
Information Security
We have established an information security policy and information security management system to ensure the confidentiality, completeness, and availability of information assets, and also aims to achieve compliance of information operations and services by implementing information security risk management. In response to the expansion and diversity of the insurance business, we made information security internal controls and related regulations applicable to the entire company. As such, business units not only play the role of user, but also play the role of responsible unit and maintenance unit, which further enhances the Company's overall information security management.
The Company implemented a management system according to the international information security management framework to ensure solid information security. We have also maintained the effectiveness of our ISO 27001 Information Security Management System certification, and improved our protection for customers' rights and interests.
The immediate reporting of information security incidents will significantly improve the effectiveness of subsequent tracking, response, and handling, properly handling information security incidents to reduce the hazard.
The websites of government agencies and important livelihood services are often the target of Distributed Denial of Service (DDoS) attacks launched by hacker organizations, resulting in the websites of some agencies going offline. To strengthen defense and response capabilities for DDoS attacks, the Company conducted DDoS drills in 2023 to verify the ability of its website or servers to withstand DDoS attacks, and verify the effectiveness of defense plans.
For current suppliers, the Company periodically evaluates services provided by the supplier and further introduced the Security ScoreCard mechanism in 2021, which examines the information security maturity of the supplier's external systems, and includes them as evaluation items to make supplier attach greater importance to information security. We also periodically supervise and audit contractors every year (which includes information security review matters), to verify the overall service abilities and standards of contractors, which serves as the basis for subsequent contractor selection.