup results are sent out immediately via email. In 2025, in response to the upgrade to VMware 8.0, the backup processes have been revised accordingly.
4. In 2024, MDR (Managed Detection and Response) software was fully implemented to carry out proactive threat detection and cybersecurity incident response. In 2025, alert optimization was conducted to reduce unnecessary notifications.
5. In the second half of 2024, endpoint protection was implemented to enforce USB access control. In 2025, software installation control measures are being introduced, with implementation scheduled for October. |
Enhanced information security awareness |
1. All new employees are required to sign the “Computer Usage Policy Agreement” to ensure they understand the company’s regulations regarding computer use, network management, software installation, and related policies.
2. New employees are required to complete the “New Employee Information Access Application Form.” After confirmation by relevant supervisors and the IT manager, personal computer access permissions are granted. Additional system access may be provided based on job requirements, upon submission of the “Information Access Addition/Modification Application Form,” and approval by the department manager.
3. In 2024, regular cybersecurity awareness campaigns were conducted covering topics such as ransomware prevention, vulnerability mitigation, email security, and major amendments to the Personal Data Protection Act. Awareness messages are set to display upon startup of personal computers. As of 2025, six sessions have been completed, with monthly campaigns ongoing.
4. In 2024, four social engineering drills were conducted. Excluding new employees, staff across departments demonstrated increased cybersecurity awareness—upon receiving suspicious emails, they not only refrained from clicking on them but also promptly reported such incidents to the Information Security Department, thereby enhancing collective defense against cyber threats. As of 2025, one social engineering drill has been completed.
5. In 2024, the “Information and Communication Security Incident Response and Internal Reporting Plan” was established and released. It defines the standards and reporting mechanisms for security incidents, outlines the organization of the response committee, and specifies detailed roles and responsibilities. A drill is scheduled for 2025, with implementation planned for December.
6. In 2024, an online course on cybersecurity vulnerability prevention was arranged for new employees, followed by an online assessment. A total of 33 new employees completed the course and passed the test. As of 2025, 15 new employees have completed the training. |