top of page

Information Security Management 

為保障資訊安全,要求有資訊源認證、訪問控制,不能有非法軟體駐留,不能有未授權的操作等行為

ALFOT-LOGO加柏01小小 拷貝_edited.png

   Information Security Policy Announcement

 

   ALFOT Technologies Co., Ltd. (hereinafter referred to as "the Company") is committed to enhancing information security management,                  ensuring the confidentiality, integrity, and availability of its information assets to provide an information environment for the continuous                    operation of the Company's information business. This complies with the related regulations  to protect itself from intentional or accidental          threats, both internal and external. The policy sets forth the following provisions.

 

   1.Vision and Objectives of Information Security:

   1.1 Enhance awareness of staffs to avoid data leakage.

   1.2 Implement daily operations to ensure service availability.

 

   2. Based on Vision of Information Security Policy, the following information security objectives are formulated:

   2.1 Conduct information security training to promote the awareness of information security to staffs and strengthen their understanding of                   related responsibilities.

   2.2 Protect the company's business activity information to prevent unauthorized access and modification, ensuring its  accuracy and integrity.

   2.3 Perform regular internal audits to ensure proper implementation of the related operations.

   2.4 Ensure that the company's critical core systems maintain a certain level of system availability.

 

   Information Security Policy of Supplier Relationships:

 

   1.Outsourced suppliers should provide system maintenance, contact windows and phone no. of consulting services,resolving system-related             issues, and cooperating with the company's procedures for non-conformity troubleshooting and  reporting. If necessary, on-site services                 should be provided.

 

   2.Outsourced suppliers should comply with the company's confidentiality principles. In the event that personnel from the outsourced supplier            come into contact with the company's "confidential" level (or higher) data during the service provision,they must adhere to relevant laws and          regulations as well as the company's related provisions, and sign a confidentiality agreement (4-60012).

 

   3.The software used by outsourced suppliers must be legal, without violating intellectual property rights. In case of any violations, the                        outsourced supplier shall bear all legal responsibilities.

 

   4.The company has the right to audit the tools, software, and execution records for their processing operations used by outsourced suppliers,          and the supplier shall not object.

 

   5.Outsourced suppliers should keep the records of non-conformity handling, which may be subject to inspection as needed by the company.

 

   6.In the event that the deliverables provided by the outsourced supplier infringe upon the legitimate rights and interests of a third party, the                outsourced supplier shall be responsible for handling the matter and all legal consequences.

 

   7.If the negligence of duty of outsourced supplier's employees causes loss or damage to the company, the outsourced supplier shall be liable          for all compensation.

 

   8.When the development of related systems or responsible personnel of the outsourced supplier leave, they must return the borrowed                      equipment, software, and operational permissions.

 

   9.Outsourced supplier personnel must not disclose information classified as "restricted" level (or higher) during all activities regarding to                    business collaboration.

 

  10.When the information is with "restricted" or higher level needs to be transmitted, processed or stored, it should refer to the encryption-related         specifications from the "Communication and Operation Management Procedures" (2-6007).

bottom of page