MENU CLOSE
Information Security Management

The General Manager Office is responsible for formulating information security policies, risk assessment, and implementation and follow-up of countermeasures. The CIO occasionally reports to the General Manager each year. In order to reduce the risk of non-compliance and increase customer trust, Giga Computing introduced the ISO 27001 Information Security Management Systems in 2023 to establish a complete and systematic approach to manage and protect the Company's information assets.

 

Information Security Committee

To effectively promote and manage all aspects of information security at Giga Computing, an Information Security Promotion Committee has been established. This committee is responsible for formulating the direction, strategies, and steps for information security development, as well as overseeing the initial review, promotion, and coordination of information security policies, management systems, plans, and related tasks, to ensure the continuous and stable operation of the information security management system.

 

Countermeasures for Information Security

The General Manager Office is responsible for formulating information security policies, risk assessment, and implementation and follow-up of countermeasures. The CIO occasionally reports to the General Manager each year. In order to reduce the risk of non-compliance and increase customer trust, Giga Computing introduced the ISO 27001 Information Security Management Systems in 2023 to establish a complete and systematic approach to manage and protect the Company's information assets.

 

Information Security Committee

To effectively promote and manage all aspects of information security at Giga Computing, an Information Security Promotion Committee has been established. This committee is responsible for formulating the direction, strategies, and steps for information security development, as well as overseeing the initial review, promotion, and coordination of information security policies, management systems, plans, and related tasks, to ensure the continuous and stable operation of the information security management system.

 

Countermeasures for Information Security