panyhassetupastronganti-corruptionreportingandcomplaintmechanism,formalizedintheProcedur-
followedbydetailedriskprofiling. byintegratingdimensionssuchas acceptance,riskreduction, alforComplaintResolution.Thissystemactivelyencouragesemployeesandpartnerstoreportunethicalorcorrupt
severityofimpactandlikelihood riskavoidance,andother activities.Duringthereportingyear,thecompanyreceivednoreportsofbusinessethicsorcorruptionviolations.
ofoccurrence.Risksarethen countermeasuresshouldbetaken
classifiedintospeciallevels. respectively. To further strengthen its anti-corruption culture, the company conducted a 1-hour anti-corruption training session
throughinternalchannels,with12participantsfromkeydepartments,includingprocurement.Thisinitiativealigns
withongoingeffortstoembedintegrityandcomplianceawarenessacrossalloperations.
SafeguardingInformationSecurity AccessQualificationReview
Amidst the accelerating wave of digital transformation, information security has become a critical priority in the Conduct rigorous reviews of user access privileges, immediately deactivate accounts upon employee
company's operational processes. Strictly adhering to Chinese regulations, including the Cybersecurity Law of the termination, and enforce strict compliance with established protocols across all subsidiaries.
People's Republic of China, Data Security Law of China, Personal Information Protection Law of China, and the
Administrative Measures for the Graded Protection of Information Security, we have established comprehensive
governanceframeworkssuchasInformationSecurityManagementSystem,InformatizationResourceManagement AccessSegregation
System, and Informatization Emergency Plan. A three-level organizational structure dedicated to information secu- The company enforces strict controls over access privileges for its application systems. This includes careful
rityoversightensurescontinuousenhancementofourdataprotectionandprivacypreservationsystems. management of user registration, modification of privileges, and revocation of access. We utilize identity
authenticationandencryptedloginmechanismstograntuseraccessrightsbasedontheirroles.Thisensuresthat
sensitiveinformationisonlyavailabletoauthorizedpersonnel,preventinganyunauthorizeddisclosureofpersonal
ZNSHINEInformationSecurityManagementFramework informationandrelateddata.
InformationSecurity SystemBackupProtocols
LeadershipTeam
Chief Information The company has established a comprehensive data backup system where MES, and CRM system
Security Officer databases undergo weekly full backups to ensure data integrity. In addition, real-time incremental
backups are triggered immediately after large-scale data updates.
Hardware SystemAdministrator HeadofSafetyand NetworkAdministrator
Administrator Environment