In 2024, GOODWAY established an Information Security Committee, a Chief Information Security Officer (CISO), and dedicated personnel in accordance with the ISO 27001:2022 standards. The organizational structure is shown in the diagram. Responsibilities and authorities are defined based on business operations. The committee conducts regular internal reviews of information security policies, reports to senior management, and submits annual performance and development objectives to the Board of Directors.
To ensure the foundation for the company’s sustainable operation and effectively manage enterprise risk governance, GOODWAY continuously strengthens its information security management to safeguard the confidentiality, integrity, and availability of information, protecting it from intentional or accidental internal and external threats. GOODWAY has implemented and obtained ISO 27001:2022 certification in 2025. According to its management policies, the framework is divided into technology application and personnel training. The management details are outlined as follows:
To guard against various external cybersecurity threats, GOODWAY has actively implemented and optimized security defenses in recent years. The company has joined information-sharing centers such as the TWISAC Cybersecurity Alliance and the SP-ISAC Science Park Information Sharing and Analysis Center to obtain the latest threat intelligence. Additionally, GOODWAY has established an external emergency contact list, including key organizations such as the Central Taiwan Science Park Administration, Taichung City Fire Department, Taichung City Police Department, and Cheng Ching Hospital, to serve as first-line reporting agencies for information and physical security risks.
To prevent external hacker intrusions and computer virus threats, in addition to implementing firewalls, antivirus, and anti-ransomware systems, we also engage professional cybersecurity consultants to conduct security assessments and vulnerability scans to identify and remediate potential system weaknesses and flaws.
Access to internal systems and data is managed based on a zoned and layered control principle. Personnel cannot use unauthorized system functions or access data without permission. Following access management policies, procedures for access request and revocation are established, and annual access audits are conducted to ensure proper and accurate permission allocation.
To strengthen system access control mechanisms, in addition to managing systems with multi-layered network architecture for different purposes and restricting external access methods, endpoint management, network behavior monitoring, and alert systems are deployed to record user activities, automatically detect anomalies, and notify administrators for prompt action.
To ensure the stability of internal system operations and minimize downtime during system failures, backup mechanisms are established for all information services. Critical hardware and network facilities are also equipped with redundancy to prevent service interruptions.
Based on the current status of cybersecurity implementation and incident developments, education and cybersecurity awareness programs are conducted to enhance internal staff’s cybersecurity knowledge and vigilance.
Based on the current state of cybersecurity implementation and incident trends, education and awareness programs are conducted to enhance internal staff’s cybersecurity knowledge and vigilance.
Information security is a top priority for enterprise digitalization. In response, GOODWAY allocates corresponding resources as outlined below:
In 2024, the Information Security Committee was established, led by the General Manager, Executive Vice General Manager, and Chief Information Security Officer (CISO). The committee appoints a dedicated IT supervisor, a management representative, an Information Security Task Force, and an Internal Audit Team, all responsible for developing corporate cybersecurity plans and strengthening digital data security.
An annual risk assessment of corporate assets is conducted to set information security objectives. Regular risk reviews are performed, and improvement measures and countermeasures are established based on assessment results. Additionally, the company participates in information defense alliances to maintain timely internal and external asset protection and cybersecurity intelligence.
In 2025, the company obtained ISO 27001 information security certification and commissioned a third-party verification agency to conduct vulnerability scans.
Core systems have annual maintenance agreements with vendors, backup mechanisms are established for data servers, and asset maintenance is conducted according to risk assessment classifications.
All employees undergo annual cybersecurity training, core personnel complete 12 hours of cybersecurity education along with comprehensive advanced exercises, and company-wide social engineering drills are conducted irregularly each year with a passing score set at 80.
Over 10 information security notices are issued annually to communicate the importance of cybersecurity and raise individual security awareness.
Monthly cybersecurity performance summaries are provided to department supervisors, strategic reviews and adjustments are conducted semiannually, and annual reports on cybersecurity performance and budget reviews are presented to the Board of Directors.