Cyber Security Management

To improve the cyber security governance and defense capabilities, the Company has established an internal control system. All information operations are subject to the internal control system and the risk management review by the internal and external units on a regular and daily basis.

[Cyber Security Governance System, Goals and Strategies]

To enhance its cyber security management, Weltrend adopts an effective cyber security defense network as its vision, focusing on a consistent cyber security governance system. The Information Security Department oversees the establishment and compliance of the security system, driving the implementation of relevant practices while continuously improving security awareness and expertise. By leveraging technology, security risks and vulnerabilities are identified and strengthened, building a comprehensive governance system and all-around protection capability, while fostering a strong awareness of cyber security among employees. 

[Implementation of Cyber Security Policy]

  1. Establish cyber security management regulations that comply with legal and customer requirements.
  2. Promote organization-wide awareness to achieve consensus on comprehensive security protection.
  3. Safeguard the confidentiality, integrity, and availability of company and client information to ensure business continuity.


[Information Security Structure]

test

  1. Information Security Management Committee: Led by the company's President and comprised of unit managers (or their deputies), this committee is responsible for decisions regarding the information security management system, reviewing security policies, and designing the management structure and functions. It also examines and reviews the development, implementation, and execution of the Company's overall information security management system, and regularly reports on the status of information security governance to the chairman and the board.
  2. The Management Information Department is responsible for cyber security risk management, executing security policies, training personnel, implementing and auditing security measures, and improving internal procedures based on audit results.
  3. The Audit Office oversees cyber security supervision, ensuring internal security is properly executed. If any deficiencies are found during audits, the relevant unit is required to submit improvement plans and specific actions, with progress monitored to reduce internal security risks.

[Cyber Security Management Plan]

The Company has established a Cyber security management plan for all employees to follow:

  1. Develop a management plan covering email control, firewall setup, antivirus software, system program access control, and internet intrusion protection. Regularly check the System Log of each network service item to track the abnormal situation
  2. Assign different access levels based on employee roles, continuously promoting security information to increase awareness. intrusion protection. Regularly check the System Log of each network service item to track the abnormal situation.
  3. Regularly exercise the system for restoration every year and review emergency response plans.
  4.  Perform annual internal audits, accountant reviews, and ISO audits to strengthen security management.
  5. Join TWISAC/SPISAC/TWCERT to receive and share critical threat intelligence and stay updated on current trends.

[Information Security Incidents]

test

The Company has established clear procedures for reporting and handling information security incidents. When an incident is reported or discovered, the information department logs it, classifies its severity, and resolves it within the targeted timeframe. After resolving the incident, a root cause analysis is conducted, and corrective measures are implemented to prevent recurrence.

[Resources Invested in Cyber Security Management]

Implementation status in 2024


  • Continue to invest resources in information security-related fields. Resource investment includes improving governance and technical infrastructure, strengthening information security defense equipment, endpoint monitoring threat systems, intelligence monitoring and analysis, information security incident response drills and education training, etc. Related matters
  • In order to deepen information security and confidential information protection, we will continue to strengthen management systems and technologies. This year, we will add vulnerability scanning to review the security status of the company's network and systems to enhance information security capabilities and protect the company's important information assets.
  • The company has set up an information security management committee and a dedicated information security staff. The committee has 10 members. Among the dedicated information security staff, there is one information security officer and two information security personnel.
  • In terms of information security risk management, conduct an annual inventory of information security assets, and set execution priorities based on the size of the risk impact and improvement costs.
  • Accepted 2 annual audits by external risk management agencies this year.
  • In terms of information security promotion, we regularly conduct information security promotion and send related promotions to colleagues 4 times every quarter. We also send 19 emails to promote information from time to time in response to information. The content includes reminding colleagues to pay attention to phishing letters, pay attention Issues related to the importance of backup data and passwords.
  • In response to the revision of the "Information Security Management and Control Guidelines for Listed Over-the-Counter Companies", in addition to revising the order of provisions, sections 23, 24, 25, and 34 have been revised, and the company's information security operating standards have also been revised, sections 5.3.6 and 5.5. 3 points.
  • The dedicated information security unit receives 3 times of information security education and training, holds an Information Security Management Committee meeting once a year, and conducts an information security governance implementation report at the meeting. Relevant information is also submitted to the board of directors for reporting.
  • There were no incidents that endangered the company’s information security in 2024.

TOP

Subscription

Newsletter Subscription

Please enter your email to receive our e-newsletters

Confirm

If you want to unsubscribe from the mailing list, click unsubscribe

Newsletter

Unsubscribe from e-mail...

Please enter your email toUnsubscribe Newsletter

Confirm

Hint

unsubscribe

You have successfully unsubscribed from the newsletter

CLOSE

Search

Site Search

Keyword search for products or news center & events

Recommended keywords

  • USB PD

  • Motor Controllers

  • AC/DC

  • WT6633P

  • WT51FM24

  • Quarterly Results

  • Monthly Sales

  • GaN

  • Careers

  • ESG

Modal4

Privacy Policy

Privacy Policy

You are very welcome to visit (hereinafter referred to as this website). In order to allow you to use the services and information of this website safely, we hereby explain to you the privacy protection policy of this website to protect your rights and interests. Please Read the following in detail:

  • Collection, processing and use of personal information

    • Privacy protection policy content, including how this website handles personally identifiable information collected when you use website services.
    • The privacy protection policy does not apply to related linked websites other than this website, nor does it apply to people who are not entrusted by or involved in the management of this website.
  • data collected and used

    In order to provide you with the best interactive services on this website, you may be asked to provide relevant personal information, the scope of which is as follows:

    • When you use interactive functions such as service mailboxes and questionnaires, this website will retain the name, email address, contact information, usage time, etc. you provide.
    • Pictures on this site are provided by istock and Weltrend
    • During normal browsing, the server will record relevant actions on its own, including the IP address of the connecting device you use, usage time, browser used, browsing and click data records, etc., as a reference for us to improve website services. This record is for internal use and will never be released to the public.
    • In order to provide accurate services, we will conduct statistics and analysis on the collected questionnaires, and the analysis results will be presented as statistical data or explanatory text. In addition to being used for internal research, we will publish the data and explanatory text as necessary, but Information that does not relate to specific individuals.
    • Unless we obtain your consent or other special provisions of laws, this website will never disclose your personal information to third parties or use it for other purposes other than the purpose of collection.
  • Data protection

    • The hosts of this website are equipped with firewalls, anti-virus systems and other related information security equipment and necessary security measures to protect the website and your personal information. Strict protection measures are adopted. Only authorized personnel can access your personal information. All relevant personnel handling the data have signed confidentiality contracts. Anyone who violates confidentiality will be subject to relevant legal sanctions.

    If it is necessary to entrust relevant units of this department to provide services due to business needs, this website will also strictly require them to comply with confidentiality obligations and take necessary inspection procedures to ensure that they will indeed comply.

  • External links to the website

    • The web pages of this website provide Internet links to other websites. You can also click to enter other websites through the links provided by this website. However, the privacy protection policy of the linked website does not apply to this website. You must refer to the privacy protection policy of the linked website.
  • Use of Cookies

    • n order to provide you with the best service, this website will place and access our cookies on your computer. If you do not want to accept the writing of cookies, you can set the privacy level in the browser function you are using. If it is high, you can refuse the writing of cookies, but this may cause some functions of the website to not perform properly.
  • Amendments to the Privacy Policy

    • The privacy protection policy of this website will be revised at any time in response to needs, and the revised terms will be posted on the website.