Our operating outline is as follows:
1: Formulate and implement an information security scheme for customers to ensure the security of their important data. If the information is leaked or lost due to the imperfection of the scheme or loopholes in the implementation, Daryun will pay economic compensation;
2. Help customers to formulate the classification standard of information security assets and classify the protection level of information assets, so as to determine the object of information security protection;
3. Collect customers' needs and make a risk list according to field investigation;
4. According to the above-mentioned risk list, formulate the corresponding information security construction scheme, including the management measures and technical means to be taken;
5. Help customers implement the above information security scheme, including using software and hardware tools to help customers transform the existing information security environment and build a new information security system;
6. Regularly check the information security status of customers and issue information security status reports.