Information Security

Information Security

In order to maintain the information security of the Company, TXC has adopted information security standards and frameworks to review critical information facilities and their applications, continue to improve the cyber environment, strengthen protection and management mechanisms, and train information security talents to protect our business can be sustained, and to identify and cope with the impacts.

Information Security Objectives

To ensure the achievement of the information security objectives, TXC constantly supervises the process of effectiveness evaluation, immediately reports any non-compliance and takes corrective measures, as well as reports the implementation of information security objectives to the Information Security Management Committee. Through information security training and advocacy activities, as well as information security-related presentations in supervisors' meetings, we promote employees' awareness of information security and strengthen their knowledge of related responsibilities.
  1. To safeguard the Company's business activity information from unauthorized access, modification and improper disclosure.
  2. To protect the correctness of the Company's critical business information processing.
  3. To ensure the high availability of the Company's information technology operations.
  4. To provide information security education and training, and to communicate information security-related messages in supervisors' meetings to raise  employees' awareness of information security and reinforce their knowledge of related responsibilities.
  5. To implement an internal audit system for information security to enhance the implementation of information security management.

Implementation and Resource Investment

  • iso27001

    Implement the ISO27001 information security management system

    From 2011, the Company continues to pass the annual third-party certification for the ISO27001 information security management system. The Company has also passed the annual certification for the ISO27001 information security management system in September 2021. Up to date, the Company has maintained the validity of the certificate.
     
  • 資訊安全

    Reinforce internal and external information security

    The Company applies Cyber-Defense Matrix framework to plan the information security protection network. In 2020, we focus on vulnerability scanning and analysis, anti-virus, UPAS (IP management and network access control), email defense, and strengthening firewall construction and zone defense to prevent the failure of the entire company network due to a single point failure. 
  • 資安意識

    Promote information security importance throughout the factory

    In 2022, we have introduced Managed Detection and Response (MDR), and have continued to upgrade the firewall, endpoint management, and email defense of each domain. We have also increased information security awareness through monthly information security e-newsletters (12 times) and annual company-wide information security promotions (4 sessions).

In compliance with EU personal data protection laws, we are committed to protecting your personal data.
By clicking "Accept All", you allow us to place cookies to enhance your experience on this site, help us analyze site performance and usage, and enable us to deliver relevant marketing content. You can manage your cookie settings below. By clicking "Accept All" you agree to the current settings.

Privacy preferences

In compliance with EU personal data protection laws, we are committed to protecting your personal data.
By clicking "Accept All", you allow us to place cookies to enhance your experience on this site, help us analyze site performance and usage, and enable us to deliver relevant marketing content. You can manage your cookie settings below. By clicking "Accept All" you agree to the current settings.

Manage preferences

Necessary cookie

Always on

The website cannot function without these cookies and you cannot switch them off on your system. These cookies are typically set only in response to an action you perform (i.e. a service request), such as setting privacy preferences, logging in, or filling in a form. You can set your browser to block or prompt you for these cookies, but this may prevent some site functions from working.