Information Security Policies and Management
The information security management mechanism includes the following:
1. System specification: formulate the IS management system and standardize personnel operations.
2. Technology application: build IS management equipment and implement IS management measures.
3. Personnel training: conduct IS education and training to enhance the awareness of IS of all colleagues.
Information Security Measures
- TTY conducts regularly reviews on internal information security regulations, and report to the Audit Committee. Based on system standardize, technology application, personnel training to conduct the implementation. The company also complies with the ISO 27005 Risk Assessment Principles, analyzes the internal risk level based on asset value, weakness, threat and impact, and uses the risk assessment results to formulate security measures to improve and enhance the overall information security environment.
- Technology application to prevent the information security threats by establishing relevant IT Preventive System to improve the environmental security. To ensure the operating behavior of the internal staffs are followed the Company's regulation, the implementations are as follows: external threats, permission management, access control and system availability.
- TTY regularly implements information security education and training for new employees quarterly, and several online E-Learning courses to enhance the information security knowledge and professional skills of internal employees. All new employees trained in 2024 were 100% completed the online courses.
Investment in information security management
In the post-epidemic era, global companies are still being attacked by hackers with different intrusion methods. TTY will carry out overall planning from six important directions including: equipment security, external connection access, Internal network control, professional information security testing, implement preventive drills, and personnel information security awareness.
In addition to the above-mentioned management to ensure information security, we assess the possibility plan to apply ISO 27001. Through this strict system, the operations and procedures can be perfected, and the certification allows our compliance with international regulations.