- Strengthen prevention for risk control.
- Strengthen the information security framework.
winway
To protect the information security of internal and external stakeholders, WinWay provides a highly secure environment. We have built an information security management system that complies with global information security standards to strengthen the security management of various information assets, ensuring confidentiality, integrity, and availability. The Company has also established a safe and dependable operating environment to ensure information security, system security, equipment security, and network security, protecting the interests of the Company's employees and related internal and external personnel.
The Company established the Information Security Committee, with the president serving as the Chief Information Security Officer and convener. Managers at various levels serve as the committee members. An implementation team, emergency response team, and audit team have been established under the committee. The committee is responsible for reviewing the information security policy governance, planning, supervision, and implementation of various operating units, in order to establish information security protection and good information security awareness among employees. The committee reports the annual implementation status to the Board of Directors regularly every year.
To maintain overall information security and trade secrets management, the Company has specifically formulated the information security strategy:
Information security management type | Related operations |
---|---|
System accessibility |
|
External threats |
|
Access management |
|
Access control |
|
Conduct information security health check-ups and survey potential risks with the goal of meeting international standards, and make improvements according to risk severity, thereby reducing the losses caused by information security incidents to the Company.
Avoid becoming a springboard for hackers to attack corporate customers.
Protect customers' and corporate intellectual property rights.
Satisfy the requirements of laws and regulations (Personal Data Act, Trade Secrets Act, and EU's General Data Protection Regulation (GDPR)) through the operation of the information security management system and ISO 27001 certification.