


{"id":21983,"date":"2025-01-07T08:24:05","date_gmt":"2025-01-07T08:24:05","guid":{"rendered":"https:\/\/www.qbictechnology.com\/%e6%b3%95%e5%be%8b\/%e8%b3%87%e8%a8%8a%e5%ae%89%e5%85%a8%e6%94%bf%e7%ad%96%e8%88%87%e7%9b%ae%e6%a8%99\/"},"modified":"2026-01-08T04:13:45","modified_gmt":"2026-01-08T04:13:45","slug":"information-security-policy-objectives","status":"publish","type":"page","link":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/","title":{"rendered":"Information Security Policy Objectives"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"21983\" class=\"elementor elementor-21983 elementor-18951\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7db33410 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7db33410\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2ed2ec71\" data-id=\"2ed2ec71\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-764664f elementor-widget elementor-widget-heading\" data-id=\"764664f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u8207\u76ee\u6a19<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf89899 elementor-widget elementor-widget-spacer\" data-id=\"cf89899\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aee42a5 elementor-widget elementor-widget-text-editor\" data-id=\"1aee42a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u8072\u660e<\/h2>\n<p>\u5f37\u5316\u8cc7\u8a0a\u5b89\u5168\u9632\u8b77\uff0c\u78ba\u4fdd\u71df\u904b\u5b89\u5168<\/p>\n<h2>\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56<\/h2>\n<p>\u672c\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u65e8\u5728\u78ba\u4fdd\u8cc7\u8a0a\u7cfb\u7d71\u3001\u8cc7\u8a0a\u670d\u52d9\u8207\u7db2\u8def\u904b\u4f5c\u4e4b\u9806\u66a2\uff0c\u4e26\u964d\u4f4e\u4eba\u70ba\u758f\u5931\u3001\u84c4\u610f\u884c\u70ba\u6216\u5929\u707d\u6240\u9020\u6210\u7684\u98a8\u96aa\u3002\u5176\u76ee\u7684\u5728\u9632\u6b62\u672a\u7d93\u6388\u6b0a\u4e4b\u5b58\u53d6\u3001\u4f7f\u7528\u3001\u63a7\u5236\u3001\u63ed\u9732\u3001\u7834\u58de\u3001\u8b8a\u66f4\u3001\u522a\u9664\u6216\u5176\u4ed6\u640d\u5bb3\uff0c\u4ee5\u78ba\u4fdd\u8cc7\u8a0a\u8cc7\u7522\u4e4b\u6a5f\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u8207\u53ef\u7528\u6027\u3002<\/p>\n<h2>\u8cc7\u8a0a\u5b89\u5168\u76ee\u6a19<\/h2>\n<ul>\n<li>\u78ba\u4fdd\u9075\u5faa\u653f\u5e9c\u76f8\u95dc\u8cc7\u8a0a\u5b89\u5168\u6cd5\u4ee4\u8207\u898f\u7bc4\u3002<\/li>\n<li>\u638c\u63e1\u8cc7\u5b89\u8da8\u52e2\u3001\u8a55\u4f30\u98a8\u96aa\u4e26\u63a1\u53d6\u63aa\u65bd\u964d\u4f4e\u71df\u904b\u5f71\u97ff\u3002<\/li>\n<li>\u5efa\u7acb\u8cc7\u8a0a\u5b89\u5168\u7d44\u7e54\u67b6\u69cb\uff0c\u660e\u78ba\u8cac\u4efb\u4e26\u63a8\u52d5\u9632\u8b77\u63aa\u65bd\u3002<\/li>\n<li>\u63d0\u4f9b\u54e1\u5de5\u8cc7\u5b89\u6559\u80b2\u8a13\u7df4\uff0c\u63d0\u5347\u610f\u8b58\u4e26\u91d0\u6e05\u8cac\u4efb\u3002<\/li>\n<li>\u5b9a\u671f\u8a55\u4f30\u8207\u7ba1\u7406\u8cc7\u8a0a\u8cc7\u7522\u53ca\u5176\u98a8\u96aa\u3002<\/li>\n<li>\u900f\u904e\u5b9a\u671f\u7dad\u8b77\u5f37\u5316\u5be6\u9ad4\u3001\u74b0\u5883\u8207\u8a2d\u5099\u5b89\u5168\u3002<\/li>\n<li>\u8a02\u5b9a\u7db2\u8def\u898f\u7bc4\u4ee5\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u4e26\u9632\u6b62\u672a\u6388\u6b0a\u5b58\u53d6\u3002<\/li>\n<li>\u9032\u884c\u8cc7\u5b89\u7a3d\u6838\u3001\u6539\u5584\u7f3a\u5931\u4e26\u63a1\u53d6\u77ef\u6b63\u63aa\u65bd\u3002<\/li>\n<li>\u5236\u5b9a\u4e26\u6f14\u7df4\u61c9\u8b8a\u8a08\u756b\uff0c\u4ee5\u5feb\u901f\u5fa9\u539f\u4e8b\u4ef6\u5f71\u97ff\u3002<\/li>\n<li>\u660e\u8a02\u8cc7\u8a0a\u5b89\u5168\u8cac\u4efb\u8207\u4fdd\u5bc6\u7fa9\u52d9\uff0c\u5305\u62ec\u7c3d\u7f72\u4fdd\u5bc6\u5354\u8b70\u3002<\/li>\n<li>\u8490\u96c6\u8cc7\u5b89\u60c5\u8cc7\u4e26\u5be6\u65bd\u4e3b\u52d5\u76e3\u63a7\u3002<\/li>\n<li>\u5b9a\u671f\u6aa2\u8a0e\u4e26\u66f4\u65b0\u653f\u7b56\uff0c\u4ee5\u56e0\u61c9\u6cd5\u4ee4\u3001\u6280\u8853\u8207\u71df\u904b\u8b8a\u5316\u3002<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bdbb52 elementor-widget elementor-widget-spacer\" data-id=\"9bdbb52\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u8207\u76ee\u6a19 \u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u8072\u660e \u5f37\u5316\u8cc7\u8a0a\u5b89\u5168\u9632\u8b77\uff0c\u78ba\u4fdd\u71df\u904b\u5b89\u5168 \u8cc7\u8a0a\u5b89\u5168\u653f\u7b56 \u672c\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u65e8\u5728\u78ba\u4fdd\u8cc7\u8a0a\u7cfb\u7d71\u3001\u8cc7\u8a0a\u670d\u52d9\u8207\u7db2\u8def\u904b\u4f5c\u4e4b\u9806\u66a2\uff0c\u4e26\u964d\u4f4e\u4eba\u70ba\u758f\u5931\u3001\u84c4\u610f\u884c\u70ba\u6216\u5929\u707d\u6240\u9020\u6210\u7684\u98a8\u96aa\u3002\u5176\u76ee\u7684\u5728\u9632\u6b62\u672a\u7d93\u6388\u6b0a\u4e4b\u5b58\u53d6\u3001\u4f7f\u7528\u3001\u63a7\u5236\u3001\u63ed\u9732\u3001\u7834\u58de\u3001\u8b8a\u66f4\u3001\u522a\u9664\u6216\u5176\u4ed6\u640d\u5bb3\uff0c\u4ee5\u78ba\u4fdd\u8cc7\u8a0a\u8cc7\u7522\u4e4b\u6a5f\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u8207\u53ef\u7528\u6027\u3002 \u8cc7\u8a0a\u5b89\u5168\u76ee\u6a19 \u78ba\u4fdd\u9075\u5faa\u653f\u5e9c\u76f8\u95dc\u8cc7\u8a0a\u5b89\u5168\u6cd5\u4ee4\u8207\u898f\u7bc4\u3002 \u638c\u63e1\u8cc7\u5b89\u8da8\u52e2\u3001\u8a55\u4f30\u98a8\u96aa\u4e26\u63a1\u53d6\u63aa\u65bd\u964d\u4f4e\u71df\u904b\u5f71\u97ff\u3002 \u5efa\u7acb\u8cc7\u8a0a\u5b89\u5168\u7d44\u7e54\u67b6\u69cb\uff0c\u660e\u78ba\u8cac\u4efb\u4e26\u63a8\u52d5\u9632\u8b77\u63aa\u65bd\u3002 \u63d0\u4f9b\u54e1\u5de5\u8cc7\u5b89\u6559\u80b2\u8a13\u7df4\uff0c\u63d0\u5347\u610f\u8b58\u4e26\u91d0\u6e05\u8cac\u4efb\u3002 \u5b9a\u671f\u8a55\u4f30\u8207\u7ba1\u7406\u8cc7\u8a0a\u8cc7\u7522\u53ca\u5176\u98a8\u96aa\u3002 \u900f\u904e\u5b9a\u671f\u7dad\u8b77\u5f37\u5316\u5be6\u9ad4\u3001\u74b0\u5883\u8207\u8a2d\u5099\u5b89\u5168\u3002 \u8a02\u5b9a\u7db2\u8def\u898f\u7bc4\u4ee5\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u4e26\u9632\u6b62\u672a\u6388\u6b0a\u5b58\u53d6\u3002 \u9032\u884c\u8cc7\u5b89\u7a3d\u6838\u3001\u6539\u5584\u7f3a\u5931\u4e26\u63a1\u53d6\u77ef\u6b63\u63aa\u65bd\u3002 \u5236\u5b9a\u4e26\u6f14\u7df4\u61c9\u8b8a\u8a08\u756b\uff0c\u4ee5\u5feb\u901f\u5fa9\u539f\u4e8b\u4ef6\u5f71\u97ff\u3002 \u660e\u8a02\u8cc7\u8a0a\u5b89\u5168\u8cac\u4efb\u8207\u4fdd\u5bc6\u7fa9\u52d9\uff0c\u5305\u62ec\u7c3d\u7f72\u4fdd\u5bc6\u5354\u8b70\u3002 \u8490\u96c6\u8cc7\u5b89\u60c5\u8cc7\u4e26\u5be6\u65bd\u4e3b\u52d5\u76e3\u63a7\u3002 \u5b9a\u671f\u6aa2\u8a0e\u4e26\u66f4\u65b0\u653f\u7b56\uff0c\u4ee5\u56e0\u61c9\u6cd5\u4ee4\u3001\u6280\u8853\u8207\u71df\u904b\u8b8a\u5316\u3002<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":21977,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-21983","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Policy Objectives - Qbic Technology<\/title>\n<meta name=\"description\" content=\"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy Objectives - Qbic Technology\" \/>\n<meta property=\"og:description\" content=\"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/\" \/>\n<meta property=\"og:site_name\" content=\"Qbic Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/QbicTechnology\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-08T04:13:45+00:00\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/\",\"url\":\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/\",\"name\":\"Information Security Policy Objectives - Qbic Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#website\"},\"datePublished\":\"2025-01-07T08:24:05+00:00\",\"dateModified\":\"2026-01-08T04:13:45+00:00\",\"description\":\"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/#breadcrumb\"},\"inLanguage\":\"tw\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.qbictechnology.com\/zh-tw\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legal\",\"item\":\"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security Policy Objectives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.qbictechnology.com\/#website\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"name\":\"Qbic Technology\",\"description\":\"Your Smarter Space\",\"publisher\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.qbictechnology.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tw\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\",\"name\":\"Qbic Technology Co., Ltd.\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"contentUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"width\":1347,\"height\":566,\"caption\":\"Qbic Technology Co., Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/QbicTechnology\",\"https:\/\/www.linkedin.com\/company\/qbictechnology\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy Objectives - Qbic Technology","description":"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy Objectives - Qbic Technology","og_description":"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002","og_url":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/","og_site_name":"Qbic Technology","article_publisher":"https:\/\/www.facebook.com\/QbicTechnology","article_modified_time":"2026-01-08T04:13:45+00:00","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/","url":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/","name":"Information Security Policy Objectives - Qbic Technology","isPartOf":{"@id":"https:\/\/www.qbictechnology.com\/#website"},"datePublished":"2025-01-07T08:24:05+00:00","dateModified":"2026-01-08T04:13:45+00:00","description":"\u672c\u8072\u660e\u8aaa\u660e QBIC TECHNOLOGY CO., LTD. \u900f\u904e\u8cc7\u8a0a\u5b89\u5168\u653f\u7b56\u7dad\u8b77\u71df\u904b\u5b89\u5168\u8207\u8cc7\u6599\u4fdd\u8b77\u4e4b\u627f\u8afe\u3002","breadcrumb":{"@id":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/#breadcrumb"},"inLanguage":"tw","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/information-security-policy-objectives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.qbictechnology.com\/zh-tw\/"},{"@type":"ListItem","position":2,"name":"Legal","item":"https:\/\/www.qbictechnology.com\/zh-tw\/legal\/"},{"@type":"ListItem","position":3,"name":"Information Security Policy Objectives"}]},{"@type":"WebSite","@id":"https:\/\/www.qbictechnology.com\/#website","url":"https:\/\/www.qbictechnology.com\/","name":"Qbic Technology","description":"Your Smarter Space","publisher":{"@id":"https:\/\/www.qbictechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.qbictechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tw"},{"@type":"Organization","@id":"https:\/\/www.qbictechnology.com\/#organization","name":"Qbic Technology Co., Ltd.","url":"https:\/\/www.qbictechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","contentUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","width":1347,"height":566,"caption":"Qbic Technology Co., Ltd."},"image":{"@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/QbicTechnology","https:\/\/www.linkedin.com\/company\/qbictechnology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/pages\/21983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/comments?post=21983"}],"version-history":[{"count":2,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/pages\/21983\/revisions"}],"predecessor-version":[{"id":22005,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/pages\/21983\/revisions\/22005"}],"up":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/pages\/21977"}],"wp:attachment":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/media?parent=21983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}