The company has formulated "Information Security Management Measures". The Information Security Conference is responsible for establishing an information security risk management framework, formulating information security policies and specific management plans, and the head of the information department serves as the convener of the information security meeting to coordinate and manage information security related matters. The information security policy and specific practices are as follows:

☆The connection between the external network and the company LAN must go through the computer room network equipment and must be authorized by the firewall.

☆There are at least two external lines to ensure that the backup line can still operate when a single line is interrupted.

☆All computers should install anti-virus software and update the anti-virus code regularly.

☆Users and information personnel are not allowed to execute files, mails, and software from unknown sources to prevent viruses or install Trojan-horse programs.

☆The mail server has the ability to scan viruses and remove spam as the first protection.

☆System administrators should check the operating system or software security update programs from time to time, and establish a system-update notification platform, and colleagues should update as soon as possible when they receive update notifications.

☆Colleagues should store important personal data in the company's personal computer and the server host for the colleague to store the data in two places to achieve the backup effect.

☆Information personnel should regularly back up system and database files, and copy the backup files to a USB external hard disk for proper storage.

☆Information personnel should always check the firewall, mail server and system log records, and deal with abnormal situations immediately.

☆When the information staff found an account that has not been used for a long time, the account will be disabled first, and will be deleted or opened after the reason is found out.

☆When there are concerns about password leakage, the information personnel should change the password.