goldennet

Information Security Policy

Information Security Management is a key aspect of ITE Tech. Inc. governance. Robust and sound information security measures not only support uninterrupted business operations and future development but also protect sensitive information and communication security for stakeholders, including employees and customers. In compliance with the Financial Supervisory Commission's "Guidelines for the Establishment of Internal Control Systems by Public Companies," the company established a dedicated information security unit at the end of 2022 under the direction of the General Manager. The company has also formulated an information security policy and related management measures aligned with long-term development goals and in response to increasingly severe external information security threats.

The company did not purchase information security insurance in 2023, and there were no significant information security incidents that affected operations, thus avoiding any financial or reputational impact and loss.


Information Security Policy

  1. The company's information security management regulations must comply with relevant government regulations.
  2. Establish a rigorous access control mechanism, regulate password principles, and define access permissions for networks, information systems, and data to prevent unauthorized access and ensure the security of sensitive data.
  3. Establish active and passive information security protection systems, such as firewalls, intrusion detection, antivirus software, and vulnerability scanners, to ensure normal company operations and protect the integrity, availability, and confidentiality of important data. 
  4. Establish backup and disaster recovery mechanisms for the company's operational systems and data to ensure the integrity and availability of operational data.
  5. Operating system virtualization and establishing disaster recovery mechanisms, formulating disaster recovery plans, and conducting regular drills to minimize the impact and losses of information security incidents on company operations.
  6. Regularly conduct information security drills and audits to reduce the risk of information security incidents and enhance response capabilities.

Data Building

We are currently preparing. Stay tuned!

Modal4

PRIVACY POLICY

.Description
ITE complies with Taiwan's Personal Data Protection Act to collect, process, use, and protect personal data. We do not actively collect your personal data.

.Collection and Use of Personal Data
No personal data collection occurs during basic browsing, searching, and downloading activities on the ITE official website. If you use the "Contact Us" feature of the website, our company will collect personal information such as your name, company name, email, and contact number. The collected visitor information is solely used for responding to your queries and for communication, and will not be used for purposes other than business contacts by our company. The website records user IP addresses, times, and browsed page data to analyze the browsing behavior of all users collectively, not individually.

.Data Security
Any data transmission on the ITE official website is encrypted with SSL to prevent interception by third parties. The data you provide is managed in accordance with relevant laws and our company's data management principles. The data management system employs firewalls, intrusion detection systems, and virus protection mechanisms to prevent illegal hacker intrusions and malware damage. Visitor personal data (including queries and responses) is typically retained for five years; visitors may request in writing the deletion of their personal data.

.Cookie Usage
This website records Cookie information, including your device, source IP address, and browsed pages, but does not collect your personal data. The collected information is used to optimize the browsing experience on the site and for statistical analysis of website navigation, serving as a reference for improving our site content and services. You can modify the acceptance level of Cookies in your browser settings; however, if you refuse all Cookies, some functions of this website may not operate properly.

CLOSE