﻿{"id":2054,"date":"2020-09-22T15:07:27","date_gmt":"2020-09-22T07:07:27","guid":{"rendered":"http:\/\/tw.hannstarboard.com\/en\/?page_id=2054"},"modified":"2021-12-03T14:04:25","modified_gmt":"2021-12-03T06:04:25","slug":"information-security","status":"publish","type":"page","link":"https:\/\/tw.hannstarboard.com\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2054\" class=\"elementor elementor-2054\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d8e33b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5d8e33b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c0e82c\" data-id=\"5c0e82c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5675e6d elementor-widget elementor-widget-shortcode\" data-id=\"5675e6d\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t\t<!-- START NewInformationsecurity REVOLUTION SLIDER 6.3.9 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_38_1_wrapper\" data-source=\"gallery\" style=\"background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;max-width:;\">\n\t\t\t\t<rs-module id=\"rev_slider_38_1\" class=\" rs-ov-hidden\" style=\"\" data-version=\"6.3.9\">\n\t\t\t\t\t<rs-slides>\n\t\t\t\t\t\t<rs-slide data-key=\"rs-40\" data-title=\"Slide\" data-anim=\"ei:d;eo:d;s:600;r:0;t:fade;sl:d;\">\n\t\t\t\t\t\t\t<img src=\"\/\/tw.hannstarboard.com\/en\/wp-content\/uploads\/2020\/09\/Information-security2.jpg\" title=\"Information Security\" class=\"rev-slidebg\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-38-slide-40-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;y:m;yo:-13px,-13px,-14px,-14px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:nowrap,nowrap,normal,normal;s:40,40,40,30;l:51;a:center,center,inherit,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:auto,auto,auto,450px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"o:1;\"\n\t\t\t\t\t\t\t\tdata-frame_0_chars=\"d:10;y:-50px;o:0;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:280;sR:280;\"\n\t\t\t\t\t\t\t\tdata-frame_1_chars=\"d:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:6620;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;font-family:Audiowide;\"\n\t\t\t\t\t\t\t><span style=\"color:#C51042;\">I<\/span>nformation Security \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-38-slide-40-layer-5\" \n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:100px;\"\n\t\t\t\t\t\t\t\tdata-text=\"l:22;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:['68px','68px','68px','68px'];h:['9px','9px','9px','9px'];\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8690;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;\"\n\t\t\t\t\t\t\t><img loading=\"lazy\" src=\"\/\/tw.hannstarboard.com\/en\/wp-content\/uploads\/2020\/08\/aboutpbg013.svg\" width=\"68\" height=\"9\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script type=\"text\/javascript\">\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_38_1',rl:[1240,1240,778,480],el:[320,320,350,320],gw:[1920,1920,778,450],gh:[320,320,350,320],type:'hero',justify:'',layout:'fullwidth',mh:\"0\"});\n\t\t\t\t\tvar\trevapi38,\n\t\t\t\t\t\ttpj;\n\t\t\t\t\tfunction revinit_revslider381() {\n\t\t\t\t\tjQuery(function() {\n\t\t\t\t\t\ttpj = jQuery;\n\t\t\t\t\t\trevapi38 = tpj(\"#rev_slider_38_1\");\n\t\t\t\t\t\tif(revapi38==undefined || revapi38.revolution == undefined){\n\t\t\t\t\t\t\trevslider_showDoubleJqueryError(\"rev_slider_38_1\");\n\t\t\t\t\t\t}else{\n\t\t\t\t\t\t\trevapi38.revolution({\n\t\t\t\t\t\t\t\tsliderType:\"hero\",\n\t\t\t\t\t\t\t\tvisibilityLevels:\"1240,1240,778,480\",\n\t\t\t\t\t\t\t\tgridwidth:\"1920,1920,778,450\",\n\t\t\t\t\t\t\t\tgridheight:\"320,320,350,320\",\n\t\t\t\t\t\t\t\tspinner:\"spinner0\",\n\t\t\t\t\t\t\t\tperspective:600,\n\t\t\t\t\t\t\t\tperspectiveType:\"local\",\n\t\t\t\t\t\t\t\teditorheight:\"320,350,350,320\",\n\t\t\t\t\t\t\t\tresponsiveLevels:\"1240,1240,778,480\",\n\t\t\t\t\t\t\t\tprogressBar:{disableProgressBar:true},\n\t\t\t\t\t\t\t\tnavigation: {\n\t\t\t\t\t\t\t\t\tonHoverStop:false\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tfallbacks: {\n\t\t\t\t\t\t\t\t\tallowHTML5AutoPlayOnAndroid:true\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t});\n\t\t\t\t\t\t}\n\t\t\t\t\t\t\n\t\t\t\t\t});\n\t\t\t\t\t} \/\/ End of RevInitScript\n\t\t\t\tvar once_revslider381 = false;\n\t\t\t\tif (document.readyState === \"loading\") {document.addEventListener('readystatechange',function() { if((document.readyState === \"interactive\" || document.readyState === \"complete\") && !once_revslider381 ) { once_revslider381 = true; revinit_revslider381();}});} else {once_revslider381 = true; revinit_revslider381();}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d8db18 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d8db18\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a35eed\" data-id=\"7a35eed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26c3c40 elementor-widget elementor-widget-shortcode\" data-id=\"26c3c40\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2058\" class=\"elementor elementor-2058\" data-elementor-settings=\"[]\">\n\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6f5c11 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6f5c11\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d37673\" data-id=\"4d37673\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b78a80b animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b78a80b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information <span style=\"color:#8A8A8A ; \">Security<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d242caa elementor-widget elementor-widget-heading\" data-id=\"d242caa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Information Security Policy and Vision<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4a98ee4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a98ee4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c81f48b\" data-id=\"c81f48b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7666c8 elementor-widget elementor-widget-text-editor\" data-id=\"c7666c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t\t<p>1.Enhance employee awareness.<\/p><p>2.Prevent information leaks.<\/p><p>3.Implement routine O&amp;M.<\/p><p>4.Ensure service availability<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-647ee78 elementor-widget elementor-widget-heading\" data-id=\"647ee78\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Information Security Objectives<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-562b5f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"562b5f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c7c3f01\" data-id=\"c7c3f01\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2469db6 elementor-widget elementor-widget-text-editor\" data-id=\"2469db6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t\t<p>1.Organize information security training to increase employees&#8217; information security awareness and strengthen their knowledge of related responsibilities.<\/p><p>2.Protect information on the Company&#8217;s business activities from unauthorized access and modification to ensure its accuracy and integrity.<\/p><p>3.Conduct regular internal and external audits to ensure that all required operations are implemented.<\/p><p>4.Maintain a high level of system availability for the Company&#8217;s critical core systems.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a760b31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a760b31\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e504158\" data-id=\"e504158\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-291f5ed animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"291f5ed\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Structure and Responsibilities of the Information<span style=\"color:#8A8A8A ; \"> Security Committee<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c63ea5 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-phone elementor-widget elementor-widget-image\" data-id=\"9c63ea5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"500\" height=\"293\" src=\"https:\/\/tw.hannstarboard.com\/en\/wp-content\/uploads\/2020\/09\/Information-security-img.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/tw.hannstarboard.com\/en\/wp-content\/uploads\/2020\/09\/Information-security-img.jpg 500w, https:\/\/tw.hannstarboard.com\/en\/wp-content\/uploads\/2020\/09\/Information-security-img-300x176.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-716993e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"716993e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b2758b3\" data-id=\"b2758b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fb436c elementor-widget elementor-widget-heading\" data-id=\"9fb436c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Information Security Committee<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd385e6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cd385e6\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The Committee is composed of a task force headed by the Chief Information Officer of the Company who serves as the convener.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The heads of each business department are members of the Committee. If the head of a department is replaced, a replacement must be immediately assigned to process handover procedures.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1602026 elementor-widget elementor-widget-heading\" data-id=\"1602026\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Executive Secretary<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef1df5b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ef1df5b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The role of the Executive Secretary shall be filled by a member of the Information Technology Department designated by the convener.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16c9162 elementor-widget elementor-widget-heading\" data-id=\"16c9162\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Information Security Execution Team<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a431f22 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a431f22\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The Team is composed of a task force with a Team Leader and members assigned by the Committee. They are responsible for planning and executing information security operations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad0046b elementor-widget elementor-widget-heading\" data-id=\"ad0046b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Emergency Response Team<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043a63a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"043a63a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The Team is composed of a task force with a Team Leader and members responsible for key business procedures assigned by the Committee.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b726d0 elementor-widget elementor-widget-heading\" data-id=\"9b726d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Information Security Audit Team<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-444e7e2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"444e7e2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The team members are assigned by the Information Security Committee to take charge of the implementation of the information security management system.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a8dd2d8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a8dd2d8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8535a7b\" data-id=\"8535a7b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10404c7 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"10404c7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Specific Information<span style=\"color:#8A8A8A ; \"> Management Measures<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cafc8b3 elementor-widget elementor-widget-text-editor\" data-id=\"cafc8b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t\tThe Company established the Information Security Committee in April 2018 to enhance information security management. The Committee is responsible for reviewing the information security governance policies of the Company and its subsidiaries and overseeing information security management. We also hold regular ISMS management review meetings to review information security and governance-related issues and make continuous improvements to ensure the formulation and applicability of information security policies.<br>\n\n&nbsp;\n\n<br>The Chief Information Officer of the Company is responsible for the governance, planning, supervision, and implementation of information security operations to construct comprehensive information security defense capabilities and information security awareness of employees.\n<\/br>\n\n<br>Our information security strategy focuses on information security governance, legal compliance, and the use of technologies, from systems to technology and from personnel to organization to improve comprehensive capabilities in information security.<\/br>\n\n<br>In view of emerging threats in information security such as DDoS (Distributed Denial of Service) attacks, ransomware, social engineering attacks, and counterfeit websites, the Company regularly pays attention to information security issues and plans response strategies. We organize exercises for different information security scenarios to strengthen the response of our employees so that we can detect and block attacks immediately. We also organize regular information security audits (Communication and Operation Management System) such as vulnerability scanning or penetration tests to make sure that the information system and network environment meet safe implementation standards.<\/br>\n\n&nbsp;\n\n<br>As information security insurance is a new type of insurance policy and involves issues such as the information security rating and inspection institutions, claim forensic institutions, and conditions under which claims are not provided, the Company is currently considering whether the purchase of information security insurance is necessary. Our future goals are to complete information security regulations, conduct regular information security assessments, and obtain international information security certifications. We will continue to strengthen information security protection and establish joint defense mechanisms, especially in the training of talented information security personnel. The Company will regularly announce information security policies and organize arrange information security training every year.<\/br>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"folder":[],"_links":{"self":[{"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/pages\/2054"}],"collection":[{"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/comments?post=2054"}],"version-history":[{"count":21,"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/pages\/2054\/revisions"}],"predecessor-version":[{"id":4641,"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/pages\/2054\/revisions\/4641"}],"wp:attachment":[{"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/media?parent=2054"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/tw.hannstarboard.com\/en\/wp-json\/wp\/v2\/folder?post=2054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}