Drive your heart,
Power your life.

Vision and Objectives of Information Security Policy

 1 Information Security Policy

             Continuously improve and strengthen the company’s information security management to ensure the confidentiality, integrity, and availability of its
             information assets. Comply with relevant laws, regulations, and contractual requirements to establish and maintain a secure, reliable, and business-
             continuity-oriented information environment, protecting information assets from intentional or accidental threats both internally and externally.

 2 Vision of Information Security Policy

             To strengthen personnel awareness and prevent data leakage

             To implement daily operations and ensure service availability

 3 Based on the vision of the information security policy, the following information security objectives are proposed :

           (1) Ensuring that all information operations of the company comply with relevant legal requirements.

           (2) Ensuring that all personnel understand their information security responsibilities, protect information assets,

                 and reduce the risk of information security incidents.

           (3) Ensuring the confidentiality of the company's information assets, implement data access controls,

                  and ensure that information can only be accessed by authorized personnel.

           (4) Ensuring the integrity and accuracy of information operations management in the company, and prevent unauthorized modifications.

           (5) Ensuring the continuous operation of information operations in the company and comply with operational service level requirements.

 4 In response to the above information security objectives, annual to-do lists, required resources, responsible personnel, expected completion times,

            and evaluation methods and results should be prepared. Relevant monitoring and measurement procedures should follow the company's "Supervision

            and Measurement Management Procedures."

 5 The Information Security Implementation Team should report the results of effective measurement of information security objectives to the convener of

             the Information Security Committee during management review meetings.

Information Security Incident Notification and Response Operation Procedures

Drive your heart, Power your life!
Fitipower's technology is designed to improve lives and enrich experiences through a human-centric approach. We make our products more efficient and less energy intensive through chip optimization. We believe that technology can change lives and further change the world.
Close