ABOUT TOPLOGIS
We are a provider of logistics system platform technology and value-added logistics management services to help our customers achieve global supply chain excellence and business objectives.
Our Core Competition
A company that has deep understanding of the business value of logistics industry to drive the use of technology
Our Mission Statement
Delivery intelligent supply chain and logistics solutions and service to companies with operations in Asia.
Our Value Proposition
We provide affordable cloud applications to meet dynamic supply chain and logistics management in the world.
Growth History
From 2000, Asia was positioned as a world factory. But the visibility and efficiency of supply chain logistics were still too low. Enterprise’s in-house system cannot provide sufficient function and outside information to make right decision in time. Not only that, their logistics service providers have only limited and fragmented system to support part of operation within the while supply chain processes. Currently, most of logistics solutions are fragmentation that are not fully integrated. Even in US and EU, very few of fully integrated total solution on the market. The public cloud platform would be the best solution to integrate all the partners on the up and downstream of the supply chain.
In 2004, CEO Catherine Peng founded Toplogis and invited industry celebrities to invest Toplogis with USD 5millions and positioned as board members include iDSoftCapital led by ACER founder Mr.Stan Shih, Acorn Campus Venture led by Mr.Wu-Fu Chen, Evergreen Marine Corporation and CTC Capital. Till now, Toplogis already was the largest logistics cloud platform in Taiwan. Many major international companies have entrusted us to utilize the combination of our logistics system platform and value-added services to meet the needs of their supply chain and logistics operations in and out of Asia. Our platform has integrated with over 3000 global logistics service providers and trading partners, and over US$30 billion goods are shipped annually across the globe through our platform.
In 2012, Toplogis, Inc was selected by the Ministry of Economic Affairs as a national model for the Service Industry Strategic Investment Enhancement Program . News link :2012 Press release from MOEA
In 2017, Toplogis won the Taiwan National Outstanding Application Award in the public service category. News link : 2017 Presidential Press for Cloud Outstanding Award
In 2018, Catherine, Toplogis Founder and CEO Won first place in “Outstanding Management” in the Taiwan Women Entrepreneurship Elite Awards. News link : 2018 Elite Award of Entrepreneurship
How come Toplogis impact the industry and society?
To the industry companies, we provide affordable solutions and updated applications to help our customers achieve global supply chain excellence and business objectives. Many major international companies have entrusted us to utilize the combination of our logistics system platform and value-added services to meet the needs of their supply chain and logistics operations in and out of Asia. Our platform has integrated with over 3000 global logistics service providers and trading partners, and over US$30 billion goods are shipped annually across the globe through Glory Cloud Platform.
To the industry workers: Due to the Glory Cloud Platform dramatically reduced overtime for every worker. Not only do they work much more easily and efficiently than ever but also they have learned how to digitalize and automate their operations. Finally, they have upgraded to be smart workers through working on the Glory Cloud Platform.To our society: The Glory Cloud Platform provided functions of route optimization and paperless e-document has significantly reduced carbon footprint and makes the logistics industry more eco-friendly than ever.
Awards & Certifications
Certifications
Information Security Policy and Information Security Objectives Statement
1. Policy Purpose
Toplogis Network Communications Co., Ltd. (hereinafter referred to as "the Company") establishes this Information Security Policy to ensure the secure and reliable operation of its business activities.
The Company implements an Information Security Management System (ISMS) to establish a secure and trustworthy information operating environment and to prevent information or information and communication systems from unauthorized access, use, control, disclosure, damage, alteration, destruction, or other forms of compromise.
This policy aims to ensure the Confidentiality, Integrity, and Availability (CIA) of information, as well as compliance with applicable legal and regulatory requirements, thereby safeguarding information assets, improving service quality, and supporting the Company's sustainable business operations.
2. Scope
This policy applies to all employees, partners, suppliers, contractors, and related parties who access, process, manage, or utilize the Company's information assets or information systems. All such parties are responsible for complying with the requirements of this policy.
3. Information Security Statement
"Visible but not obtainable; obtainable but not visible - For your eyes only."
4. Information Security Policy and Objectives
4.1 Compliance with International Standards
The Company shall implement and maintain information security management practices in accordance with the requirements of ISO/IEC 27001 Information Security Management System (ISMS).
4.2 Information Security Governance
The Company shall establish an Information Security Management Organization responsible for planning, implementing, operating, monitoring, reviewing, maintaining, and improving the information security management system.
4.3 Personnel Security and Legal Compliance
All employees must sign the Company's Employment and Confidentiality Agreement. External parties participating in Company projects must comply with the confidentiality provisions specified in such agreements.
All personnel shall comply with relevant national laws and regulations, including but not limited to:
- Government Procurement Act
- National Security Protection Act
- Trade Secrets Act
- Personal Data Protection Act
- Copyright Act
- Criminal Code
- Information Security Management Act
- Cyber Security Management Act and its Enforcement Rules and related regulations
No incidents involving information leakage or violations of applicable laws and regulations shall occur.
4.4 Access Control and Data Protection
Access to and modification of outsourced, collaborative, or project-related data shall be strictly controlled through appropriate access permissions. Sensitive or confidential information must be encrypted prior to transmission to ensure adequate protection during data transfer.
4.5 Personal Data Protection
The collection, processing, and use of personal data shall respect the rights and interests of data subjects and shall be conducted in a lawful, fair, and good-faith manner. Such activities shall not exceed the scope necessary for the specified purpose and must maintain a legitimate and reasonable relationship with the purpose of collection.
4.6 Intellectual Property Protection
The Company respects intellectual property rights. The installation or use of unauthorized or unlicensed software is strictly prohibited.
4.7 Information Security Awareness and Training
The Company shall regularly conduct information security education and training to enhance employees' awareness and understanding of the Information Security Policy and related implementation requirements.
5. Information Security Objectives and Measurement
5.1 Confidentiality Objective
Objective: Prevent unauthorized disclosure of information.
Measurement Indicator: The number of confirmed incidents involving the leakage of customer information or controlled documents shall be zero per year.
5.2 Integrity Objective
Objective: Ensure the accuracy and completeness of information.
Measurement Indicator: The number of reported incidents involving unauthorized data alteration shall be zero per year.
5.3 Availability Objective
Objective: Ensure the reliability and continuous availability of information services.
Measurement Indicator: The annual system availability of information service systems shall exceed 99.9%.
5.4 Legal Compliance Objectives
- Annual audits of the Information Security Management System shall ensure zero violations of applicable national laws and regulations, including the National Security Protection Act, Trade Secrets Act, Personal Data Protection Act, Copyright Act, Criminal Code, and Government Procurement Act.
- Annual ISMS audits shall ensure that violations of the Cyber Security Management Act do not exceed two incidents (inclusive) per year.
5.5 Security Awareness Training Objectives
To address evolving cybersecurity threats, the Company shall conduct information security training to strengthen employees' awareness of cybersecurity risks.
- All newly hired employees must receive information security training.
- All employees must participate in at least one information security training session per year.
6. Policy Review
6.1 Periodic Review
This Information Security Policy and its associated objectives shall be reviewed and evaluated at least once annually to ensure compliance with relevant regulations and alignment with the latest developments in information technology and cybersecurity threats.
6.2 Approval and Communication
This policy and its objectives shall be approved by the Chief Information Security Officer (CISO) and shall take effect on the date of official announcement.
The policy shall be communicated to all employees, partners, suppliers, and relevant stakeholders through written documentation, electronic communication, training sessions, internal meetings, or other appropriate methods. The same procedure shall apply to any future revisions.