Sign up for our news
Messages
Thank you for your subscription, the latest issue of the newsletter will be automatically sent to your designated mailbox. Please set Unimicron’s email as trust mail.
Thank you.

Information Security

Information Security

Protecting customers’ intellectual property rights and business information is the focus of our business and business ethics management. Through control via the ISO 27001 Information Security Management System, Unimicron received no customer complaints about infringement of customer privacy rights or loss of customers’ information and no punishment of huge fines for products or services violating the law in 2021.

Information Security Goals

2021In order to maintain the confidentiality, integrity and availability of the Company’s information assets, and to protect the privacy of customers and personal data, Unimicron has formulated an information security policy and hopes to achieve the following goals through the joint efforts of all employees in the Company:

● Confidentiality:Ensure that only authorized personnel can obtain information and avoid information leakage
● Integrity:Ensure that information is not subject to unauthorized tampering and the correctness of information processing methods
● Availability:Ensure that authorized users can obtain information and use related assets when needed

Information Security Committee

Unimicron manages the Company-level information protection mechanism through the Information Security Committee to protect customer privacy. Through the acquisition of relevant international certifications, internal information security advocacy and drills, data inventory and drills, and data access control and information security early warning mechanisms, we regularly provide information security reports to the chairman of the board and senior managers of business units, to reduce information security risk.

image/svg+xml P40_資安委員會運作 2022-09-30T16:31:07+08:00 2022-09-30T16:31:07+08:00 2022-09-30T16:31:07+08:00 Adobe Illustrator 26.5 (Windows) 256 184 JPEG /9j/4AAQSkZJRgABAgEBLAEsAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABABLAAAAAEA AQEsAAAAAQAB/+4ADkFkb2JlAGTAAAAAAf/bAIQABgQEBAUEBgUFBgkGBQYJCwgGBggLDAoKCwoK DBAMDAwMDAwQDA4PEA8ODBMTFBQTExwbGxscHx8fHx8fHx8fHwEHBwcNDA0YEBAYGhURFRofHx8f Hx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8f/8AAEQgAuAEAAwER AAIRAQMRAf/EAaIAAAAHAQEBAQEAAAAAAAAAAAQFAwIGAQAHCAkKCwEAAgIDAQEBAQEAAAAAAAAA AQACAwQFBgcICQoLEAACAQMDAgQCBgcDBAIGAnMBAgMRBAAFIRIxQVEGE2EicYEUMpGhBxWxQiPB UtHhMxZi8CRygvElQzRTkqKyY3PCNUQnk6OzNhdUZHTD0uIIJoMJChgZhJRFRqS0VtNVKBry4/PE 1OT0ZXWFlaW1xdXl9WZ2hpamtsbW5vY3R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo+Ck5SVlpeYmZ qbnJ2en5KjpKWmp6ipqqusra6voRAAICAQIDBQUEBQYECAMDbQEAAhEDBCESMUEFURNhIgZxgZEy obHwFMHR4SNCFVJicvEzJDRDghaSUyWiY7LCB3PSNeJEgxdUkwgJChgZJjZFGidkdFU38qOzwygp 0+PzhJSktMTU5PRldYWVpbXF1eX1RlZmdoaWprbG1ub2R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo +DlJWWl5iZmpucnZ6fkqOkpaanqKmqq6ytrq+v/aAAwDAQACEQMRAD8A9U4q7FXYq7FXYq7FXYq7 FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYqxvzB52t9FvPq09qzAiscpmt4lc0BYL6s iE8eQr88XMwaM5BYP2E/cChbH8xLS9uYoIbJmMi8yVuLWQqorViscrOen7IOLPJoTAEk/ZL9SSfm hJbyzQFJbu3uQienJDb3ci05tyEiW7wvvtxJNOvvkTpjk3B+2nCGqniFRr4x4mBLw9OISanqPIFl ZhZauqhd+J3uuobuxpT5Y/ydLvHz/ao7TzdeH/lUm/kuOFfMVkLm71GZjLH9WjktNSt4g/MEGR7m 4mioFDbEdaUOP5Ex3sbeajtHLP0y4d+7Hw/a9vyTF2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV 2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV51+YOkec7m6uLvR7yeOGJUWOytraOWSRmChmDTMqfDXpyX v3pmThlDlINeQzH0kj3IbRdF882OmpJdSfpa8kKuFmSSxkQMKskrwm4Wq/5C9epbbGZxk7Cvt/Us ZZBHc8X2frV9GX80VvLddWt7WW2eSETSW1xfxOi8x6jcZRKjjj2quM/Dra/sYx8TrX2o6+tvOLal pZsiv6OFG1Q3JvDOp6H0ODhKkMRv0/DIR4aN8+nJlLisVy6q+sRea1sf9w6GS9avA3k10kSj1Jfi YRBnY8Qg47bb18WHDfq5eVJnxVtzUNCTzs1tKutwCO5jX4JLO4u2jkrMv7Mqh04x1HVq7nbDPg/h +2kQ4q9VfBKNP/5XB9a/06KySy5EP6L37T8RtVObFKnqK/TlkvCra7+DCPiXvVfF6hmI3uxV2Kux V2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV 2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2 KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2K uxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Ku xV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Kux V2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV 2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2 KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2K uxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Ku xV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Kux V2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV 2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2 KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2K uxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Ku xV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Kux V2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV 2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2 KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2K uxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Ku xV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Kux V2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxVjVjo+ vQ2dpHK5kkjtreOY/XZkrLHGqyGgicbkeO/XCEHmuk0bWxURzOQwWvK/mFDtyA/cN4Ghw2tKn6J1 hR8EjtyoWD30tAQvY+hXqT4DoadgLWnLpmuIxdSWIYMEa/mIJAIof3HQ7bUxVttM1kqxFQzihUX8 1B/lA+hUHYYqi49DpGVa9vOTAV/0hmoahvhJA8KfLG1pGWVoLWH0hLLMK15zOZG6AUqflgSr4q7F XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq//2Q== xmp.iid:886948bd-30fe-f94b-ad8f-afdfb3ea50b0 xmp.did:886948bd-30fe-f94b-ad8f-afdfb3ea50b0 uuid:5D20892493BFDB11914A8590D31508C8 default uuid:0fcdb2a2-838b-4bf8-a360-b1f066588ada xmp.did:c4dbebb8-a19e-af43-be08-fd3e93443d1f uuid:5D20892493BFDB11914A8590D31508C8 default saved xmp.iid:0068DEAA2A6BE7119935A94A13C8F00F 2017-07-18T04:01:05+08:00 Adobe Illustrator CS6 (Windows) / saved xmp.iid:886948bd-30fe-f94b-ad8f-afdfb3ea50b0 2022-09-30T16:31:07+08:00 Adobe Illustrator 26.5 (Windows) / Print Adobe Illustrator False False 1 147.000000 39.633597 Millimeters Arial-BoldMT Arial Bold Open Type Version 7.00 False arialbd.ttf Cyan Magenta Yellow Black 預設色票群組 0 白色 CMYK PROCESS 0.000000 0.000000 0.000000 0.000000 黑色 CMYK PROCESS 0.000000 0.000000 0.000000 100.000000 CMYK 紅色 CMYK PROCESS 0.000000 100.000000 100.000000 0.000000 CMYK 黃色 CMYK PROCESS 0.000000 0.000000 100.000000 0.000000 CMYK 綠色 CMYK PROCESS 100.000000 0.000000 100.000000 0.000000 CMYK 青色 CMYK PROCESS 100.000000 0.000000 0.000000 0.000000 CMYK 藍色 CMYK PROCESS 100.000000 100.000000 0.000000 0.000000 CMYK 洋紅色 CMYK PROCESS 0.000000 100.000000 0.000000 0.000000 C=15 M=100 Y=90 K=10 CMYK PROCESS 15.000000 100.000000 90.000000 10.000000 C=0 M=90 Y=85 K=0 CMYK PROCESS 0.000000 90.000000 85.000000 0.000000 C=0 M=80 Y=95 K=0 CMYK PROCESS 0.000000 80.000000 95.000000 0.000000 C=0 M=50 Y=100 K=0 CMYK PROCESS 0.000000 50.000000 100.000000 0.000000 C=0 M=35 Y=85 K=0 CMYK PROCESS 0.000000 35.000000 85.000000 0.000000 C=5 M=0 Y=90 K=0 CMYK PROCESS 5.000000 0.000000 90.000000 0.000000 C=20 M=0 Y=100 K=0 CMYK PROCESS 20.000000 0.000000 100.000000 0.000000 C=50 M=0 Y=100 K=0 CMYK PROCESS 50.000000 0.000000 100.000000 0.000000 C=75 M=0 Y=100 K=0 CMYK PROCESS 75.000000 0.000000 100.000000 0.000000 C=85 M=10 Y=100 K=10 CMYK PROCESS 85.000000 10.000000 100.000000 10.000000 C=90 M=30 Y=95 K=30 CMYK PROCESS 90.000000 30.000000 95.000000 30.000000 C=75 M=0 Y=75 K=0 CMYK PROCESS 75.000000 0.000000 75.000000 0.000000 C=80 M=10 Y=45 K=0 CMYK PROCESS 80.000000 10.000000 45.000000 0.000000 C=70 M=15 Y=0 K=0 CMYK PROCESS 70.000000 15.000000 0.000000 0.000000 C=85 M=50 Y=0 K=0 CMYK PROCESS 85.000000 50.000000 0.000000 0.000000 C=100 M=95 Y=5 K=0 CMYK PROCESS 100.000000 95.000000 5.000000 0.000000 C=100 M=100 Y=25 K=25 CMYK PROCESS 100.000000 100.000000 25.000000 25.000000 C=75 M=100 Y=0 K=0 CMYK PROCESS 75.000000 100.000000 0.000000 0.000000 C=50 M=100 Y=0 K=0 CMYK PROCESS 50.000000 100.000000 0.000000 0.000000 C=35 M=100 Y=35 K=10 CMYK PROCESS 35.000000 100.000000 35.000000 10.000000 C=10 M=100 Y=50 K=0 CMYK PROCESS 10.000000 100.000000 50.000000 0.000000 C=0 M=95 Y=20 K=0 CMYK PROCESS 0.000000 95.000000 20.000000 0.000000 C=25 M=25 Y=40 K=0 CMYK PROCESS 25.000000 25.000000 40.000000 0.000000 C=40 M=45 Y=50 K=5 CMYK PROCESS 40.000000 45.000000 50.000000 5.000000 C=50 M=50 Y=60 K=25 CMYK PROCESS 50.000000 50.000000 60.000000 25.000000 C=55 M=60 Y=65 K=40 CMYK PROCESS 55.000000 60.000000 65.000000 40.000000 C=25 M=40 Y=65 K=0 CMYK PROCESS 25.000000 40.000000 65.000000 0.000000 C=30 M=50 Y=75 K=10 CMYK PROCESS 30.000000 50.000000 75.000000 10.000000 C=35 M=60 Y=80 K=25 CMYK PROCESS 35.000000 60.000000 80.000000 25.000000 C=40 M=65 Y=90 K=35 CMYK PROCESS 40.000000 65.000000 90.000000 35.000000 C=40 M=70 Y=100 K=50 CMYK PROCESS 40.000000 70.000000 100.000000 50.000000 C=50 M=70 Y=80 K=70 CMYK PROCESS 50.000000 70.000000 80.000000 70.000000 C=85 M=15 Y=32 K=0 PROCESS 100.000000 CMYK 85.000002 15.000001 31.999999 0.003100 R=125 G=227 B=20 PROCESS 100.000000 CMYK 53.633934 0.000000 94.552529 0.000000 R=1 G=204 B=155 PROCESS 100.000000 CMYK 69.250017 0.000000 53.820091 0.000000 R=20 G=160 B=192 PROCESS 100.000000 CMYK 76.177615 23.352407 23.459220 0.000000 R=80 G=89 B=171 PROCESS 100.000000 CMYK 78.185701 69.222552 3.234912 0.000000 R=9 G=144 B=159 PROCESS 100.000000 CMYK 80.035090 31.323719 38.013273 0.000000 R=10 G=139 B=154 PROCESS 100.000000 CMYK 81.219190 34.436560 39.343861 0.000000 R=11 G=143 B=111 PROCESS 100.000000 CMYK 81.606770 29.443806 67.031354 0.000000 R=2 G=198 B=151 PROCESS 100.000000 CMYK 70.556188 0.000000 54.897380 0.000000 R=128 G=128 B=128 PROCESS 100.000000 CMYK 57.457846 48.441291 45.477986 0.000000 R=179 G=179 B=179 PROCESS 100.000000 CMYK 34.619668 27.295336 25.934231 0.000000 R=107 G=188 B=197 PROCESS 100.000000 CMYK 59.639883 11.673152 26.343173 0.000000 R=230 G=230 B=230 PROCESS 100.000000 CMYK 11.624323 8.899061 8.899061 0.000000 R=204 G=204 B=204 PROCESS 100.000000 CMYK 23.514152 17.810330 17.236590 0.000000 R=7 G=8 B=11 PROCESS 100.000000 CMYK 90.908670 86.272979 83.733881 75.213242 R=79 G=123 B=172 PROCESS 100.000000 CMYK 74.019986 49.179825 19.061570 0.000000 Cyan 700 PROCESS 100.000000 CMYK 78.863198 27.026778 35.947204 0.000000 Green 700 PROCESS 100.000000 CMYK 78.136873 30.841532 98.275727 0.030518 Teal 400 PROCESS 100.000000 CMYK 74.886698 16.617075 46.866557 0.000000 Green 400 PROCESS 100.000000 CMYK 62.758827 6.115816 72.536808 0.000000 Lime 600 PROCESS 100.000000 CMYK 34.317538 13.110551 87.478441 0.000000 Yellow 600 PROCESS 100.000000 CMYK 5.941863 18.280308 81.295490 0.000000 R=0 G=166 B=183 PROCESS 100.000000 CMYK 75.979245 18.094148 30.960554 0.000000 R=255 G=90 B=57 PROCESS 100.000000 CMYK 0.000000 78.204012 73.900968 0.000000 灰階 1 C=0 M=0 Y=0 K=100 CMYK PROCESS 0.000000 0.000000 0.000000 100.000000 C=0 M=0 Y=0 K=90 CMYK PROCESS 0.000000 0.000000 0.000000 89.999400 C=0 M=0 Y=0 K=80 CMYK PROCESS 0.000000 0.000000 0.000000 79.998800 C=0 M=0 Y=0 K=70 CMYK PROCESS 0.000000 0.000000 0.000000 69.999700 C=0 M=0 Y=0 K=60 CMYK PROCESS 0.000000 0.000000 0.000000 59.999100 C=0 M=0 Y=0 K=50 CMYK PROCESS 0.000000 0.000000 0.000000 50.000000 C=0 M=0 Y=0 K=40 CMYK PROCESS 0.000000 0.000000 0.000000 39.999400 C=0 M=0 Y=0 K=30 CMYK PROCESS 0.000000 0.000000 0.000000 29.998800 C=0 M=0 Y=0 K=20 CMYK PROCESS 0.000000 0.000000 0.000000 19.999700 C=0 M=0 Y=0 K=10 CMYK PROCESS 0.000000 0.000000 0.000000 9.999100 C=0 M=0 Y=0 K=5 CMYK PROCESS 0.000000 0.000000 0.000000 4.998800 明亮 1 C=0 M=100 Y=100 K=0 CMYK PROCESS 0.000000 100.000000 100.000000 0.000000 C=0 M=75 Y=100 K=0 CMYK PROCESS 0.000000 75.000000 100.000000 0.000000 C=0 M=10 Y=95 K=0 CMYK PROCESS 0.000000 10.000000 95.000000 0.000000 C=85 M=10 Y=100 K=0 CMYK PROCESS 85.000000 10.000000 100.000000 0.000000 C=100 M=90 Y=0 K=0 CMYK PROCESS 100.000000 90.000000 0.000000 0.000000 C=60 M=90 Y=0 K=0 CMYK PROCESS 60.000000 90.000000 0.003100 0.003100 Adobe PDF library 16.07 Information Security Committee Committee Representatives Information Security Point of Contact Information Security Task Force Information Communication Unit Human Resources Unit Audit Unit Legal Affairs Unit Intellectual Rights Unit



2021 Information Security Management Results

Results

International Security System Certification

Unimicron’s Taiwan and Mainland China facilities have obtained ISO 27001 Information Security Management System certification, with a coverage rate of 100%, and have established complete information security standards and management procedures to ensure the security of the information environment.

Data Inventory and Classification

2021Unimicron has completed the advocacy and inventory of the business secret information in 2021 to effectively declare the scope of the Company's confidential information.

Data Access Control and Information Security Warning

Use computer access control tools to lock computer transmission media (email, USB, FTP, web, file folder, etc.). If it is needed for work, a separate application for activation is needed and it must be supervised by the information security early warning mechanism. All file access and data transmission abnormalities are detected and alarmed by the system, and the Information Security Committee is notified to perform related audits, reports, and handling.

Internal Information Security Advocacy and Drill

We hold regular information security advocacy and testing for employees, we issued 14 times announcements in 2021, hold an unannounced social attack drill (phishing email), and conduct a companywide e-Learning information security course in the fourth quarter of each year to deepen employees' information security awareness through experience.

Stage

Number of People Tested

Ratio to be Hacked

Measures to Strengthen Information Security Awareness

First Test

Employees with Email accounts

Open malicious link and enter account password: 2.5%
(2020年/3.1%,2019年/5.25%)

For employees who failed the test, Unimicron has completed the second propaganda and arranged a test

Retest

Employees who failed the first test (128 employees failed the test)

Open the malicious link and enter account password: 2 employees failed the test

Individual training by the supervisor



Information Security Management Plan

To protect customers' intellectual property rights and confidential corporate documents, in addition to a comprehensive information security policy and annual ISO/IEC 27001 Information Security Management System certification, we completed the multi-facet strengthening of our equipment defense and detection capabilities in 2021, including external/inter-plant/intra-plant firewalls, network abnormal traffic detection and analysis systems, and other traffic monitoring equipment. In addition, it is equipped with privileged account management, regular system vulnerability scanning and repair, data backup and quick recovery mechanism, system network security enhancement, USB management, handheld mobile camera device management, information classification and confidentiality system, printing control, information security training and penetration and phishing drills, etc., to enhance internal and external attack prevention detection and recovery capabilities and properly maintain customer data and information security. Nearly 100 million attempts per month by external hackers have been blocked externally, causing no damage to system data.

In order to implement Unimicron’s Information Security Policy, we have fully implemented the mobile device access control to the plant, ensuring that information will not be arbitrarily carried out. In addition, Unimicron develops specific management solutions related to the six major aspects of Risk Assessment, Terminal Computer Management, Computer Room Management, Anti-virus and Anti-hacking Management, System and Network Security Management, and Training to properly maintain customer data and information security.

In 2021, we will promote a project to control the printing of sensitive characters on Intelligent Multifunction Printers, which will not only print watermark but also automatically filter key sensitive characters and generate alarm reports to relevant supervisors to prevent the leakage of important information. There were 39 printers installed in 2021, and gradually replaced in 2022.

方案

內容

Risk
Assessment

Measures:We review risks and management measures through ISO 27001 Information Security Management System and company-wide bi-weekly Information Security Committee meetings, and submit bi-monthly reports.
Achievements:In 2021, a total of 20 improvements will be made, including the implementation of printing control, a platform for business secrets and patent registration, the enhancement of information security of network wireless receivers with real-name authentication of WiFi users, new Email Defense Systems (detecting and blocking phishing emails), Two-Factor Authentication, the improvement of file server backup and recovery speed, and centralized monitor system for nearly 1,000 host devices, etc.

Training

• Through physical and digital E-based courses, regularly conduct 3 types of education training and verification of "information security," "trade secret protection" and "patent and copyright protection" to employees, to establish employees' awareness of sensitive information protection, and implement trade secrets inventory and classification management every year to protect Company and customer data.

System and
Network Security
Management

• According to the vulnerability database defined by Computer Emergency Response Team (CERT) and Security Content Automation Protocol (SCAP), conduct two system vulnerability scans and vulnerability repairs every year.

Terminal
Computer
Management

• Use the computer access control system to perform 3 software and hardware asset (hardware change notification, software authorization, and software function restriction) and 6 access behaviors (USB, CD burning, network storage, printing, Bluetooth, and wireless network card) control.

Computer
Room
Management

Use the following three sets of systems to support each other to construct a secure physical computer room environment and to protect the system and customer data security:

Central Access Control System: Control the entrance and exit of the computer room, allowing only authorized employees to access, while retaining the entry and exit records.
CCTV system: Have 24-hour full-area video monitoring of the computer room, and through the sensing mechanism, automatically send out an alarm when an abnormal intrusion occurs.
Environmental Control System: Monitor the environment (temperature, humidity, power) of the computer room 24 hours a day.

Anti-virus and
Anti-hacking
Management

Strengthening Machine Protection:we have introduced the management mechanism of machines’ virus-free certificates. The machine will be connected to the network only after the vendors have provided virus-free certificates and the machine has been tested by Unimicron to be virus-free, and the antivirus audits are regularly conducted on the machines.
Network Firewalls and Hacker Intrusion Detection and Defense Systems:to detect, block and alert about external threats and with the help of external information security organizations, provide Security Operation Center (SOC) services, 24-hour round-the-clock information security incident analysis mechanism.



2021 Information Security Training Course

Course

Participants

Total Number of Employees Trained /Number of Employees That Should Be Trained

Course Hours

Completion Rate (%)

Information Security Advocate

Job level 5 (inclusive) and higher in Taiwan and Taiwanese employees stationed in Mainland China (including DL)

3,990/4,018

1 hour

99.3%

Analysis on the Law and Ethics of Business Secrets

3,990/4,018

1 hour

99.3%

Trade Secret Advanced Course

3,990/4,018

1 hour

99.3%

Intellectual Property Rights

3,990/4,018

1 hour

99.3%

Note 1: The training starts from Aug 30 to Dec 6 in 2021, employees who should be trained are Taiwanese and Taiwanese employees (including DL) stationed in Mainland China at level 5 (or above) who have arrived at least three months before May 31, 2021.
Note 2: The employees on board since June 1, 2021, who have not completed the training will be included in the training list for the following year.
Note 3: Of 28 employees who have not completed training, 21 employees were not working during the training period, 3 employees were on long-term sick leave, 1 employee who was on leave, 1 employee who was on maternity leave, 1 employee who was on training, and 1 employee who was on long-term leave.



Information Security Incident Notification Process

When an information security incident occurs, employees should immediately notify the unit head following the "Unimicron’s Information Security Incident Notification Management Procedures." The unit head will report to the information security officer, who will, following internal regulations, determine whether the information security incident is a major abnormal event, whether it is a breach of confidentiality, and whether it involves a first-level supervisor. After classification, It shall be reported to the supervisor at that level and the responsible unit. If it is a major event, it must be reported to the first-level supervisor, the business division's president, the Chief Information Security Officer, and the Executive President. If it is a major abnormality and suspected leak event, it shall be reported to the Human Resources Department and the Audit Office. If the leak is true, the legal/personnel department will handle it by the law or Company regulations.

Occurrence of Incident

• Report immediately in accordance with the "Unimicron’s Information Security Incident Notification Management Procedures"

Reporting Operations

• The unit head reports to the Information Security Officer
• The Information Security Officer classifies the information security incident

Handing of Leakages

• It shall be reported to the supervisor at that level and the responsible unit. If it is a major event, it must be reported to the first-level supervisor and the president of the business division, Chief Information Security Officer and the Executive President
• If it is a major abnormality and suspected leak event, it shall be reported to the Human Resources Department and the Audit Office

Handling of the Information Security Incident

• It shall be handled by the Legal Affairs/ Human Resources Department under law or the regulations

Case Closure

• If it is an information security incident of level 3 or higher, the "Information Anomaly Incident Report" must be filled out and submitted to the Information Security Officer or higher



2021 Information Security Enhancement Measures

In 2021, Unimicron has no major information security incidents. In order to continuously improve information security management, the following enhancement measures have been completed.
Network Traffic Control: Strengthen internal and external cross-plant firewalls and abnormal traffic detection and analysis capabilities, and implement endpoint computer data output record checking
Account Control: Enhance multi-factor authentication and authorization control of jump hosts
Backup Optimization: Improve data backup and fast recovery framework
Governance Policy: System vulnerability scanning, 24-hour service and Security Operation Center (SOC) services, USB management, mobile device management, information classification and confidentiality system, printing control, information security training and phishing drills, etc.
Investing Resources: Established the Chief Information Security Officer, the Information Security Task Force, and joined the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT), which is a security information-sharing organization.



Information Security Incident

Description

2018

2019

2020

2021

Number of major information security concerns

0

0

1

0

Total number of breaches of customer privacy

0

0

0

0

Total number of customers affected by data breaches

0

0

0

0

Total monetary value of significant fines for non-compliance with information security concerns

0

0

0

0

Now:Home / Solid Corporate Governance / Corporate Governance / Information Security