{"id":12350,"date":"2025-12-12T15:42:26","date_gmt":"2025-12-12T07:42:26","guid":{"rendered":"https:\/\/www.sgsc.ai\/?page_id=12350"},"modified":"2025-12-12T15:57:47","modified_gmt":"2025-12-12T07:57:47","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.sgsc.ai\/en\/information-security-policy","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_textblock  avia-builder-el-first   container_wrap fullsize'  >\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4smkvz-944bf00634f708d8f0100d60e644be6f\">\n#top #wrap_all .avia-slideshow .av-slideshow-caption.av-4smkvz-944bf00634f708d8f0100d60e644be6f__0 .avia-caption-title{\nfont-size:38px;\n}\n#top .avia-slideshow .av-slideshow-caption.av-4smkvz-944bf00634f708d8f0100d60e644be6f__0 .avia-caption-content{\nfont-size:18px;\n}\n#top .avia-slideshow .av-slideshow-caption.av-4smkvz-944bf00634f708d8f0100d60e644be6f__0 .avia-caption-content p{\nfont-size:18px;\n}\n<\/style>\n<div  class='avia-slideshow av-4smkvz-944bf00634f708d8f0100d60e644be6f avia-slideshow-featured_large av_slideshow_full avia-fade-slider av-slideshow-ui av-control-default av-slideshow-autoplay av-loop-endless av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:true,&quot;loop_autoplay&quot;:&quot;endless&quot;,&quot;interval&quot;:3,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 31.25%;'><li  class='avia-slideshow-slide av-4smkvz-944bf00634f708d8f0100d60e644be6f__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><div class='av-slideshow-caption av-4smkvz-944bf00634f708d8f0100d60e644be6f__0 caption_fullwidth caption_left'><div class=\"container caption_container\"><div class=\"slideshow_caption\"><div class=\"slideshow_inner_caption\"><div class=\"slideshow_align_caption\"><h2 class='avia-caption-title '  itemprop=\"name\" >Information Security Policy<\/h2><\/div><\/div><\/div><\/div><\/div><img src='https:\/\/www.sgsc.ai\/wp-content\/uploads\/2024\/10\/2000x650-grey-1-1600x500.jpg' width='1600' height='500' title='2000x650-grey-1' alt=''  itemprop=\"thumbnailUrl\"  style='min-height:500px; min-width:1600px; ' \/><div class='av-section-color-overlay' style='opacity: 0.3; background-color: #000000; '><\/div><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12350'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-m3spf80x-ef514d8bb5a4ef5d0b0967847d1a918b'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div>\n<div>\n<p>Announcement Date: <strong>January 1, 2025<\/strong><\/p>\n<p><strong>Information Security Policy<\/strong><\/p>\n<p>1. Information Security Policy Statement<br \/>\nThe Information Security Policy of Smart Group Solutions Corp. (hereinafter referred to as \u201cthe Company\u201d) is: \u201cMake effective use of information, maintain continuous business operations, and ensure the security of information processing.\u201d<\/p>\n<p>2. Purpose<br \/>\nRecognizing that information security is fundamental to the stable operation of all services, this Information Security Policy (hereinafter referred to as \u201cthis Document\u201d) is established to ensure the Company fulfills its mission of implementing sound information security practices. This Document serves as the highest guiding principle for the Company\u2019s Information Security Management System (ISMS).<\/p>\n<p>3. Objectives<br \/>\nThe Company\u2019s information security objectives are to ensure the confidentiality, integrity, availability, and compliance of its internal core systems. Quantitative indicators for measuring information security performance shall be defined according to organizational levels and functions to verify the implementation status of the ISMS and the achievement of its objectives.<\/p>\n<p>3.1 Confidentiality: Prevent the disclosure of any sensitive Company information to the internet.<br \/>\n3.2 Integrity: Ensure the accuracy of sensitive Company data (e.g., financial information, personnel data, system information).<br \/>\n3.3 Availability: Ensure proper backup of all critical data held by the Company.<br \/>\n3.4 Compliance: Comply with relevant laws and regulations of Taiwan (e.g., Personal Data Protection Act, Trade Secrets Act, and intellectual property laws) to prevent infringement of the rights of the Company or third parties.<\/p>\n<p>4. Scope<br \/>\nThis policy applies to the entire Company. To ensure the effective operation of the ISMS, the Company shall establish clear information security organizational structures, responsibilities, and authorities to promote and maintain management, implementation, and audit-related activities.<\/p>\n<p>5. Implementation Principles<br \/>\nThe implementation of the ISMS shall follow the Plan-Do-Check-Act (PDCA) cycle, ensuring effectiveness and continuity through an iterative and progressively refined approach.<\/p>\n<p>6. Review and Evaluation<br \/>\n6.1 This Document shall be reviewed at least once a year, taking into consideration the latest developments in laws and regulations, technological changes, stakeholder expectations, business activities, internal management, and available resources to ensure the effectiveness of information security operations.<br \/>\n6.2 This Document shall be revised based on review results and shall take effect only after approval and issuance by the Information Security Management Committee or its authorized representative.<br \/>\n6.3 Upon establishment or revision, this Document shall be communicated to relevant stakeholders\u2014including employees, suppliers, customers, and external auditors\u2014through appropriate methods such as email, website announcements, or printed copies.<\/p>\n<\/div>\n<\/div>\n<section>\n<div><\/div>\n<\/section>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":999,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12350","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/pages\/12350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/comments?post=12350"}],"version-history":[{"count":3,"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/pages\/12350\/revisions"}],"predecessor-version":[{"id":12359,"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/pages\/12350\/revisions\/12359"}],"wp:attachment":[{"href":"https:\/\/www.sgsc.ai\/en\/wp-json\/wp\/v2\/media?parent=12350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}