Cyber Security

1. Cyber security management strategy and structure

The unit in charge of information security of the Company is the Information System and Equipment Division, which is staffed with one director and several professional information personnel, is responsible for formulating internal information security policies, planning and implementing information security operations, and the promotion and implementation of information security policies, reports the Company's information security governance overview to the Audit Committee.

The Company's information security supervision and inspection unit is the Audit Office, which is staffed with one audit director and several dedicated auditors, is responsible for supervising and inspecting the implementation of internal information security matters. If relevant deficiencies are found in the inspection, the inspected unit will be required to submit relevant improvement plans and specific actions, which will be tracked for the improvement results so as to reduce internal information security risks.

Organizational operation mode - The PDCA cycle management is adopted to ensure the achievement of reliability goals and continuous improvement.

2. Cyber security policy

In order to implement the effective operation and implementation of UVB's various information management systems, we maintain the confidentiality, integrity, and availability of important information systems so as to ensure the safe operations of information systems, equipment, and networks.

UVB has established an information security management mechanism, including the following three major items:
(1) System norms: Formulate the Company's information security management systems and guidelines, and standardize the information-related operation behavior of colleagues.
(2) Application of new technology: Import and build information security management related software and hardware, and implement information security management measures.
(3) Personnel training: Regularly conduct information security education and training to enhance the information security concept of all colleagues and implement various information security measures.
Described as follows:
• System norms: The Company has formulated a number of information security management guidelines and systems to regulate the information security behavior of the Company's personnel. It regularly inspects whether the relevant systems conform to the changes in the operating environment every year, and makes adjustments in a timely manner according to needs.
• Application of new technology: In order to prevent various internal and external information security threats, in addition to adopting a multi-layer network architecture design, the Company also builds various information security protection systems and mechanisms, such as high reliability architecture (HA) of high availability, host environment backup, data backup (transaction records, differential backup, and full backup), off-site backup mechanism to improve the security of the overall information environment. In addition, in order to ensure that the operation behavior of internal personnel conforms to the Company's system norms, asset management system tools are also introduced to implement equipment and personnel information security management measures.
• Personnel training: The Company regularly organizes information security education and training courses and establishes an online learning (E-Learning) system to enhance internal personnel information security knowledge and professional skills.

3. Specific management plan:
Information Security Management Measures
TypeDescriptionRelevant operations
Authority managementManagement measures for personnel account, authority management, and system operation behaviorPersonnel account permission application management and review
Regular personnel account permissions inventory
Access controlControl measures for personnel access to internal and external systems and data transmission channelsInternal / external access control measures
Operation behavior tracking record
External threatInternal potential weaknesses, poisoning channels, and protective measuresHost / computer vulnerability inspection and update measures
Virus protection and malware detection
Malicious attacks prevention equipment
System availabilitySystem availability status and handling measures when service is interrupted Routine inspection of computer room
System / network availability monitoring and reporting mechanism
Response measures to service interruption
Information backup, local / remote backup mechanism, regular data restoration test
Host restore test
Regular disaster recovery drills
4. Resources invested in cyber security management in 2023

In April 2023, "Computer Network Information Security Operation Promotion" has been implemented.
In May 2023, the "Personal Data Protection Law" course training has been held, and new employees will also receive training when they join the company. As of 2023.12.31, a total of 326 people have been trained.
In June 2023, the "Information Security Promotion" course has been held, and new employees will also receive training when they join the company. As of 2023.12.31, a total of 324 people have been trained.
In December 2023, set up Cyber security manager and special personnel to responsible for cyber security development matters. A budget in the amount of 6 million and more is prepared for information security software and hardware updates.

5. Certificate of ISO 27001

The company has introduced the ISO 27001 international standard for information security management and obtained third-party verification in August 2023. The validity period of the certificate is from August 29, 2023 to October 31, 2025. Through the introduction of the ISO27001 information security management system, we strengthen the ability to respond to information security incidents, maintain the confidentiality, integrity, availability and legality of the company's information, as well as protect customers' personal data.

【Certificate of ISO 27001】【UVB information security elements】