{"id":5810,"date":"2025-10-27T10:32:36","date_gmt":"2025-10-27T02:32:36","guid":{"rendered":"http:\/\/localhost\/?page_id=5810"},"modified":"2026-01-07T18:34:23","modified_gmt":"2026-01-07T10:34:23","slug":"information_security","status":"publish","type":"page","link":"https:\/\/www2.whetron.com\/en\/information_security\/","title":{"rendered":"Information Security Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5810\" class=\"elementor elementor-5810\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c6b3ffb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6b3ffb\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-098043d\" data-id=\"098043d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ae98a8 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"8ae98a8\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Management<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-611051c elementor-widget elementor-widget-breadcrumbs\" data-id=\"611051c\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www2.whetron.com\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13a95fa elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"13a95fa\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-293370a\" data-id=\"293370a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-485d5ae elementor-widget elementor-widget-shortcode\" data-id=\"485d5ae\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"8116\" class=\"elementor elementor-8116\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cfc4a2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cfc4a2e\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-92633cb\" data-id=\"92633cb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a100cc elementor-nav-menu__align-justify elementor-nav-menu--dropdown-none elementor-widget elementor-widget-nav-menu\" data-id=\"3a100cc\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;horizontal&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;svg aria-hidden=\\&quot;true\\&quot; class=\\&quot;e-font-icon-svg e-fas-caret-down\\&quot; viewBox=\\&quot;0 0 320 512\\&quot; xmlns=\\&quot;http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\&quot;&gt;&lt;path d=\\&quot;M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\\&quot;&gt;&lt;\\\/path&gt;&lt;\\\/svg&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"\u9078\u55ae\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-horizontal e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-3a100cc\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7302\"><a href=\"https:\/\/www2.whetron.com\/en\/board_directors\/\" class=\"elementor-item\">Board of Directors<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-8412\"><a href=\"https:\/\/www2.whetron.com\/en\/audit_committee\/\" class=\"elementor-item\">Functional Committees<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7305\"><a href=\"https:\/\/www2.whetron.com\/en\/governance_officer\/\" class=\"elementor-item\">Corporate Governance Officer<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7304\"><a href=\"https:\/\/www2.whetron.com\/en\/business_integrity\/\" class=\"elementor-item\">Ethical Management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7301\"><a href=\"https:\/\/www2.whetron.com\/en\/information_security\/\" class=\"elementor-item\">Information Security Management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7303\"><a href=\"https:\/\/www2.whetron.com\/en\/charters_and_bylaws\/\" class=\"elementor-item\">Important Company Regulations<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-3a100cc\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7302\"><a href=\"https:\/\/www2.whetron.com\/en\/board_directors\/\" class=\"elementor-item\" tabindex=\"-1\">Board of Directors<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-8412\"><a href=\"https:\/\/www2.whetron.com\/en\/audit_committee\/\" class=\"elementor-item\" tabindex=\"-1\">Functional Committees<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7305\"><a href=\"https:\/\/www2.whetron.com\/en\/governance_officer\/\" class=\"elementor-item\" tabindex=\"-1\">Corporate Governance Officer<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7304\"><a href=\"https:\/\/www2.whetron.com\/en\/business_integrity\/\" class=\"elementor-item\" tabindex=\"-1\">Ethical Management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7301\"><a href=\"https:\/\/www2.whetron.com\/en\/information_security\/\" class=\"elementor-item\" tabindex=\"-1\">Information Security Management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-7303\"><a href=\"https:\/\/www2.whetron.com\/en\/charters_and_bylaws\/\" class=\"elementor-item\" tabindex=\"-1\">Important Company Regulations<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a8508a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a8508a\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40e3970\" data-id=\"40e3970\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12cb619 gc_li_ol elementor-widget elementor-widget-text-editor\" data-id=\"12cb619\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"font-size: 170%;\">1. Information Security Policy<br \/><\/span><\/strong><br \/>1.1 The management level shall pledge to maintain information security, continuously improve information security quality, and reduce the occurrence of information security incidents to safeguard the rights and interests of clients.<\/p><p>1.2 Establish an information security organization and define the division of responsibilities to facilitate the implementation of information security operations.<\/p><p>1.3 Establish safe and reliable information system services to ensure the sustainable operation of the company&#8217;s business.<\/p><p>1.4 Strengthen information operation management, implement access controls for information systems and data, and prevent unauthorized access and modification.<\/p><p>1.5 Implement physical related control measures to ensure the safety of work areas and places, preventing theft or damage to information assets.<\/p><p>1.6 Implement technical related control measures to manage risks caused by information security vulnerabilities.<\/p><p>1.7 Establish mechanisms for monitoring, reporting, and responding to information security incidents to ensure that security incidents can be responded to, controlled, and handled promptly and properly, minimizing the scope of impact and damage.<\/p><p>1.8 Strengthen the training of information security management personnel to enhance the company&#8217;s information security management capabilities.<\/p><p>1.9 Enhance employee information security awareness to reduce information security disasters caused by human factors.<\/p><p>1.10 Grasp the pulse of information industry technology and information security development trends to strengthen corporate information governance.<\/p><p>1.11 Formulate relevant information security management procedures and regulations based on the scope of this Information Security Policy to serve as the basis for information security management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>1. Information Security Policy1.1 The management level  [&#8230;]\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5810","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.0 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Information Security Management - \u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www2.whetron.com\/en\/information_security\/\" \/>\r\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Information Security Management\" \/>\r\n<meta property=\"og:description\" content=\"1. Information Security Policy1.1 The management level [...]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www2.whetron.com\/en\/information_security\/\" \/>\r\n<meta property=\"og:site_name\" content=\"\u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-01-07T10:34:23+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"512\" \/>\r\n\t<meta property=\"og:image:height\" content=\"512\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u5206\u9418\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/\"},\"author\":{\"name\":\"gcreate\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/c24b7c480a2b37ccd6593bad41c5d3dc\"},\"headline\":\"Information Security Management\",\"datePublished\":\"2025-10-27T02:32:36+00:00\",\"dateModified\":\"2026-01-07T10:34:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/\"},\"wordCount\":233,\"publisher\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/#organization\"},\"inLanguage\":\"zh-TW\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/\",\"url\":\"https:\/\/www2.whetron.com\/en\/information_security\/\",\"name\":\"Information Security Management - \u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9\",\"isPartOf\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/#website\"},\"datePublished\":\"2025-10-27T02:32:36+00:00\",\"dateModified\":\"2026-01-07T10:34:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www2.whetron.com\/en\/information_security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www2.whetron.com\/en\/information_security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www2.whetron.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#website\",\"url\":\"https:\/\/www2.whetron.com\/en\/\",\"name\":\"Whetron Electronics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/#organization\"},\"alternateName\":\"Whetron Electronics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www2.whetron.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#organization\",\"name\":\"Whetron Electronics\",\"alternateName\":\"Whetron Electronics\",\"url\":\"https:\/\/www2.whetron.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png\",\"contentUrl\":\"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Whetron Electronics\"},\"image\":{\"@id\":\"https:\/\/www2.whetron.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/c24b7c480a2b37ccd6593bad41c5d3dc\",\"name\":\"gcreate\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2c66e2977beec6578d393ea03148d7ebbd30f18df8b44f513f022442e58085c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2c66e2977beec6578d393ea03148d7ebbd30f18df8b44f513f022442e58085c8?s=96&d=mm&r=g\",\"caption\":\"gcreate\"},\"sameAs\":[\"https:\/\/demo2.gcreate.com\/publish\"]}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security Management - \u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www2.whetron.com\/en\/information_security\/","og_locale":"zh_TW","og_type":"article","og_title":"Information Security Management","og_description":"1. Information Security Policy1.1 The management level [...]","og_url":"https:\/\/www2.whetron.com\/en\/information_security\/","og_site_name":"\u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9","article_modified_time":"2026-01-07T10:34:23+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www2.whetron.com\/en\/information_security\/#article","isPartOf":{"@id":"https:\/\/www2.whetron.com\/en\/information_security\/"},"author":{"name":"gcreate","@id":"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/c24b7c480a2b37ccd6593bad41c5d3dc"},"headline":"Information Security Management","datePublished":"2025-10-27T02:32:36+00:00","dateModified":"2026-01-07T10:34:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www2.whetron.com\/en\/information_security\/"},"wordCount":233,"publisher":{"@id":"https:\/\/www2.whetron.com\/en\/#organization"},"inLanguage":"zh-TW"},{"@type":"WebPage","@id":"https:\/\/www2.whetron.com\/en\/information_security\/","url":"https:\/\/www2.whetron.com\/en\/information_security\/","name":"Information Security Management - \u8f1d\u5275\u96fb\u5b50\u82f1\u6587\u7ad9","isPartOf":{"@id":"https:\/\/www2.whetron.com\/en\/#website"},"datePublished":"2025-10-27T02:32:36+00:00","dateModified":"2026-01-07T10:34:23+00:00","breadcrumb":{"@id":"https:\/\/www2.whetron.com\/en\/information_security\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www2.whetron.com\/en\/information_security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www2.whetron.com\/en\/information_security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www2.whetron.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Management"}]},{"@type":"WebSite","@id":"https:\/\/www2.whetron.com\/en\/#website","url":"https:\/\/www2.whetron.com\/en\/","name":"Whetron Electronics","description":"","publisher":{"@id":"https:\/\/www2.whetron.com\/en\/#organization"},"alternateName":"Whetron Electronics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www2.whetron.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www2.whetron.com\/en\/#organization","name":"Whetron Electronics","alternateName":"Whetron Electronics","url":"https:\/\/www2.whetron.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www2.whetron.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png","contentUrl":"https:\/\/www2.whetron.com\/en\/wp-content\/uploads\/2025\/10\/whetron_favicon.png","width":512,"height":512,"caption":"Whetron Electronics"},"image":{"@id":"https:\/\/www2.whetron.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/c24b7c480a2b37ccd6593bad41c5d3dc","name":"gcreate","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www2.whetron.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2c66e2977beec6578d393ea03148d7ebbd30f18df8b44f513f022442e58085c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c66e2977beec6578d393ea03148d7ebbd30f18df8b44f513f022442e58085c8?s=96&d=mm&r=g","caption":"gcreate"},"sameAs":["https:\/\/demo2.gcreate.com\/publish"]}]}},"_links":{"self":[{"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/pages\/5810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/comments?post=5810"}],"version-history":[{"count":17,"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/pages\/5810\/revisions"}],"predecessor-version":[{"id":10695,"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/pages\/5810\/revisions\/10695"}],"wp:attachment":[{"href":"https:\/\/www2.whetron.com\/en\/wp-json\/wp\/v2\/media?parent=5810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}