IIC-Taiwan Home

 General Information
 About the Show
 Show Management
 Show Report
 Picture Gallery
 Official Publications

News
 Press Releases
 Market Updates

 Exhibition Visitors
 Exhibitor List
 Products at the Show
 Registration Form

 Conference Visitors
 Conference Overview
 Conference Program
 Conference Abstracts
 Registration Form

 Exhibitors
 Who Should Exhibit
 Exhibitor Inquiry

 Speakers
 Who Should Present
 Submit an Abstract

 Help
 Site Map
 Contact Us

 Other Shows
 Global Sources Events

 Global Sources
 All Shows
 Trade Show Center
 Global Sources Home
Commitment to Security
As a leading provider of industry specific content and services on the Internet, we are firmly committed to information security. Our infrastructure and network are carefully protected from unauthorized access and security enhancements are constantly being implemented. You can be assured that we take strict security measures (consistent with good and sound industry practice and standards) so as to safeguard and maintain the confidentiality of our customers' personal and company-confidential information.

Corporate Security

Our internal network is protected by a secure firewall. All access to the internal network, including dial-in, e-mail and Internet access, are permitted only to authorized users. Computer accounts are password-protected and regular security audits are conducted to ensure that only secured passwords are used. Public domain hacking software is deployed to test internal security measures. Audit trails of Internet access and usage are also kept.

All our staff, as a condition of employment, are required to adhere to and practice strict security guidelines in their day-to-day job functions. An IT Security Policy is in place to ensure that all our staff are educated on the importance of confidentiality and security. In addition, our customers are made aware of our security requirements and are requested to comply.

Server Security

In general, the more customized the machine the less vulnerable the system becomes. We use highly customized Unix-based servers with only the necessary software and services installed so that they perform the required EC functions and nothing else. The machines cease to be general-purpose machines, and their vulnerabilities are greatly reduced.

Accessibility to our servers is restricted to a limited number of authorized personnel, and passwords are selected based on strict rules. For additional security, our servers are located in highly secured environments that offer state-of-the-art physical security.

Important Notice
While we believe that the security measures which we adopt are consistent with good and sound industry practice and standards, we (like anyone else) cannot guarantee that such measures are "perfect", as "perfect security" does not exist on the Internet.

Back to top



Sponsored by Asia's leading technology magazines:

official publications

  EE Times - Asia
  EE Times - Taiwan
 




Copyright@2014 eMedia Asia Ltd. All rights reserved. Reproduction in whole or in part in any form or medium without the express written permission of eMedia Asia Ltd. is prohibited. Warning: The images on this site are protected by digital watermark technology. Your use of this website is subject to, and constitutes acknowledgement and acceptance of, our Terms of Use.Find out about our Privacy Policy and our Security Commitment.