回到頁頂

Information Security Risk Management

Information Security Governance

EPi is well aware that the security of intellectual property has a great impact on the competitiveness of itself and its partners. Therefore, the company actively strengthens the information security and confidential information protection mechanism, continuously improves the information security defense capabilities and the information security awareness of all employees, so as to reduce the ever-changing and unknown risks. Information security attack risk.

 

Information Security Policy

We will continuously improve and strengthen our information security management to ensure the confidentiality, integrity, and availability of our information assets. We will comply with relevant laws, regulations, and contracts to establish and maintain a secure, reliable, and business-continuous information environment. And we will protect our information assets from deliberate or accidental threats from both internal and external sources.

 

Information Security Objectives

Ensuring the company's information operations comply with relevant laws, regulations, and contractual requirements.

Ensuring all personnel understand their responsibilities of information security, to protect information assets, and reduce the risk of information security incidents.

To implement access controls and authorized to ensure the confidentiality of the company's information assets.

Preventing unauthorized modifications to ensure the management integrity of the company's information operations and the accuracy of data.

Ensuring the continuous operation of the company's information operations, meeting operational service standards.

 

Countermeasures for Information Security Risks
Strengthen information security defense capabilities

With reference to industry practice and the opinions of competent authorities and experts, continue to introduce or strengthen necessary protective measures in order of priority.Establish emergency response plans and recovery measures to ensure the effectiveness of the company's information security practices and reduce risks.

Protection of customer privacy and confidential information

Data processing, storage and privacy settings are all operated on a confidential protection operating platform to ensure confidential data protection. For the reception, transmission, storage, and use of customer information, establish authority control and manage according to different confidentiality levels.

Education and training

Cultivate information security professionals, establish information security management norms, and publicize information security knowledge to all employees.