Sinotruk (Hong Kong) Limited
Information Security Policy
1. Purpose
To strengthen the information security management system of Sinotruk Group , clarify the information security responsibilities of all personnel, protect data integrity, prevent information security threats, and ensure the secure and controllable management of Group information assets (including business data, confidential information, intellectual property, and IT resources), thereby supporting the stable operation and compliant development of Group businesses, this policy is hereby formulated.
2. Scope of Application
This policy applies to all employees of Sinotruk Group and all 'business partners' engaging in business activities with the Group (including but not limited to customers, suppliers, agents, distributors, service providers, third-party intermediaries, etc.).
3. Core Commitments and Requirements
3.1 Continuous Improvement of the Information Security System
Sinotruk Group commits to continuously optimizing its information security management system through regular assessments, risk monitoring, and technological upgrades, ensuring its alignment with Group business development, regulatory requirements, and evolving technological environments, thereby effectively addressing emerging information security challenges.
3.2 Ensuring Data Integrity and Protection
The Group strictly protects the integrity of all business data (including financial, customer, R&D, operational, and other data) through technical and management measures such as encrypted storage, access control, and backup recovery, preventing data tampering, loss, or damage, and ensuring the accuracy, availability, and security of data throughout its lifecycle.
3.3 Monitoring and Responding to Information Security Threats
Sinotruk Group has established an information security monitoring mechanism covering networks, systems, terminals, and employee behaviors to proactively identify potential threats (such as cyberattacks, data breaches, malware, etc.). Through emergency response plans, incident handling procedures, and regular drills, the Group ensures rapid mitigation of security incidents, minimizes risk impacts, and safeguards business continuity.
3.4 Clarifying Information Security Responsibilities for All Employees
All employees of the Group (including management) are the first line of responsibility for information security. They must strictly comply with Group information security policies and operational procedures, proactively identify and report potential risks, and refrain from any non-compliant behaviors (such as disclosing confidential information, using weak passwords, or connecting unauthorized devices). Management must lead by example to foster an information security culture and ensure accountability at all levels.
3.5 Establishing Information Security Requirements for Third Parties (e.g., Suppliers)
Sinotruk Group requires all third-party partners (including suppliers and service providers) to adhere to the same information security standards during collaboration. Contractual terms will explicitly define their obligations for data protection, access permission restrictions, and accountability for violations. Prior to collaboration, third parties will undergo information security capability assessments, and ongoing supervision will be conducted during partnerships to ensure their handling of Group information complies with Group security requirements, thereby mitigating supply chain security risks.
3.6 Information Security Supervision and Management Responsibility
Sinotruk Group has established a Network Security and Informatization Leadership Group chaired by the Chairman, serving as the highest decision-making body for the group's information security supervision and management. This group is fully responsible for the strategic planning, major decision-making, and supervision of the implementation of information security work.
4. Supporting Management Requirements
4.1 Employee Behavioral Standards
All employees of the Group must strictly protect confidential information (such as customer data and R&D materials), prohibit unauthorized external transmission, retention, or use, and lock their screens promptly when leaving their workstations. When using Group IT devices, employees must set strong passwords and update them regularly, and enable encrypted communication (e.g., VPN) when processing sensitive information over public networks. Any suspicious emails, system vulnerabilities, or other anomalies must be immediately reported to the Information Security Department or direct supervisors.
4.2 Supervision and Improvement Mechanisms
The Group conducts regular information security audits and incident reviews to identify vulnerabilities and root causes, continuously optimizing protective measures. Annual information security training for all employees and specialized education for key positions are implemented to enhance risk awareness and compliance capabilities across the organization.