goldennet

Information Security Organization And Management

The core significance of information security for ITE is to provide stable and secure information systems required for the company's operations, ensuring the availability, accuracy, and confidentiality of information.

Information Security Organization

The information security of the company is managed by the Information Security Responsible unit, Information Security Group, established at the end of 2022. This group includes a convener, an information security manager, and information security personnel. The convener, who is the General Manager, is responsible for approving the execution scope and policies of the information security system and regularly reports to the Board of Directors. The information security officer is responsible for formulating information security policies and objectives, reporting regularly to the convener. Information security personnel are tasked with planning and implementing the company's information security system.


Specific management plans and resources invested in information security management

With the rapid advancement of the information age, convenience comes with unforeseen security risks. Severe incidents can paralyze the company's information network, interrupt operations, and cause data destruction or theft, leading to significant damage to the company and its stakeholders. The Information Security Group, following annual plans and goals,  allocates budgets and implements protective mechanisms. These measures are complemented by employee training and awareness campaigns to strengthen security concepts, ensuring uninterrupted operations and protecting important confidential information of the company and stakeholders (customers, suppliers, etc.).


Information Security Protection Mechanism Implementation Items

Endpoint Protection Comprehensive endpoint protection systems are established for employee computer equipment and network gateway devices, with regular updates and vulnerability scans.
Cyberattack Defense New generation firewalls and network behavior detection systems are installed, supported by strict network access control and two-factor authentication. Backup mechanisms are in place to prevent cyberattack and ensure availability.
Data Backup and Recovery In addition to server virtualization and off-site/cloud backups, critical operational systems have established DR sites. These provide comprehensive data protection mechanisms for disaster recovery, with regular drills to ensure uninterrupted operations.
Strengthening Security Awareness Regular awareness campaigns aligned with current security incidents and supplemented by social engineering exercises to reinforce employees' security concepts.


Information Security Education and Training

In addition to system-level protection mechanisms, employees' information security awareness is the last line of defense for the company's information security protection. Besides, providing information security education for new employees, the company also regularly conducts awareness campaigns and announcements about popular information security incidents. Additionally, social engineering drills are conducted semi-annually to strengthen employees' information security awareness and implementation in their daily work.

To continually enhance the company's information security capabilities, investments in information security protection will continue in 2024. Plans include implementing the SIEM platform and NDR response module to achieve automated defense, enabling immediate detection and protection against various security attacks. The frequency of social engineering exercises will increase to once per quarter to heighten daily vigilance among employees. This aims to prevent damages from ransomware caused by employees accidentally clicking on phishing emails or from hackers infiltrating and stealing confidential company information, which could lead to financial and reputational losses for the company.

Data Building

We are currently preparing. Stay tuned!

Modal4

PRIVACY POLICY

.Description
ITE complies with Taiwan's Personal Data Protection Act to collect, process, use, and protect personal data. We do not actively collect your personal data.

.Collection and Use of Personal Data
No personal data collection occurs during basic browsing, searching, and downloading activities on the ITE official website. If you use the "Contact Us" feature of the website, our company will collect personal information such as your name, company name, email, and contact number. The collected visitor information is solely used for responding to your queries and for communication, and will not be used for purposes other than business contacts by our company. The website records user IP addresses, times, and browsed page data to analyze the browsing behavior of all users collectively, not individually.

.Data Security
Any data transmission on the ITE official website is encrypted with SSL to prevent interception by third parties. The data you provide is managed in accordance with relevant laws and our company's data management principles. The data management system employs firewalls, intrusion detection systems, and virus protection mechanisms to prevent illegal hacker intrusions and malware damage. Visitor personal data (including queries and responses) is typically retained for five years; visitors may request in writing the deletion of their personal data.

.Cookie Usage
This website records Cookie information, including your device, source IP address, and browsed pages, but does not collect your personal data. The collected information is used to optimize the browsing experience on the site and for statistical analysis of website navigation, serving as a reference for improving our site content and services. You can modify the acceptance level of Cookies in your browser settings; however, if you refuse all Cookies, some functions of this website may not operate properly.

CLOSE