{"id":19708,"date":"2023-11-24T14:37:39","date_gmt":"2023-11-24T06:37:39","guid":{"rendered":"https:\/\/www.tejwin.com\/?page_id=19708"},"modified":"2023-12-06T15:24:05","modified_gmt":"2023-12-06T07:24:05","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.tejwin.com\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"19708\" class=\"elementor elementor-19708 elementor-19563\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ba258b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6ba258b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3526657\" data-id=\"3526657\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19973c8 elementor-widget elementor-widget-html\" data-id=\"19973c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"blog_hero\">\n  <div class=\"container\">\n    <div class=\"blog_hero_main\">\n      <h1 class=\"blog_hero_main_title\">Information Security Policy <\/h1>\n    <\/div>\n  <\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a662a09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a662a09\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-766128db\" data-id=\"766128db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eacec90 anyEditor elementor-widget elementor-widget-text-editor\" data-id=\"eacec90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW30150363 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30150363 BCX0\">This policy is formulated <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">to<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\"> ensure the confidentiality, integrity<\/span><\/span><span class=\"TextRun SCXW30150363 BCX0\" lang=\"ZH-TW\" xml:lang=\"ZH-TW\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30150363 BCX0\">,<\/span><\/span><span class=\"TextRun SCXW30150363 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30150363 BCX0\"> and availability of the information assets owned by <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">Taiwan Economic Journal Co. Ltd.<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\"> (referred to as the &#8220;<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">TEJ <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">Company<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">&#8220;), to <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">comply with<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\"> the requirements of relevant laws and regulations, and to protect them from internal and external deliberate <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">o<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">r unexpected threats <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">while <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">considering<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\"> the <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">TEJ <\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">Company<\/span><span class=\"NormalTextRun SCXW30150363 BCX0\">&#8216;s business needs<\/span><\/span><span class=\"TextRun SCXW30150363 BCX0\" lang=\"ZH-TW\" xml:lang=\"ZH-TW\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30150363 BCX0\">.\u00a0<\/span><\/span><span class=\"EOP SCXW30150363 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun SCXW49103684 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW49103684 BCX0\">1. Scope of application<\/span><\/span><span class=\"EOP SCXW49103684 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW186282584 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186282584 BCX0\">Our employees, institutions, individuals, outsourced service providers<\/span><\/span><span class=\"TextRun SCXW186282584 BCX0\" lang=\"ZH-TW\" xml:lang=\"ZH-TW\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186282584 BCX0\">,<\/span><\/span><span class=\"TextRun SCXW186282584 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186282584 BCX0\"> and third-party users who <\/span><span class=\"NormalTextRun SCXW186282584 BCX0\">access<\/span><span class=\"NormalTextRun SCXW186282584 BCX0\"> our business information must abide by this information security policy.<\/span><\/span><\/p>\n<h2><span class=\"TextRun SCXW182687149 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW182687149 BCX0\">2. Information security goals<\/span><\/span><span class=\"EOP SCXW182687149 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To maintain the confidentiality, integrity<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and availability of the TEJ<\/span> <span data-contrast=\"auto\">Company&#8217;s information assets and protect the security of user data privacy, we hope to achieve the following goals through the implementation of this policy:\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Protect the security of the TEJ Company&#8217;s business services and ensure that only authorized personnel can access information to ensure its confidentiality.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Protect the security of the TEJ Company&#8217;s business services and avoid unauthorized modifications to ensure their correctness and integrity<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Establish the TEJ Company&#8217;s business continuity plan<\/span> <span data-contrast=\"auto\">to ensure the continued operation of the TEJ Company&#8217;s information business services.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensure that the execution of the TEJ Company&#8217;s various business services must comply with the requirements of relevant laws or regulations.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">To evaluate the achievement of information security goals, information security management indicators are specifically formulated and measured regularly to verify the effectiveness of ISMS implementation.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun SCXW190407224 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW190407224 BCX0\">3. Responsibility<\/span><\/span><span class=\"EOP SCXW190407224 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<ol>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Management should actively participate in and support the Information Security Management System and implement this policy through appropriate standards and procedures.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The TEJ Company should establish an information security organization to promote information security matters.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Important information assets should be regularly inspected, classified<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and assessed regarding their risks, and appropriate protective measures should be implemented accordingly.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Access rights to critical information facilities should be differentiated, and relevant rights should be granted based on personnel positions. Encryption, decryption<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and identity authentication mechanisms may be adopted when necessary to enhance the security of information assets.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Relevant personnel should receive information security education, training<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and government announcements to improve information security awareness.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">There must be complete reporting and response measures for information security incidents to ensure the continued operation of information systems and businesses.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">An information security business continuity plan should be formulated and conducted regularly to ensure that essential systems and companies can resume operations within the scheduled time when a disaster occurs.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Regularly perform information security audits to review access rights and the implementation of information security management systems.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Any behavior that endangers information security will be investigated for civil, criminal<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and administrative liability depending on the severity of the case or will be dealt with by the TEJ Company&#8217;s relevant regulations.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf06c\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:480,&quot;335559991&quot;:480,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf06c&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">This policy is evaluated at least once a year and revised based on business changes, technological developments<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and risk assessment results.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ol>\n<h2><span class=\"TextRun SCXW260714292 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW260714292 BCX0\">4. Needs and expectations of <\/span><span class=\"NormalTextRun SCXW260714292 BCX0\">interested parties<\/span><\/span><span class=\"TextRun SCXW260714292 BCX0\" lang=\"ZH-TW\" xml:lang=\"ZH-TW\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW260714292 BCX0\">\u00a0<\/span><\/span><span class=\"EOP SCXW260714292 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span class=\"NormalTextRun SCXW27336193 BCX0\">The resolution<\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">s<\/span><span class=\"NormalTextRun SCXW27336193 BCX0\"> of the <\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">TEJ <\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">Company<\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">&#8216;s information security management system should be included in the information security committee management review meeting report, and the meeting minutes will be <\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">submitted<\/span><span class=\"NormalTextRun SCXW27336193 BCX0\"> to the competent authority when necessary. <\/span><span class=\"NormalTextRun SCXW27336193 BCX0\">Suppose the information security committee, the competent authority (or the requirements of laws and regulations), experts and scholars, and other interested parties have information security-related feedback. In that case,<\/span><span class=\"NormalTextRun SCXW27336193 BCX0\"> they should be included in the discussion topics of the management review meeting.<\/span><\/p>\n<h2><span class=\"TextRun SCXW31005846 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW31005846 BCX0\">5. Review<\/span><\/span><span class=\"EOP SCXW31005846 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">This policy should be reviewed by the Information Security Committee at least once a year to reflect the latest developments in government laws, technology, and business to ensure the TEJ Company&#8217;s ability to operate its business sustainably<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun SCXW147600987 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW147600987 BCX0\">6. Implementation<\/span><\/span><span class=\"EOP SCXW147600987 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW136828357 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW136828357 BCX0\">This policy will be implemented after approval by the Board of Directors, and the same applies when revised.<\/span><\/span><span class=\"EOP SCXW136828357 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security Policy This policy is formulated to ensure the confidentiality, integrity, and availability of the information assets owned by Taiwan Economic Journal Co. Ltd. (referred to as the &#8220;TEJ Company&#8221;), to comply with the requirements of relevant laws and regulations, and to protect them from internal and external deliberate or unexpected threats while considering [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"class_list":["post-19708","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/pages\/19708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/comments?post=19708"}],"version-history":[{"count":7,"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/pages\/19708\/revisions"}],"predecessor-version":[{"id":19716,"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/pages\/19708\/revisions\/19716"}],"wp:attachment":[{"href":"https:\/\/www.tejwin.com\/en\/wp-json\/wp\/v2\/media?parent=19708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}