LOGO

Information Security Policy Statement

Printweb

Printweb is committed to ensuring the confidentiality, integrity, and availability (CIA) of our information and ICT systems. To prevent unauthorized access, use, control, disclosure, destruction, alteration, or other harms—and to keep our business operating smoothly—we adopt the following policy and objectives for all employees to follow.

1) Policy Principles

  1. Risk Management. Establish an ICT security risk management mechanism and regularly review its effectiveness in response to internal and external changes.

  2. Protection of Sensitive Information. Protect the confidentiality and integrity of sensitive information and systems; prevent unauthorized access and tampering.

  3. Resilience & Continuity. Strengthen the resilience of core systems to ensure business continuity.

  4. Training & Awareness. Provide ongoing ICT security training to raise employee awareness; all personnel are required to participate.

  5. Recognition. Recognize and reward personnel who make outstanding contributions to ICT security.

  6. Email Hygiene. Do not open emails or attachments from unknown or unverified senders.

  7. Account Discipline. Shared use of a single system account by multiple persons is prohibited.

2) Security Objectives

Our information security management objectives are to protect the Company’s information and personal data assets, ensure CIA under applicable laws, regulations, and contractual requirements, and safeguard user privacy—so that critical operations run safely and reliably, deliver quality service to customers, and meet their needs. With the joint efforts of all employees, we aim to achieve:

  1. Access Control. Protect business information from unauthorized access.

  2. Integrity Assurance. Protect business information from unauthorized modification to ensure accuracy and completeness.

  3. Governance Structure. Maintain a cross-functional security organization to formulate, implement, and continuously improve security management and provide a reliable environment for ongoing operations.

  4. Education. Conduct security education and training to promote awareness and clarify related responsibilities.

  5. Risk Assessment. Perform information security risk assessments to enhance effectiveness and timeliness of security management.

  6. Internal Audit. Implement internal audits to ensure effective execution of security controls.

  7. Compliance. Ensure all business activities comply with applicable laws and regulations.

Effective Date: 2024/09/01
Contact
For security or privacy concerns, including potential vulnerability reports, please use our [Contact PWI] page.