About SPIL
Business Continuity and Security Policy
Business Continuity Management (BCM) Policy
SPIL is a world-class enterprise and an important partner in the semiconductor supply chain. We have established and maintained risk management mechanisms. When facing various damages, SPIL can rapidly respond to any unexpected situation to reduce business impacts and maintain competitive advantages to protect the rights and safety of SPIL, customers, investors, suppliers and employees.
SPIL BCM plan includes:

Robust risk management, effective plan and flexible resources.

Real-time review and regular drill to ensure effectiveness of the plan.

Improving BCM and strengthening company tenacity.
SPIL adheres to the commitment of business continuity to achieve sustainable business objectives and demonstrate corporate social responsibility.
Information Security Policy

Ensuring the confidentiality of information assets: implement access control over various information assets, so that only authorized personnel can access them.

Ensuring the integrity of information assets: implement various change control procedures, maintain the accuracy of equipment, systems, and information, and prevent unauthorized modifications.

Ensuring the availability of information assets: implement the maintenance of information assets, identify operational levels, and maintain and drill operational continuity plans to ensure the continued operation of information assets.
Security Policy
Adherence to Legal
Regulations:
Comply with domestic and foreign laws and regulations related to security and high security product certification guideline. Implement the security control to achieve total security management (including but not limited to access control, production, warehouse, transportation, information, personnel, facility…).
Security System
Establishment:
Implement risk assessment and construct internal and external security management system to reduce potential human damage risks of product/service.
Implementation of Security Management:
Through the security training and advocacy, enhance staff awareness of security. Review and improve safety measures and encourage full participation to demonstrate the corporate security culture.
Continuous Security Improvements:
Through periodic audit and review, achieve continuous improvement. Ensure the applicability and effectiveness of the security management system.