Article 1 |
(Purpose)
For the purpose of strengthening the information and communication security of securities firms, futures commission merchants, and securities investment trust and consulting enterprises, these cybersecurity protection reference guidelines are drafted addressing cybersecurity risk issues in accordance with the financial data security action plan of the Financial Supervisory Commission to improve data security of financial enterprises.
|
Article 2 |
(Applicability and Parties Governed)
Parties governed by these guidelines include securities firms, futures commission merchants, securities investment trust enterprises and securities investment consulting enterprises and are divided into two types as below:
- Type 1:
- organizations appointing a chief information security officer in accordance with Article 36-2 of the Regulations Governing the Establishment of Internal Control Systems by Service Enterprises in Securities and Futures Markets.
- tiers 1, 2, and 3 securities firms in the Establishing Information Security Inspection Mechanisms for Securities Firms - Schedule for Required Measures under Tiered Protection.
- tiers 1, 2, and 3 futures commission merchants in the Establishing Information Security Inspection Mechanisms for Futures Commission Merchants - Schedule for Required Measures under Tiered Protection.
- Type 2:
non-type 1 organizations.
- If the data security management policy of a Taiwan subsidiary or branch of a foreign group is controlled and established by the foreign parent company or head office, the relevant control measures established or set up by the parent company or head office prevail if they provide for better regulation. Taiwan laws and regulations shall be observed if no such measures are in place.
- The reference guidelines below address matters to be observed by types 1 and 2 organizations unless otherwise specially remarked.
|
Article 3 |
(Definitions)
- Information and communication system:
A system used for collecting, controlling, transmitting, storing, circulating, deleting information or otherwise processing, using, and sharing information.
- Access:
Access of an information asset by various means, including acquisition, use, safekeeping, inquiry, revision, adjustment, destruction, etc.
- Network equipment:
Components for network communication which are required for transmitting data, programs, services, and multimedia, such as firewalls, routers, switches, etc., as also included in the network diagram of an organization.
- Information and communication security event:
An event where a system, service, or network is found upon evaluation to show signs of a possible breach of the information and communication security policy or failure of a protective measure, which impacts the operation of the information and communication system, constituting a threat against the information and communication security policy.
- Information asset:
An asset pertaining to the processing of information, including hardware, software, data, documents, and personnel, etc., such as information of the operating system, applications, and other software of a server or a user's computer.
|