The Company strengthens IT system and network security through policies and training to reduce risks of data theft, misuse, leakage, or damage, ensuring protection of all stakeholders’ information and sustainable operations. The IT Security Task Force reviews system risks at least annually, holds ad hoc meetings if needed, and reports summaries to the Board each year.
The Chief Cybersecurity Officer serves as the convener of the " Cybersecurity Promotion Team", which meets annually to review and decide on information security and information protection policies and policies, and communicates information security management, reviews policies and directions to the whole company through the " Cybersecurity Promotion Team", and implements the effectiveness of information security management measures.
The " Cybersecurity Promotion Team" is composed of at least 12 members of the " Cybersecurity Audit Unit", the " Cybersecurity Control Unit" and the " Cybersecurity Management Unit", which is responsible for the company's information security and physical security planning and related audit matters.
The Cybersecurity audit unit has 2 people to check and monitor the effectiveness of information security management, and implement supervision and audit to ensure that information security standards continue to be effective.
The Cybersecurity control unit is composed of 1 Cybersecurity chief, 1 Cybersecurity supervisor and 2 Cybersecurity personnel to establish multi-layer Cybersecurity protection, systematically monitor Cybersecurity, regularly review and implement improvement operations including information security measures, education and training, publicity and other improvement operations to ensure that important confidential information is not leaked.
The Cybersecurity management unit is responsible for managing employee behavior and physical application security by department heads. When employees violate relevant norms and procedures, they will be subject to personnel sanctions based on work rules, employee manuals, and other behavioral guidelines, depending on the severity of the violation.
1、Computer Equipment Replacement Project:Old endpoints are phased out to meet Windows 11 requirements, prevent post-Windows 10 EOL security risks, and implement a device lifecycle management system.
2、Host upgrade project:Under the cybersecurity plan, a passwordless MFA system with biometric authentication via mobile app (fingerprint/face) is deployed.
3、Website Protection Project:A DDoS protection mechanism with traffic scrubbing has been implemented in collaboration with Taiwan Mobile, offering a maximum mitigation capacity of 500 Gbps.
4、Talent training projects:Train and expand management with ISO 27001 Lead Auditor certification to strengthen cybersecurity management and internal audits.
In 2024, there is no report on the violation of customer privacy or complaints over customer data loss at CMC. CMC deeply understands the importance of protecting customer information and privacy and duly observes its personal information and privacy policy and thereby demands all employees protect the confidential and exclusive information delivered by the customers with caution. However, the risk and know-how of hacking into the network system or intrusion into the system changes rapidly over time. CMC has taken proper measures for information security management, and also seeks to protect information security and customer information through the following mechanisms to assure customer privacy:
1. Employees signed the non-disclosure clause as responsibility and obligations in due diligence.
2. Intensification of the education on the awareness of personal information and information security.
3. Rules and regulations governing the photocopy, fax, and keeping of confidential documents and materials at the workplace are in Place. Related rules and regulations are also applicable to computer equipment, and data storage media to assure information ecurity.
4. In the area of operation security management, only the authorized users may access information and related equipment at the time of need.
5. CMC has installed firewall and anti-virus measures to prevent hacking, and alert the employees of their responses to unidentified data and mails.