Corporate Governance Operations

Corporate Governance Operations

1. Information Security Policy
▌Ensure that the company’s confidential information, information security policies, information security operating procedures, and related business secrets and personal data are properly controlled and protected to avoid corporate losses in the event of attacks or sabotage (damage) risks, and related information security policies must comply with relevant domestic and foreign laws and regulations and international standards.
2. Information Security Risk
The Company’s information security matters are centrally coordinated and planned by the MISD and are managed in accordance with procedures such as the Information Security Management Policy and the Information Security Incident Reporting Procedure. The related operations are as follows:
▌Data Protection:
Information systems are scheduled for regular backups, including on-site and off-site backups, to maintain data redundancy and backup mechanisms.
▌System Monitoring:
Information systems undergo daily (business days) inspections of hardware and connectivity status. In addition, the temperature and humidity of the server room are monitored once in the morning and once in the afternoon.
▌System Protection:
This includes software and hardware security updates, installation of antivirus software, virus definition updates, and regular security scans.
▌Network Protection:
Firewalls are implemented, and the internal network is segmented into Virtual Local Area Networks (VLANs) by department. A Demilitarized Zone (DMZ) is also established to separate internal and external public access areas.
▌Audit Operations:
Internal and external audits are scheduled annually to implement and maintain information security.
▌Information Security Awareness:
Information security practices and policies are promoted through new employee training, information service request processes, and routine maintenance activities.
3. Information Security Management
| Information Security Management | ||
|---|---|---|
| Type | Directions | Execute |
| Account permission management | Management of various information system accounts and related permissions | Open relevant accounts and corresponding system permissions (access level, read, write, delete) according to the signed information system application form. |
| Password management | Password management for various information systems | 1. Change system password regularly. 2. Confidential system password is independent. 3. Password complexity and number of characters rules. |
| Network management | Prevent informal devices from accessing information systems through the network | 1. Network segmentation management for each department. 2. If an irregular device is detected to be connected to the network, it will be disconnected immediately. |
| External threats | System vulnerability protection measures | 1. The equipment is regularly updated (delivered) with system updates. 2. Install anti-virus software and update virus codes. |
| System availability | Information system availability assessment and handling of system service interruptions | 1. System data is backed up as scheduled. 2. Local and off-site backup and recovery mechanisms. 3. Conduct regular disaster recovery drills. 4. System service interruption. |
| Access control management | Computer room access control and personnel management | 1. If there are no information personnel in the computer room, the room will remain locked. 2. Manufacturers must be accompanied by information personnel when entering the computer room and fill in the computer room entry and exit registration book |
| Security personnel | Information security team, responsible for performing information security related operations | 1 information security manager and 1 information security personnel have been deployed |
| Information Security Meeting | Holds information security meetings every month | 1. Information security meetings are held regularly to discuss and track information security issues and events. 2. Ensure meeting minutes and information security incident records. |
4. Information Security Incident Reporting Procedure

5. Intellectual Property Management Plan and Implementation Status
In accordance with the Company’s development strategy and operational objectives, the Company is committed to enhancing research and development performance in order to increase corporate profitability and create future value. To protect its research achievements, the Company complies with relevant domestic and international intellectual property laws and regulations, including patent, trademark, and copyright laws. A comprehensive intellectual property management plan has been established to govern the acquisition, maintenance, and utilization of intellectual property and to implement and promote the Company’s intellectual property policies.
1. Patent Management
The Research and Development Department is responsible for technology development. External patent firms are engaged from time to time to assist with patent portfolio planning and application strategies. The Company’s patents are primarily applied to flash memory storage devices.
2. Trademark Management
The Legal Department, in cooperation with external trademark firms, oversees the Company’s overall trademark application and portfolio planning. Trademark strategies are formulated based on the Company’s core business activities and target markets, with the aim of safeguarding brand value.
3. Trade Secret Management
The following provisions are stipulated in employment contracts:
(1) Employees are obligated to maintain the confidentiality of business matters they handle personally as well as the Company’s confidential information.
(2) During and after the term of employment, employees shall not disclose any business secrets. In the event of a violation, the Company may impose disciplinary actions in accordance with relevant regulations and reserves the right to pursue legal remedies and claim damages.
(3) Employees shall not disclose or use any trade secrets belonging to former employers.
Implementation Status:The Company reports intellectual property–related matters to the Board of Directors at least once a year. In 2025, intellectual property–related matters were reported to the Board of Directors on November 11. The results of the implementation of the intellectual property management plan in recent years are summarized as follows:
1. Employee Training on Intellectual Property and Trade Secret Protection
All new employees are required to complete training courses on intellectual property and trade secret protection, followed by post-training assessments, in order to enhance their awareness of intellectual property protection. As of September 30, 2025, a total of 56 employees had participated in 112 hours of related training.
2. Online Learning Program
Intellectual property and trade secret protection courses have been incorporated into the Company’s online learning platform (AS E-Learning), enabling all employees to access the courses at any time.
3. Incentives for Innovation and Invention
The Company encourages employees to engage in creative inventions and product research and development to strengthen its intellectual property portfolio and enhance competitiveness. As of September 30, 2025, 23 employees qualified as recipients of innovation-related incentives.
4. Intellectual Property Portfolio and Achievements
As of September 30, 2025, the Company’s intellectual property holdings and achievements are as follows:
● Patents:
(1) Taiwan: 52 invention patents and 2 utility model patents.
(2) China: 26 invention patents and 2 utility model patents.
(3) United States: 3 invention patents.
● Trademarks:
(1) Taiwan: 9 registered trademarks.
(2) China: 6 registered trademarks.
6. Human Rights Policy and Implementation
We support the UN Universal Declaration of Human Rights (UDHR), The United Nations Global Compact (UNGC), and the ILO Convention. We are committed to treating all workers with dignity and respect in the workplace. Accordingly, ASolid’s Regulations for Human Rights Policy and Management Programs are established and prohibit any form of infringing human rights.
1. Inclusive Workplace and Equal Opportunities
1.1. ASolid worships the fair and objective spirits, besides evaluating job seekers’ overall performance, prioritizing candidates with disabilities when engaging employees.
1.2. For recruitment, remuneration package, training, promotion, dismissal, retirement, or any other labor rights, no employee or candidate will be discriminated against due to the following factors.
(Discriminations include but are not limited to race, social gap, language, thoughts, religion, political orientation, nationality, gender, sexual orientation, age, marital status, appearance, disability, sign, blood type, etc.)
2. Child Labor Avoidance
2.1. To protect the healthy development of children both physically and mentally, ASolid will not accept any applicants under the age of 16 to apply for our job openings.
2.2. Newly hired employees should submit identity proving documents (including ID Card, driver’s license, health insurance card, academic certificate, etc.) on the day of registration to verify that they have reached the age of 16 before being hired.
3. Working Hours
The work rules for working hours, recess, holidays, annual paid leave of absence, length of overtime work, and miscellaneous matters are complying with the laws and regulations.
4. Wages and Benefits
4.1. The company shall pay worker wages complying with the laws and regulations, including basic wage, overtime wages, etc. The company shall not make a deduction of wages as a penalty for disciplinary sanction.
4.2. In addition to the benefits stated by the Labor Standard Act, the company also provides Group Insurance and Welfare Programs for employees.
5. Appeals System
The company has set up clear appeals channels to communicate effectively with employees and handle appeal cases with justice. In addition, to prevent the occurrence of sexual harassment and establish a gender-friendly workplace for personnel and candidates, anyone who experiences workplace discrimination or harassment could appeal to the company according to the Regulations for Complaints of Sexual Harassment at Workplace. The company should investigate confidentially, should not reveal the actual name and the identity of the protected complainants.
6. Collective Bargaining
ASolid has set up labor-management meetings and organized regular meetings.
If the company operation or management systems changes violate labor rights, employees may negotiate through Collective Bargaining and establish effective mutual communication.
7. Privacy Protection
To protect the Right to Privacy, we implement an improving Information Security Management System and strictly abide by regulations and protective measures.
8. Occupational Safety and Health
ASolid builds a safe and healthy workplace according to the regulations. And well-known physical examination centers are provided for employees to do physical checkups to understand their own health conditions. In addition, the company offers regular training to prevent the occurrences of occupational injuries and reduce the risk factors in the workplace.
9. Execution Method
Human Resource Department disseminates Ethical Management Policy, Codes of Ethical Conduct, Human Right Policy, etc., to new employees and all personnel by the method of face-to-face instruction, online teaching, or internal website announcement.
7. Information Security Implementation Status
8. Assessment of CPA Independence
▌The Company conducts an annual assessment of the independence and professional competence of its certifying certified public accountants (CPAs) with reference to Audit Quality Indicators (AQIs). The most recent assessment results were submitted to and approved by the Audit Committee and the Board of Directors on March 11, 2025.
9. Implementation Status of Personal Data Protection Policy
▌To ensure the lawful collection, processing, and use of personal data, safeguard personality rights, personal privacy, and the public interest, and comply with the Personal Data Protection Act and its Enforcement Rules, the Company has established the Personal Data Protection Policy and Management Guidelines. These apply to the collection, processing, storage, use, and transmission (in both written and electronic forms) of personal data relating to the Company, its affiliated companies, customers, and outsourced service providers.
▌The Human Resources Department is responsible for the overall coordination, planning, supervision, and management of security measures and management mechanisms for personal data protection. It is also responsible for communicating relevant policies to employees. In 2025, as of September 30, a total of 56 newly hired employees had confirmed and signed the relevant acknowledgment documents.
ASOLID TECHNOLOGY
A leader in control chips to quickly deliver forward-looking and competitive solutions A leader in control chips to quickly deliver forward-looking and competitive solutions
ASolid is the revolutionist in NAND controller technology and quality. Over 80% employees of ASolid are RD engineers, forming the company’s solid innovation strength and excellence. At ASolid, we strive to meet customer demands within quick turnaround times, and create long-term WIN-WIN partnerships through our professional teamwork and full integration of industry technologies, experiences and product competitiveness.
ASOLID TECHNOLOGY
A leader in control chips to quickly deliver forward-looking and competitive solutions A leader in control chips to quickly deliver forward-looking and competitive solutions
ASolid is the revolutionist in NAND controller technology and quality. Over 80% employees of ASolid are RD engineers, forming the company’s solid innovation strength and excellence. At ASolid, we strive to meet customer demands within quick turnaround times, and create long-term WIN-WIN partnerships through our professional teamwork and full integration of industry technologies, experiences and product competitiveness.

ASOLID TECHNOLOGY
Contact E-Mail
▎Sales and Marketing:sales.asolid@asolid-tek.com
▎Technical:service.asolid@asolid-tek.com
▎HR:interview.asolid@asolid-tek.com
▎Investor mailbox:ir@asolid-tek.com

