Information Security Management
1. All employees are required to adhere to the company's information security policies, ensuring the confidentiality, integrity, and availability of information assets. This approach also supports the goal of sustainable business operations. 

2. The policy covers device usage, media storage, access control, software, wireless networks, account passwords, system development, communication software, supplier relations, and information security incident management.