We value your privacy
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyse site usage, and assist in our marketing and performance efforts.
Accept All Cookies
Manage Preferences
We value your privacy
MiTAC and certain third parties use cookies on MiTAC.com. The details regarding the types of cookies, their purpose and the third parties involved are described below and in our Cookie Policy. Please click on “Allow All” to consent to our usage of cookies in order to have the best possible experience on our websites. You can also set your preferences or reject cookies (except for strictly necessary cookies).
Allow All
Manage Consent Preferences
Essential cookies
Always Active
These cookies are essential in order to enable you to move around the website and use its features, such as setting your privacy preferences, logging in or filling in forms. Without these cookies, services requested through usage of our website cannot be properly provided. Essencial cookies do not require consent from the user under applicable law. You may configure your web browser to block essential cookies, but you might then not be able to use the website's functionalities as intended.
Analytics cookies
These cookies collect information about how visitors use a website, for instance which pages visitors go to most often, and how visitors move around the site. They help us to improve the user friendliness of a website and therefore enhance the user's experience.
Confirm my Choices

Information Security Management

 

Information Security Promotion Committee

MiTAC has set up an Information Security Promotion Committee in which the President serves as the chair, the Vice President of the Digital Development Center serves as the deputy chair, and the Chief Information Security Officer (CISO) serves in the position of executive secretary. The Company has a department dedicated to cyber security. An information security manager and several information security personnel were appointed to be responsible for promoting, coordinating, overseeing and reviewing matters in relation to cyber security management. The cyber security department reports on the implementation of cyber security measures to the management or the Board of Directors on a regular basis to ensure the appropriateness and effectiveness of the operation.

 

To continue enhancing the information security protection and management, MiTAC received the ISO 27001:2013 Information Security Management System certificate in 2019, and passes the audit every year. In 2022, MiTAC passed the audit conducted by a third-party verification institution to confirm the validity of the information security management system and relevant certificates.

 

The Global GPS and DashCam Brand Leader

 

Educational Training and Promotion of Information Security

MiTAC communicates the significance and necessity to observe the information security policy of the Company to the employees on an ongoing basis. All personnel using the information systems must participate in information security courses every year. The managers and personnel responsible for information security shall take part in professional information security training annually. Social engineering drills and relevant reviews are regularly arranged to constantly increase the employees’ awareness of information security,  and competitions related to information security are held to develop the employees’ competence of information security in an educational but entertaining manner.

 

HR structure worldwide (by gender)

Cyber Security Protection and Control Measures

We constantly gather various cyber security risk analysis indicators externally through external information security risk rating service to continuously monitor and lower information security risks. The CDM (Cyber Defense Matrix) is used to analyze and review the requirements for information security protection, in order to optimize the process of budget planning and control as well as protection measures for cyber security.

 

The Global GPS and DashCam Brand Leader

 

The Global GPS and DashCam Brand Leader

Cyber security incident response and threat intelligence

 The information security incident response, handling and reporting procedures are established, including the assessment for impacts and damages caused by incidents, internal and external reporting procedures, methods for informing other affected departments, contact persons and methods for reporting of incidents.

 

The Company has participated in the Taiwan Computer Emergency Response Team & Coordination Center (TWCERT / CC) for receiving cyber security alerts as well as information security threat and vulnerability information in order to take preventive actions, improve information security protection capabilities and reduce the risk of being hacked.

Information Service Continuity Plan

 

For key application systems directly related to business operations, such as production, R&D, and sales systems, the drills of backup and recovery, remote backup and remote recovery are arranged every year to maintain the response capability and operations. Ten disaster recovery drills and reviews were conducted in 2022, with the scope covering the key application systems, Internet services, power supply and air conditioning; the results all met the recovery time objective (RTO) and the recovery point objective (RPO) set.

 
ERP drill outcome

Projected results

Drill outcome

RPO 0 0
RTO < = 4 hrs 3.95 hrs

 

Ransomware Attack Drills

Considering the endless emergence of domestic and foreign ransomware attacks that can easily cause serious impacts on the operation and production, the IT departments of the Group’s important production locations jointly carried out the emergency drill for response to the ransomware attacks in 2022. Through the scenario planning of the table-top exercise, we made sure that the Group could effectively handle disasters and reduce losses with its response structure and capability in case of emergency. The drill was performed to improve the personnel’s crisis management and response skills.

 

 

Information Security Target

No business interruption, data corruption, data leakage or other material information security events occurred in 2022.

 

Taeget 2020 2021 2022

Events causing business interruption, data corruption, data leakage or other material information security events < 1 case.

0

No business interruption, data corruption, data leakage or other material information security events.

0

No business interruption, data corruption, data leakage or other material information security events.

0

No business interruption, data corruption, data leakage or other material information security events.

     Reporting Period and Cycle

 

IR Contacts

Investor Relations Senior Manager

Ms. Maggie Hsu

stock@mic.com.tw

Tel : +886-3-3289000 ext. 7685

Stock Agency

China Trust Commercial Bank - Stock Agency Department

5F., No.83, Sec. 1, Chongqing S. Rd., Zhongzheng Dist., Taipei,Taiwan, R.O.C.

Tel : +886-2-6636-5566

https://www.ctbcbank.com