Information Security Management
|
Information Security Risk Management Framework |
|
|
Information Security Mechanisms |
To safeguard the Company’s and customers’ trade secrets, data is classified and graded. Access to networks, computers, and personnel is strictly controlled. EMC has established three major information security management objectives:
- Information Equipment Security Management
Regularly conduct information asset inventories
Implement a “data not landing on local devices” architecture
Enforce file access rights management
Deploy Security Information and Event Management (SIEM) system for log monitoring
Strengthen authentication with Multi-Factor Authentication (MFA)
Conduct backup and restoration drills every six months
In 2024, four backup and recovery drills were performed across EMC (Taiwan), EMC (Kunshan), Zhongshan EMC, and EMC (Huangshi), including cross-site failover of critical equipment/services and verification of backup data restoration.
- Network and Antivirus Management
To defend against cyberattacks and malicious intrusions, EMC has deployed:
Next-generation firewalls
Intrusion prevention systems
Advanced threat protection systems
Endpoint detection and response (EDR)
Industrial control and production line network security monitoring
Host-based deep defense systems to block zero-day exploits
The Company continuously acquires external threat intelligence, integrates it with existing security systems for automated detection and blocking of malicious behavior, performs monthly vulnerability scans and patching, and uses a network cybersecurity risk management system for ongoing risk assessment. External professional security firms are regularly engaged to conduct penetration testing, identify blind spots, and strengthen the overall secure operating environment.
- Employee Information Security Education and Training
All new hires receive mandatory information security orientation. Regular awareness campaigns, training sessions, and social engineering (phishing) simulation exercises are conducted to heighten employees’ awareness of customer privacy and confidential information.
| Cybersecurity Incident Reporting Process and Incidents |
When a cybersecurity incident occurs, employees must follow the EMC Cybersecurity Incident Reporting and Response Procedure to immediately notify the highest-ranking information security officer. The responsible unit classifies and grades the incident and takes appropriate control measures to resolve it in the shortest possible time.
From 2022 to 2024, EMC has not violated any information security regulations and has recorded zero information security incidents.
| Specific Management Measures |
The Company strictly implements physical and environmental security, network and computer security, system access control, system continuity, and employee security awareness training in accordance with established procedures. The Internal Audit Office serves as the supervisory unit for information security, regularly audits execution status, requires responsible units to propose improvement plans for any deficiencies identified, and tracks improvement progress to reduce internal risks.
To further strengthen information security risk management, the 2024 annual cybersecurity continuous improvement items were reported to the Board of Directors on December 23, 2024.
EMC has a dedicated information security team consisting of one Information Security Officer and one dedicated staff member. Monthly meetings are held to review information security policies and implementation details.