Information security policies and goals

In order to implement comprehensive IT systems and management procedures in place for protection of information securities, to prevent damaged by various, human error sabotage, natural disasters, potential environmental. We actively promote system confidentiality, integrity and availability of securities.

To protect stakeholders' rights and benefits, Meiloon is committed to introduced Over-the-counter (OTC) process of trading securities and enhance the security with meaningful guidance and self-audit procedures to protect trade secrets and confidential information.

Scope: All employees, people who involved the company's business, information and equipment/service supplier, and outsourced third parties.

The Management Measures for Information Security Protection Measures Include the Following:

  • Perform regular internal training to review the entire management system to institutionalize the operations of the information security management system.
  • Perform regular seminar and external training course.
  • IT equipment management.
  • Server room administration and management.
  • Software develop and management.
  • Information security and management.
  • IT recourse and administration.
  • Server backup and restore management.
  • Network access management.
  • information and communication technology management.
  • E-mail administration.
  • Network usage management.
  • Software/Hardware management.
  • IT outsourcing management.
  • IT risk assessment and incident response.
  • Regular audit and corrective/prevent action.