Information Security Management

Mirle Information Security Management Committee was established in 2020, making Information Security System more defensive. All information must comply with domestic and international laws and regulations and information security standards.
 

Information Security Management Organizational Architecture

  1. For improved information security management, the Company called for the Information Security Management Committee meeting on November 18, 2020 and established related information security organizations and periodically reports the status of information security governance to the Board of Directors.
  2. Implementation Status in 2020: (a). in September 2020: to take charge of information security governance, planning, supervision, and implementation of the Mirle Group, the independent unit “Information Security Protection Department” was established. (b). in November 2022: Mirle's president convened and formed the “Information Security Management Committee.” (c). in December 2022: The Information Security Policy and Information Security Organic Charter was approved.
  3.  In August 2022, CTO Mr. Charles Kao was assigned as Chief Information Security Officer (CISO).
    Organizational Chart  
     
資訊安全_工作區域 1 複本
 

Information Security Policy

Mirle information security policy is as follows:
  1. Ensure information security; prevent information leakage and personal data loss.
  2. Ensure the completeness and availability of our business information to execute corporate operations normally.
 
 

Substantial management solution

The Company’s information security policy is focused on information security governance, compliance, and technological utilization for the assessment and planning. It is described as follows.
 
Item Highlight Description
Information Security Governance
  • Enforce PDCA cyclic quality management
  • Maintain information security management systems
  • Continuously improve risk management
Establish an information security management system and build security awareness. Regularly verify and adjust the security system, to deepen information protection.
Compliance
  • Periodically review and adequately revise information security-related regulations
  • Build compliance cyclic mechanism
Build corporate information security compliance cyclic mechanism and periodically review and revise internal operating procedures in order to meet international laws and regulations and the laws and regulations in respective overseas areas.
Technology utilization
  • Promote information security digitally
  • Information security boundary review & countermeasure
  • Automation threat & defense mechanism deployment
Identify and differentiate risks; adjust and reinforce existing defense framework; apply data analysis and identification technologies; improve visibility and readability of threats; and find out risks and prepare countermeasures early.
 

 


 
Implementation Progress
  1. Complete the construction to enhance the physical security of the information machine room, including the interiors and exteriors of the room, the addition of surveillance systems, motion detection systems, and fire prevention systems, among others.
  2. The Company was certified by an impartial third party in December 2021 after having passed the final review required for the international ISO 27001:2013 (ISMS) Information Security Management System certification, and issuance of the Certificate was advised.
TOP goTop
WeChat QRcode

Please Enable cookies to improve your user experience

We use cookies to improve your user experience and for web traffic statistics purposes. By continuing to use this website, you agree to our use of cookies. Our Privacy & Cookie Policy contains more information.