公司:
中國信託商業銀行股務代理部
電話:
We use cookies to improve your user experience and for web traffic statistics purposes. By continuing to use this website, you agree to our use of cookies. Our Privacy & Cookie Policy contains more information on such use and explains how to disable cookies.
Information Security
To conform with standard information security system framework of ISO27001, VisEra has built a sound system not only to promote information security but also to protect and maintain customer's design and related information. VisEra improves continuously to meet the objectives of following information security policy requirements.
  1. To establish and implement Information Security Management System.
  2. To comply with Information security requirements of contract and policy.
  3. Risk assessment for objectives setting and control measurement to continue improving information security.
  4. To guide the information security requirements to employees and relevant parties.
Information Security Committee
In order to maintain the company's competitiveness and reduce the risk of business interruption, ensure that the information system meets the requirements of confidentiality, integrity and availability, strengthen employees' awareness of information security, and establish an "Information Security Committee" to implement and promote information security management operations.
 
           information security committee
Information Security Risk Management
  • The Company assigns a dedicated information and communication security management and a dedicated information security personnel to promote, coordinate, monitor, and review all matters involving information security, to establish an organization responsible for information security incidence reporting and emergency response, to identify information security risks, and to implement improvement measures to mitigate information security risks.
  • In 2011, the Company established internal regulations for information security management pursuant to ISO/IEC 27001-Information technology-Security techniques-Information security management systems-Requirements, against which the Company was audited and qualified by the third party and will be re-audited every year.
  • Information security protection measures are implemented at the demilitarized zone (DMZ) server (i.e. the server open to outsiders), office, data center, product lines, and cloud service center, and improved. KPIs for relevant control measures and a daily monitoring mechanism are established.
  • The Company participates in information security sharing organization to obtain information security alert, threat, and vulnerability.
  • In accordance with Enterprise Risk Management (ERM) regulations, we establish a script of possible information security incidents and corresponding contingency, prevention, and exercise plans.
  • Perform regular penetration tests and vulnerability scans to fix relevant vulnerabilities to reduce security risks.
  • The Company regularly holds information security training and promotion, as well as social engineering drills to improve information security awareness.
  • Enhance endpoint protection and introduce managed threat detection and response (MDR) service.
  • Construct a source code scanning platform to eliminate information security vulnerabilities at the source and reduce the risks caused by information system source code vulnerabilities.
ISO27001 Standard PDCA Model
pic
ISO27001