Collection and use of Personal Information

1 The service information provided based on personal job responsibilities will not be disclosed to other third parties at will.
2 When using our company's network system, the following information will be automatically collected: date and time, retrieved web page, URL, and access network actions. This information may be used to improve the company's network traffic performance.
3 In response to the above behaviors, Internet surfing behaviors that cause a significant load on the company's network traffic will be monitored.

Information Security Rights and Responsibilities and Education and Training

1 For those who handle confidential information and those who are required to be given system management authority due to work needs, properly divide labor, decentralize responsibilities, establish an evaluation and assessment system, and establish a mutual support system for personnel as necessary.
2 Employees who leave the company should immediately notify the computer center and cancel all permissions to use various system resources.
3 Based on roles and functions, we conduct information security education, training and publicity for employees at different levels according to actual needs to help employees understand the importance of information security and various possible security risks, improve employees' information security awareness, and encourage them to comply with information security Safety regulations.


decorate