Custom Design
OLED with RS232
RS232 RS485 Uart Display
TFT MCU solution
COB Character
COB Graphic
COG Character
COG Graphic
OLED LCM
TFT LCM
OCA Optical Bonding Service
TAB LCM
TEST Board
Product
List
> Information Security Policy
Information Security Policy
 
1. Information security is the common responsibility for all employees in the company. Employees at all levels must fully 
understand and implement their own responsibilities.
 
2. In order to maintain the security of the overall information assets, the establishment of information security goals, cognition 
and action criteria must take into consideration:
 
2.1 Establish a complete information security organization;
 
2.2 Asset management;
 
2.3 Ensure the safety of human resources;
 
2.4 Ensure the safety management of entities and environments;
 
2.5 Ensure the safety of communication and operation management;
 
2.6 Ensure the establishment of a secure access control management mechanism;
 
2.7 Ensure the security of information system acquisition, development and maintenance management;
 
2.8 Ensure the perfect handling of information security incidents;
 
2.9 Ensure the continuous management of business operations;
 
2.10 Cryptography being implemented securely;
 
2.11 Ensure the safe operation of information facilities;
 
2.12 Ensure information security management of suppliers;
 
2.13 Ensure the compliance and review of information security regulations;
 
2.14 Fulfill the Commitment in order to meet applicable requirements related to information security.
 
3. The establishment and maintenance of the information security management system is completely based on the requirements of 
laws and regulations and the security responsibility of the contract, and is combined with the company's enterprise risk 
management background.
 
4. In order to effectively manage and control information security risks, it is necessary to establish and implement risk assessment 
and operation management procedures including risk assessment methods, information security legal and regulatory requirements, 
risk acceptance standards, and risk acceptability.
 
5. Formulate the operation continuation plan of information security and practice it in practice to ensure the continuous operation 
of the information business.
 
6. Clearly regulate the use rights of information systems and network services to prevent unauthorized access.
 
7. Establish physical and environmental safety protection measures for the computer room, and perform relevant maintenance on 
a regular basis.
 
8. Implement information security education and training, publicize information security policies and related implementation 
regulations.
 
9. Establish a management mechanism for information hardware facilities and software to coordinate allocation and effectively 
use resources.
 
10. The new information system should incorporate information security factors before construction to prevent the occurrence 
of situations that endanger system security.
 
11. The information security policy should be evaluated regularly to reflect the latest status of information security management, 
laws, technology and the company's business, and to ensure the feasibility and effectiveness of the company's information 
security practices.
 
12. Ensure information security measures for mobile devices and remote use to manage the risks caused by the use of mobile devices.    
Include protection of information accessed, processed or stored in remote workplaces.
 
 
13. Provide the basis and direction for setting information security goals.