Information security policy

Information Security Policy

To safeguard the confidentiality, integrity, and availability of its information assets, Jebsee has established a comprehensive information security management framework. This framework supports the continuous operation of business systems, ensures compliance with applicable laws and regulations, and protects information assets against intentional or accidental internal and external threats.

Policy Principles

  • Strengthen personnel knowledge and information security competencies
  • Prevent data leakage and unauthorized access
  • Implement effective daily system maintenance and monitoring
  • Ensure the availability and reliability of critical services

Information Security Objectives

  • Provide regular information security education and training to enhance employee awareness and clarify security responsibilities
  • Protect business and operational information from unauthorized access, alteration, or disclosure, ensuring data accuracy and integrity
  • Conduct periodic internal and external audits to verify the effective implementation of information security controls
  • Maintain defined availability levels for critical business systems to support stable and continuous operations


ISM Information Security Management Committee

In 2024, Jebsee established the Information Security Management Committee (ISMC) to strengthen information security governance across the organization. The Committee is chaired by the General Manager, with the Head of the Digital Transformation Department appointed as the Information Security Officer (ISO) and serving as the Committee Convener.

The ISMC is responsible for overseeing the implementation of information security policies, coordinating resource allocation, and ensuring the effective operation of the information security management system. The Committee regularly reports information security performance and risk status to the Chairman to support informed oversight and continuous improvement.

Information Security Governance Structure


Jebsee has established a clear and structured information security governance framework to ensure effective oversight, coordination, and incident response across the organization. Under the direction of the Information Security Management Committee, dedicated functional teams are responsible for policy execution, audit oversight, operational implementation, and incident response. This structure ensures that information security initiatives are consistently implemented, monitored, and improved across all business units and manufacturing sites.

Key Governance Functions

  • Policy & Coordination
    Oversees the implementation of information security policies, coordinates cross-functional execution, and monitors overall security status.

  • Audit & Compliance
    Conducts regular internal audits to verify the effectiveness of information security controls and ensure compliance with applicable standards and requirements.

  • Execution & Implementation
    Plans and executes information security operations, establishes management standards, and supports certification and compliance initiatives across manufacturing sites, including TISAX requirements where applicable.

  • Incident & Risk Management
    Manages information security incidents and emergency response, coordinates resource allocation during critical events, and performs risk assessments to identify and protect critical information assets.

Information Security Management Framework


Jebsee operates a structured information security management framework covering the full lifecycle of information protection, from asset identification and risk management to operational control and continuous improvement.


The framework includes:

  • Asset & Risk Management
    Identification, classification, and risk assessment of information assets to ensure appropriate protection.

  • People & Access Control
    Information security awareness training, role-based access control, and personnel security management.

  • Operational & Physical Security
    Secure operation of information systems, physical security controls, and communication management.

  • System Development & Third-Party Management
    Secure system development, maintenance processes, and oversight of outsourced service providers.

  • Incident Response & Business Continuity
    Incident management, operational resilience, and continuous operation planning.

  • Audit, Monitoring & Continuous Improvement
    Regular audits, performance measurement, corrective actions, and ongoing enhancement of security controls.


Information security seminars/professional training courses

Study Dates Organizer Course Name Continuing education hours
Cybersecurity Manager 2025/06/27 CIO Taiwan 2025 Manufacturing CIO Forum, Kaohsiung 3
Cybersecurity Manager 2025/08/22 CISO Cybersecurity Academy 2025 High-Tech Cybersecurity Forum, Hsinchu 6
Cybersecurity specialist 2025/08/27 ~ 2025/08/28 SGS Taiwan Inspection Technology ISO/IEC 27001:2022 Information Security Management System (LA Version) 16
Cybersecurity personnel 2025/04/15 ~ 2025/04/17 iThome Electric Week Cultural Project 2025 Taiwan Cybersecurity Conference 7
Information personnel 2025/02/11 ~ 2025/09/26 Hezhen Technology Services Introduction to TISAX Standards, Asset Inventory and Risk Assessment, Internal Audit 3
Information personnel 2025/03/18 ~ 2024/08/12 Hezhen Technology Services Cybersecurity General Education Course (per quarter) 3

Information security seminars/professional training courses