In Jul., 2021, the Company established "Information Security Committee" with the Vice President Administration serving as the Director. The Committee follows information security policies to regular establish/review various guidelines and goals for information security management and to supervise implementation of information security policies. The aim is to build our capability in ensuring security of information and cultivate employees' information security competence. In the beginning of each year, we report to the Board of Director about the implementation of information security policies of the previous year. In 2021, the information security report has been submitted on the Board of Director on Mar. 22, 2022. |
||||||||
Information Security Policies | ||||||||
|
||||||||
ISO27001 Certificate (Valid from Nov. 26, 2021 to Nov. 25, 2024) | ||||||||
![]() ![]() |
||||||||
Information Security Risk Management Structure & Operation | ||||||||
Structure of Information Security Risk Management | ||||||||
1.The Company has established Information Security Committee. It follows information security policies to regularly establish/review various principles and guidelines for information security. 2.Information Communication Security Committee Organization (1)Information Security Committee: the Vice President Administration serves as the Director of the Committee. Members are divided into several groups. The Vice Presidents/ Division Directors/ Office Chiefs are members of the units that are mainly in charge of constructing, promoting, supervising, and managing information security work. The Committee members: Vice President Administration, Vice President Military Aircraft, Vice President Helicopter, Chief of Chairman's Office, Director of each Division of the Military Aircraft Business Division, Director Administration/ Director Quality Assurance/ Director Accounting & Financial Planning/ Director Procurement, Manager Information Management; the Director Administration serves as the Executive Secretary. (2)Information Security Promotion Group: the Director Administration serves as the team leader. The team is composed of sections of Information Management Dep., Personnel Dep., Safety & Security Dep., General Affairs Dep., and Air Asia Technical Training; the team is mainly responsible for promoting information security (to establish information security plan, report and respond to information security incidents, and to organize relevant education training course). (3)Information Security Incident Handling Group: the Manager Information Management serves as the group leader. The members include information security professionals and information personnel; their main duty is to do technical work related to information security (inspection of security, examination of information security system, management of detective system for threat of information security, and protection of information security).
|
||||||||
Operation of Information Security Risk Management |
||||||||
1.The Company strengthens its information security management and follows "Defense Industry Development Act" to introduce ISO27001 (Information Security Management System) and obtained its certificate. 2.The Company sent representative to participate in "ISO27001 active auditor certificate" professional training course and obtained the certificate. 3.The Company adopts information security measures according to "ISO27001 (Information Security Management System)", which includes: (1)To compile "Operation Manuals for Information Security Management System" as the guidelines for relevant measures and ensure practice of relevant principles. (2)To establish various management guidelines: guidelines for managing personal and public computers, guidelines for managing information assets, guidelines for managing electronic mailbox, guidelines for sustaining information business, guidelines for ensuring physical security, plans for emergency response, guidelines for auditing information security, plans for system recovery, guidelines for managing access control, guidelines for system development and maintenance, guidelines for outsourcing information security work, guidelines for managing operation of computer facilities, guidelines for managing information security risks, etc. (3)Risk control and implementation (introduction and practice of information technology): to introduce/ install firewall system to effectively block various types of attacks from different WAN. To follow Microsoft’s guidelines for complexity of AD username and password, to install business antivirus software, mail filter/ detect system, storage system back-up mechanism, and information security incident report mechanism. (4)To review and make improvement on risk incidents (review on execution of information security measures). To promote and enhance employees’ competence and practice of information security protection, and to practice in periodical inspection on weak points, and to study on how to avoid mistakes. |
||||||||
Information Security Risk Management Practices | ||||||||
1.To establish information system back up mechanism. 2.To back up data of the host computer and data bank every day; to check computer facility and keep a record daily. 3.To set up separate firewall systems for internal and external networks. 4.To conduct two internal information security audits each year. 5.To convene one management censorship meeting each year. 6.To conduct at least one operation continuity drill each year. 7.To conduct at least one system weak point scan and penetration inspection each year. 8.To arrange on job training course of information security for employees every year. 9.To conduct a periodical social-engineering test on employees. 10.To conduct a periodical seminars on information security. |
||||||||
Practical Information Security Management Plans | ||||||||
1.To manage and censor accounts and access rights (1)The applications or changes for accounts/ access rights should be approved and censored by administrative sectors, and there should be a periodical censorship on this. (2)Employees should follow Microsoft AD domain complexity principles to set up their passwords, and the passwords should be changed every 90 days. It is obligatory to enforce password history and determine the minimal length of a set of password. 2.Access control (1)To regulate uploading/ downloading the date/ files on the internet (application/ censorship/ review is requested). (2)To limit use of mobile devices (i.e. USB, CD-ROM, CD burner) (application/ censorship/ review is requested). (3)To limit access to applications so as to control the input/ output of data. 3.Multiple layer defense system (1)To install hard-ware firewalls. Packet filtering can effectively block external attackers and penetration; it can also record the initiator and behavior of the attackers, and analysis of such data can help detected future invasive attempts. (2)To install mail recording function in the host computer; the system can filter mails and scan viruses. (3)Each of the computers in the Company is installed with terminal protective software (for anti-virus and anti-hacker functions). (4)To conduct weak spot scan at least once each year. 4.Reliability (1)A virtual machine is adopted as the host computer, which helps reduce that shot-down time of the computer, and the system can automatically execute data-backup; it’s an active risk avoidance mechanism. (2)To conduct data backup every day, and to organize "Information business continuity drills" to ensure stable operation of the system. |
||||||||
|
||||||||
To invest in resources of information security management |
||||||||
1.To install interne edge firewall, Trend Micro Apex One endpoint protection software, and data backup system. In 2021, we invested NTD 5 million in maintenance and improvement of information security facilities. 2.To organize on job training for information security personnel, and to conduct drills of response to information security incidents. (1)Training plan (for designated personnel): 4 representatives participated in ISO27001:2013 training course for leading auditors and obtained the certificate. (2)Educational training: a total of 6 seminars were organized, with 1,318 person of participation, which equals to 2,508 hours. (3)There were three drills for social engineering in the year. A total of 360 people were involved, and the passing rate was 99.9%. (4)The information security censorship meeting is convened in Oct. every year. 3.To sign an information security consulting contract with the service suppliers, and conduct weak spot scan, penetration test, and information security check annually. The account access right has been censored twice in 2021, and a total of 1,074 accounts were reviewed. |
||||||||
|