Information Security Policy

Image 3

Information Security Certification

Image 3

Information Security Governance and Strategies

Xintec has established Proprietary Information Protection Committee (PIP Committee) since January, 2008 to protect company and customer’s confidential information. PIP Committee is responsible for managing and supervising the control of confidential information, and also they enact “Confidential Information Protection Policy” and “Confidential Information Protection Management Regulation” which clearly list management policies, procedures, and specifications of confidential information protection. Xintec’s Information security objective is to build a complete information security system and comprehensive security defensive ability to ensure information security. Identify risks, prevent and improve weakness through various security technologies. Make employees have correct concept and awareness on information protection, and reduce the risks from information leakage and cyber-attacks. Maintain company’s competitive advantages.
In line with cyber security trends and to establish a standard operating procedure for cyber security across company, ensuring immediate and resilient response to threats, our company obtained ISO 27001 Information Security Management System certification in September 2025. The certificate is valid from September 3, 2025 to September 2, 2028.

5 main goals; fulfill PDCA Cycle:

1. Build and fulfill confidential information and information security management system.
2. Comply with requests from the laws and contractual obligations related to information security.
3. Indeed give education and propaganda about confidential information protection and information security to employees and related groups.
4. Assess and identify risks. Set a goal for improving and control measures.
5.Improve information security management system through internal audit.


Information Security Organizations

PIP Committee’s duty is to manage, plan, supervise, and promote departments for information security. PIP Committee and IT department would together build a complete system and comprehensive defensive ability. Meetings would be held seasonally by the Committee members to check information security policy and its result. Annually, PIP Committee would make report to the board, letting the board understand situations of implementing information security.
1.PIP Committee: It is composed of representatives assigned by each department head. Duty: Discuss, establish, audit, and promote confidential information security controls.
2.PIP Executive Department: Plan, supervise, and promote confidential information security controls
3.IT: Build and manage information security system. Assist in evaluating, setting up and managing software and hardware based on PIP Committee’s decision and requirement. Conduct abnormal data of communication and information storage analysis. If there is any abnormality, notify PIP Committee.


Risks Management and Resources

1.Obtain ISO 27001 certification and establish standardized processes.
2.Asset Inventory and Risk Assessment: Regularly conduct identification and implement sensitive information classification and grading (inventory, labeling, and grading) to ensure precise control.
3.Supply Chain Security Management: Incorporate cyber security questionnaires and on-site visits to key suppliers to extend defense depth to partners.
4.Strengthen firewalls and other equipment to prevent zero-day attacks and block phishing emails.
5.Implement web browsing isolation to ensure employee online security.
6.Mail Review and DLP System Control to prevent data leakage of confidential information.
7.Make emergency response plan and drill. Clearly enact Recovery Time Objective (RTO) and Recovery Point Objective (RPO) of the main business. Settle proper backup system and backup plan.
8.Social Engineering – Adding suspicious email recognition mechanism, Phishing email, drill and cases propaganda.
9.Regularly hold propaganda and conduct audit to check the implementation of confidential information protection.
10.Strengthen information security defense, evaluate and improve the weaknesses of external services through the third-party security risk management platform.
11.Regularly hold hazard identification, risk assessment, and improvement operation.
12.Strengthen server protection, management and abnormal movement mechanism.
13.Set up a Security Operation Center (SOC) to control real-time information security status, focus on relative events, manage the rising alarm, and become the command center when any issue happens.
14.Establish SIEM (Security Information and Event Management), concentrate records collected by each system, integrate event alarms, correlation analysis, output data reports to assist security personnel in establishing overall environmental visualization more efficiently and promptly troubleshoot problems.


2025 Training and Audit

1.Total 12 PIP management meetings and 4 PIP Committee meetings.
2.All employees in company completed PIP training and audit.
3.Information security personnel have completed total 35 training sessions.


Information Security Issues

Flow for investigation:

Company didn’t get loss from serious information security issue in 2025.