UTAC is committed to comply with local security legislation and internationally recognized security standards to ensure our operating environment is safe and secure for customer products to be securely process, assemble, final test and package back to customer so as, to ensure business continuity of UTAC factories by minimizing the risk of loss or damage by preventing security incidents and reducing their potential impact.
UTAC shall protect the organizational assets against all internal, external, deliberate, or accidental threats, attacks, and vulnerability. We will strive for continual improvement in-order to assure that our security management corresponds to changing conditions within the business community. Through stringent security measures, compliance with regulatory requirements, and proactive risk management, we remain committed to maintaining the highest standards of security and privacy of our customers’ data.
Our Commitment:
- Adhere to statutory, regulatory, and contractual obligations, data privacy regulations, third-party intellectual property rights, and other applicable standards.
- Maintain a comprehensive Information Security Management System, complying ISO 27001 standards to manage risks and protect all IT and Production information assets.
- Enforce security certifications such as ISO/IEC 15408 Common Criteria EAL 6, ISO 9001 and IATF 16949 at subsets at our factories.
- Ensuring the lawful and transparent processing of personal data and respecting individual’s rights regarding their data.
- Regular review of information security policies, standards, procedures, and technological controls to ensure they appropriately protect the information assets.
- Engage independent 3rd party annual audit and periodic internal audits to ensure Organization’s compliance with security policies, procedures, and the certification standards.
- Maintain an incident response plan to respond to security incidents swiftly and effectively. This includes procedures for identifying, containing, and remedying security breaches.
- Keep pace, staying agile and effective against evolving threat scenarios arising from emerging innovative technologies like artificial intelligence and digital computing.
- Inculcate constant security training & awareness to ensure all employees are educated to apply appropriate handling practices against cyber vulnerabilities and security violations.
- Regular review and update our business continuity plan to incorporate changes in the business environment and lessons learned from past incidents, where applicable.
- Maintain effective communication to our clients, investors, stakeholders about any critical security events that pose a potential risk to our production.
- Continuously strive to innovate and build strong security culture, improving security practices to stay ahead of threat actors and protect the trust our customers place in us.