-
Information Security Policy
- Information Security Organization And Management

Information Security Policy
Information Security Management is a key aspect of ITE Tech. Inc. governance. Robust and sound information security measures not only support uninterrupted business operations and future development but also protect sensitive information and communication security for stakeholders, including employees and customers. In compliance with the Financial Supervisory Commission's "Guidelines for the Establishment of Internal Control Systems by Public Companies," the company established a dedicated information security unit at the end of 2022 under the direction of the General Manager. The company has also formulated an information security policy and related management measures aligned with long-term development goals and in response to increasingly severe external information security threats.
The company did not purchase information security insurance in 2023, and there were no significant information security incidents that affected operations, thus avoiding any financial or reputational impact and loss.
Information Security Policy
- The company's information security management regulations must comply with relevant government regulations.
- Establish a rigorous access control mechanism, regulate password principles, and define access permissions for networks, information systems, and data to prevent unauthorized access and ensure the security of sensitive data.
- Establish active and passive information security protection systems, such as firewalls, intrusion detection, antivirus software, and vulnerability scanners, to ensure normal company operations and protect the integrity, availability, and confidentiality of important data.
- Establish backup and disaster recovery mechanisms for the company's operational systems and data to ensure the integrity and availability of operational data.
- Operating system virtualization and establishing disaster recovery mechanisms, formulating disaster recovery plans, and conducting regular drills to minimize the impact and losses of information security incidents on company operations.
- Regularly conduct information security drills and audits to reduce the risk of information security incidents and enhance response capabilities.
Data Building
We are currently preparing. Stay tuned!
PRIVACY POLICY
CLOSE