Information Security Policy
To maintain the smooth operation of information systems, information services, and network status, reduce risks such as human error, intentional or natural disasters, prevent unauthorized access, use, control, disclosure, destruction, alteration, deletion, or other infringements, and ensure the confidentiality, integrity, and availability of information assets, this Information Security Policy is established.
Last updated: 2024-05-15
1.
- Formulate various information security management regulations in accordance with government laws and regulations (such as the Information Security Management Act and related regulations).
2.
- Pay attention to the development trends of information security, identify internal and external issues, and interact with the needs and expectations of stakeholders, analyze risks, formulate response strategies, and take measures to reduce their impact on operations.
3.
- Establish an information security organizational structure, assign duties and responsibilities, and promote protective work and fulfill management responsibilities.
4.
- Implement information security education and training to ensure that employees understand their information security responsibilities and enhance their awareness of protection.
5.
- Regularly inventory information assets, utilize risk assessment mechanisms, and effectively control impact factors.
6.
- Strengthen physical and equipment protection, perform regular maintenance and upkeep to ensure normal operation.
7.
- Establish network transmission rules to protect sensitive document information and prevent unauthorized access and tampering.
8.
- Implement information security audits, review and identify problems, propose countermeasures, and take corrective actions.
9.
- Through emergency response plans, regularly conduct drills, prepare for emergencies, and quickly restore operations.
10.
- Outsourced vendors and personnel must sign a confidentiality agreement before performing information-related operations.
11.
- The information security policy should be periodically evaluated to reflect the latest conditions of information security management, laws, technologies, and operations, and ensure the feasibility and effectiveness of information security practices.
If you have any questions about the privacy policy, please send an email to support@ap-mic.com