Contact Us
Cybersecurity
(Kanban Image)

Information Security Risk Management Framework

At Flytech, cybersecurity stands as a paramount concern. We are dedicated to consistently enhancing the security measures safeguarding our technology infrastructure, intellectual property, and other essential information assets against cyber threats.

(Information Security Risk Management Framework)

Information Security Policy

Our Information Security Policy aims to establish secure and dependable information system services, adhere to relevant legal and regulatory requirements, ensure uninterrupted business operations, mitigate information operation risks, and safeguard the rights and interests of our customers. This policy undergoes annual evaluation, with the board of directors reviewing the information security management status in the first quarter of each year.

Information Security Statement

Our commitment to advancing information security within the company aims to develop and enhance our information security management system. We establish a suitable framework for information security management based on a process-oriented approach, which encompasses establishment, implementation, review, and continuous improvement cycles. Our objectives include achieving information security management goals and ensuring the safe and efficient operation of information processing activities.

We establish systematic information security management and conduct risk assessments based on the principles of equal emphasis on management and technology.
This approach is integrated into the daily work of all colleagues, fostering collaboration to achieve the following objectives:

  • Safeguarding company information and personal data.
  • Ensuring the security and accuracy of information processing processes and outcomes.
  • Maintaining uninterrupted information systems and services.

All colleagues involved in information security management, along with contractors, outsourced vendors, and contracted vendors for system hardware and software maintenance, are required to adhere to appropriate confidentiality measures. They are made aware that any behavior violating this policy or jeopardizing information security will be subject to standardized penalties or appropriate legal action within the company.

To ensure the safety, effectiveness, and continuous improvement of our information security operations, this statement will be periodically revised to reflect the latest developments in information security policies, laws, technologies, and operational practices.

Back to List
TOP