{"id":13037,"date":"2023-03-24T02:16:46","date_gmt":"2023-03-23T18:16:46","guid":{"rendered":"https:\/\/www.taroko.com.tw\/information-security-policy\/"},"modified":"2023-08-17T16:56:43","modified_gmt":"2023-08-17T08:56:43","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.taroko.com.tw\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13037\" class=\"elementor elementor-13037 elementor-5736\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52df419 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"52df419\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-e-bg-lazyload=\"\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-24d806c elementor-hidden-mobile\" data-id=\"24d806c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a8d902e\" data-id=\"a8d902e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1614a28 elementor-widget elementor-widget-heading\" data-id=\"1614a28\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Corporate Governance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e63148b elementor-widget elementor-widget-heading\" data-id=\"e63148b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Taroko<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27448f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27448f6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b87524\" data-id=\"5b87524\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b952ca1 elementor-widget elementor-widget-spacer\" data-id=\"b952ca1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2382c6e elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2382c6e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d804010\" data-id=\"d804010\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c0f2dc elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1c0f2dc\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Policy<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4161430\" data-id=\"4161430\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb7f0cd elementor-widget elementor-widget-text-editor\" data-id=\"eb7f0cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><a href=\"https:\/\/www.taroko.com.tw\/en\/\">Home<\/a> \/ Governance \/ Information Security Framework<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb00e45 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb00e45\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d17032\" data-id=\"4d17032\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b967921 elementor-widget elementor-widget-spacer\" data-id=\"b967921\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-59bbe7a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59bbe7a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4c12585\" data-id=\"4c12585\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6ac248 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e6ac248\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-bottom:0;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20914d2 elementor-widget elementor-widget-heading\" data-id=\"20914d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Information security risk management framework<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c28ce96 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c28ce96\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b12bb8 elementor-widget elementor-widget-text-editor\" data-id=\"3b12bb8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The authority and responsibility unit of the company&#8217;s information security is the information department, which has an information supervisor and several professional information engineers, who are responsible for formulating the company&#8217;s information security policy, planning information security measures, and implementing relevant information security operations.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9724f2 elementor-widget elementor-widget-image\" data-id=\"a9724f2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"634\" height=\"279\" src=\"https:\/\/www.taroko.com.tw\/wp-content\/uploads\/2023\/04\/\u8cc7\u901a\u5b89\u5168\u98a8\u96aa\u7ba1\u7406\u67b6\u69cb.jpg\" class=\"attachment-large size-large wp-image-12310\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.taroko.com.tw\/wp-content\/uploads\/2023\/04\/\u8cc7\u901a\u5b89\u5168\u98a8\u96aa\u7ba1\u7406\u67b6\u69cb.jpg 634w, https:\/\/www.taroko.com.tw\/wp-content\/uploads\/2023\/04\/\u8cc7\u901a\u5b89\u5168\u98a8\u96aa\u7ba1\u7406\u67b6\u69cb-300x132.jpg 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18f2680 elementor-widget elementor-widget-text-editor\" data-id=\"18f2680\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The audit office of the company is the audit unit of information security supervision, if the audit finds deficiencies, it immediately requires the inspected unit to propose relevant improvement plans and report them to the board of directors, and regularly tracks the improvement results to reduce internal information security risks.<\/p>\n<p>Every year, the accountant conducts an information operation review, and if it is found to be deficient, it will ask for improvement measures and track the improvement results.<\/p>\n<p>Based on the importance of information security, the responsible unit regularly reports to the board of directors on the governance and implementation of enterprise information security every year.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36e3f47 elementor-widget elementor-widget-heading\" data-id=\"36e3f47\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Information security policy and management plan<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0b9fd6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f0b9fd6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc987d8 elementor-widget elementor-widget-text-editor\" data-id=\"dc987d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In order to strengthen the security management of information and ensure the confidentiality, integrity and availability of information, and to avoid intentional or unexpected threats from internal and external threats, the company&#8217;s information security facilities and management methods are divided into six major items as follows:<\/p>\n<p>(1) Computer equipment security management<\/p>\n<p>1. The company&#8217;s application servers and other equipment are set up in the special computer room, the access control of the computer room is used by sensor card access, and the entry and exit records are kept for check.<\/p>\n<p>2. The computer room is equipped with independent air conditioning to maintain the operation of computer equipment in an appropriate temperature environment; And equipped with chemical fire extinguishers, which can be applied to general or electrical fires.<\/p>\n<p>3. The main machine room is equipped with uninterruptible power and voltage stabilization equipment, and is connected to the company&#8217;s own generator power supply system to avoid Taipower&#8217;s accidental instantaneous power failure caused by the system crashing, or to ensure that the operation of the computer application system will not be interrupted in the event of a temporary power failure.<\/p>\n<p>(2) Network security management<\/p>\n<p>1. Strengthen network control, the entrance to connect with the external network, and configure enterprise-level firewalls to block illegal intrusion by hackers.<\/p>\n<p>2. The connection operation between Taichung and Hsinchu computer room and Keelung office site to site uses data encryption to avoid illegal capture of data transmission process.<\/p>\n<p>3. Colleagues who log in to the company&#8217;s intranet to access the ERP system remotely must apply for a VPN account, and can log in and use through the VPN security method, and all have usage records that can be audited.<\/p>\n<p>(3) Virus protection and management<\/p>\n<p>1. The server and the computer equipment of the colleague terminal are installed with protection software, and the virus pattern adopts automatic update method to ensure that the latest virus can be blocked, and at the same time, it can detect and prevent the installation of potentially threatening system execution files.<\/p>\n<p>2. The antivirus system not only immediately isolates or deletes the viruses detected or intercepted, and actively issues infected and risky computer risk reports to facilitate management personnel to take corresponding actions.<\/p>\n<p>(4) System access control.<\/p>\n<p>1. The use of each application system by colleagues shall be accessed by the information unit through the system authority application procedure stipulated by the company and approved by the authority supervisor, and authorized by each system administrator according to the applied functional authority.<\/p>\n<p>2. The password setting of the account stipulates the appropriate strength and number of words, and must be mixed with numbers and special symbols in order to pass.<\/p>\n<p>3. When colleagues go through the procedures for leaving (suspending) from their posts, they must handle the information unit and delete the accounts of each system.<\/p>\n<p>(5) Ensure the stable operation of the system.<\/p>\n<p>1. System backup: build a backup system, adopt a regular backup mechanism, in addition to uploading a copy of the backup host in the computer room, the backup host 2 in the computer room and the backup host in the Hsinchu computer room are stored separately to ensure absolute security.<\/p>\n<p>2. Disaster recovery drill: Each system implements a drill once a year, after selecting the reference point of the restore date, the backup media is stored back to the system host, and then the user unit confirms the correctness of the reply data in writing to ensure the correctness and validity of the backup media.<\/p>\n<p>3. Lease two data lines of the telecommunications company, through bandwidth management equipment, the two lines are connected in parallel for backup use to ensure uninterrupted network communication.<\/p>\n<p>(6) Information security advocacy and education and training<\/p>\n<p>1. Regularly advocate. Require colleagues to change the system password regularly to maintain account security.<\/p>\n<p>2. Lecture advocacy. Information security-related education and training courses are conducted for internal colleagues from time to time every year<\/p>\n<p>3. Invest resources in information security management<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5480132 elementor-widget elementor-widget-heading\" data-id=\"5480132\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. In order to implement the six major information security policies, the resources invested are as follows:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93a7013 elementor-widget elementor-widget-text-editor\" data-id=\"93a7013\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>(1) Network hardware equipment such as firewalls, email anti-virus, network management collection lines, etc.<\/p>\n<p>(2) Software systems such as backup management software, VPN authentication, etc.<\/p>\n<p>(3) Telecommunication services such as multiple lines, host backup services, intrusion prevention services, etc.<\/p>\n<p>(4) Invest manpower such as: daily system status check, weekly regular backup and implementation of remote storage of backup media, at least twice a year information security advocacy education courses, annual system disaster recovery drills, annual internal audit of information circulation, accountant audit, etc.<\/p>\n<p>(5) Information security manpower: set up information security supervisors and information security personnel, responsible for information security structure design, information security maintenance and monitoring, information security incident response and investigation, information security policy review and revision, and the information security supervisor reports to the board of directors at least once a year.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ed6f39c\" data-id=\"ed6f39c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5dd1873 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5dd1873\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1202814 elementor-widget elementor-widget-heading\" data-id=\"1202814\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Corporate Governance Contact<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7fed7d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a7fed7d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fe9d7b elementor-widget elementor-widget-text-editor\" data-id=\"6fe9d7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Spokesperson<\/strong><br \/>General Counsel \/ Hsu Yung-Chang<br \/>Email: jerryhsu.trk@gmail.com<\/p>\n<p><strong>Acting Spokesperson<\/strong><br \/>Equity Manager \/ Kelly Lo<\/p>\n<p>Phone: 04-36118888#6661<br \/>Email: kelly.lo@trkmall.com.tw<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d004ae3 elementor-widget elementor-widget-heading\" data-id=\"d004ae3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reporting and Complaint Mailbox<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7512739 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7512739\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b55c922 elementor-widget elementor-widget-text-editor\" data-id=\"b55c922\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Email: jessie.li@trkmall.com.tw<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-750e4b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"750e4b8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c81ae9\" data-id=\"2c81ae9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8cc8937 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8cc8937\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b0b50e5\" data-id=\"b0b50e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44f1122 elementor-widget elementor-widget-spacer\" data-id=\"44f1122\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Corporate Governance Taroko Information Security Policy Home \/ Governance \/ Information Security Framework 1. Information security risk management framework The authority and responsibility unit of the company&#8217;s information security is the information department, which has an information supervisor and several professional information engineers, who are responsible for formulating the company&#8217;s information security policy, planning information [&#8230;]\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/pages\/13037"}],"collection":[{"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/comments?post=13037"}],"version-history":[{"count":7,"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/pages\/13037\/revisions"}],"predecessor-version":[{"id":15128,"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/pages\/13037\/revisions\/15128"}],"wp:attachment":[{"href":"https:\/\/www.taroko.com.tw\/en\/wp-json\/wp\/v2\/media?parent=13037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}