ZeroTech

Cyber Security

Cyber Security System Construction

In order to achieve cyber security and user privacy data protection system construction, we conduct security protection from nine aspects:

Security Agreement

Enhancing the security awareness of internal and external personnel of the organization and ensuring the implementation of cyber security measures.

Security Assurance System

The construction of security organization and security system is the cornerstone of the company’s cyber security construction.

Continuously identify risks

Security risk assessment

Regularly audit the implementation of security procedures

Key Parts Cyber Security

Ensure the integrity, confidentiality, availability and source reliability of key parts cyber security.
  • Define cyber security key parts

  • Identify the sources of the cyber security key parts

  • Access control of the storage area of cyber security key parts

  • Format the storage device before use

  • Regular inventory and virus killing

  • Physically destroy the scrapped cyber security key parts

Software Security

Software burning and testing

Software programs

Segregated from office area

Key area management

IT system for production and delivery

Security Monitoring

Antivirus

Personal Privacy Protection

The data privacy protection throughout the entire life cycle (collection, transmission, storage, use and destruction), to ensure personal privacy data is not compromised.

Privacy data protection life cycle

Collection security

Transmission security

Storage security

Security to use

Destruction security

Protection principle

Logistics Security

Supply chain management

Security control of logistics services

Violation management

Forward and Reverse Material Maintenance Security

The construction of security organization and security system is the cornerstone of the company’s cyber security construction.

Emergency Response

Security emergency response organization

Leading Group of Emergency Response

ZeroTech Security Response Center

Intelligence Gathering Group of Emergency Response

Attack Event

Information Disclosure

Security Event

Supplier Warning

OSS Warning

Traceability

Establish a backtracking management policy create clear records in product design, production, installation, testing, warehousing, transportation so that any possible product security problem can be clearly located and backtracked.

Personnel Management

Personnel management is a very important item in the cyber security system. It conducts a comprehensive management of personnel through the three stages of employees before they start, when they are on the job, and after they leave the job.

Key cyber security positions

Entry ago

On-the-job

Leave