Information Security Risk Management
Information Security Governance
EPi is well aware that the security of intellectual property has a great impact on the competitiveness of itself and its partners. Therefore, the company actively strengthens the information security and confidential information protection mechanism, continuously improves the information security defense capabilities and the information security awareness of all employees, so as to reduce the ever-changing and unknown risks. Information security attack risk.
Information Security Policy Implementation-Aim at the three main axes of information security protection: anti-virus, anti-hacking, and anti-leakage
Establish information security policies and management practices.
Strengthen education and publicity, and build a consensus on information security among all employees.
Ensuring the confidentiality, integrity and availability of information.
Provide a safe working environment.
With reference to industry practice and the opinions of competent authorities and experts, continue to introduce or strengthen necessary protective measures in order of priority.Establish emergency response plans and recovery measures to ensure the effectiveness of the company's information security practices and reduce risks.
Data processing, storage and privacy settings are all operated on a confidential protection operating platform to ensure confidential data protection. For the reception, transmission, storage, and use of customer information, establish authority control and manage according to different confidentiality levels.
Cultivate information security professionals, establish information security management norms, and publicize information security knowledge to all employees.