rdc

INFORMATION SECURITY POLICY

Follow our latest news and events

Article 1. Purpose

The purpose of this policy is to ensure the confidentiality, integrity, and availability of information assets belonging to the Company. The policy complies with all laws and regulations which is applicable to the Company and prevents the Company from intentional or accidental threats caused from inside or outside.

Article 2. Applicability

This policy has been adopted on any hardware, software, service, system, document which are used in the Company and the Company’s personnel, contractors, and visitors who use the said material.

Article 3. Objectives

To establish the adequate information security management system that ensure the confidentiality, integrity, and availability of information assets belonging to the Company, enhance employees’ awareness of information security, and upgrade IT equipment and network reliability.

Article 4. Scope

The scope of information security management includes the following:

  1. Organization of information security
  2. Human resource security
  3. Asset classification and management
  4. Physical and environmental security
  5. Communications and operations security
  6. Access control
  7. System development and maintenance
  8. Emergency response plan
  9. Internal Audit and others

Article 5. Responsibility

The information security manager should take appropriate procedures to implement this policy. All employees are obliged to report the information of security incidents, events and weaknesses. When an employee violates a rule related to information security, his or her liability with respect to information security shall be handled in accordance with disciplinary procedures and bear civil and criminal liability.

Article 6. Review & Assessment

This policy shall be evaluated at least once per year .To ensure the feasibility and effectiveness of the Company’s information security operation such evaluations shall focus on whether this Policy complies with applicable legislation and is suited to the most current technologies and business practices.

Article 7.Implementation & Correction

This policy and any amendment hereto, shall be issued and implemented once it has been approved by the Chairman.

Search
Please enter keywords to search the product area and latest news unit