Gentrice
Legal

Information Security Policy

Information security is a core commitment at Gentrice. The following policies describe how we protect client data and systems across our organization, people, processes, and technology.

Gentrice information security certification
Certification

Independently Certified Information Security

Gentrice's information security management system has been independently audited and validated against internationally recognized standards. We maintain and periodically recertify our compliance to keep our policies and practice in step.

Click the certificate to view the full image.

01

Regulatory Compliance

The company's information security management practices comply with applicable government laws and regulations, including:

  • Cyber Security Management Act
  • Enforcement Rules of the Cyber Security Management Act
  • Personal Data Protection Act
  • Enforcement Rules of the Personal Data Protection Act
  • Trade Secrets Act
  • Intellectual Property Act
  • Copyright Act
02

Organizational Responsibility

The Information Security Promotion Organization is responsible for establishing and advancing the information security framework.

03

Education & Training

Information security training is conducted regularly to communicate the security policy and related implementation rules.

04

Resource Management

Management mechanisms for IT hardware and software are established to coordinate allocation and ensure effective use of resources.

05

Secure System Development

Information security factors are incorporated into new systems before deployment to prevent threats to system security.

06

Data Center Security

Physical and environmental safeguards are established for the computer room, with regular maintenance performed.

07

Access Control

Access permissions for information systems and network services are clearly defined to prevent unauthorized access.

08

Internal Audit

An internal audit plan reviews personal computer usage and the implementation of the information security framework on a regular basis.

09

Business Continuity Plan

A business continuity plan for information security is maintained and rehearsed through drills to ensure continuous operations.

10

Company-wide Responsibility

All personnel are responsible for maintaining information security and shall comply with the related management rules.

11

Policy Review

The information security policy is reviewed periodically to reflect the latest government policies, regulations, technologies, and the company's business operations.

For questions about this policy, please reach out via our contact page.

Contact Us