Additional Information Disclosure
Green River Holding Co. Ltd.
Cyber Security Management
To control or maintain important corporate operating functions, including operation and accounting, etc. functions, of the Company, the Company relies on a network system. However, the network system may be subject to network attack such that confidential information of the Company may be stolen, such as exclusive information of customers or other stakeholders, as well as personal information of employees. Malicious hackers may also try to introduce computer viruses, destructive software, or ransomware into the Company’s network system, interfering with the operation of the Company in order to regain control rights of the computer system such that it may perform ransom or steal confidential information from the Company.
Countermeasures:
- The Company’s IT department, under the Administration and Management Division, and appointed the Cyber security manager, the IT department periodically checks the information security of the Company, which is led by the IT department head. The IA department audits the computer cycle-information security annually and reports the audit results to the Audit Committee and Board of Directors.
- The company has established the Information Security Policy. It established by the Company’s IT department which includes (a) Data redundancy, (b) Data storage, (c) System security, (d) level of risk, e. authorization and f. regulations of the system and email usage. The Company announces the policy on the intranet in order to allow all employees to access and to comply. The IT department periodically evaluate the information security in compliance with the policy and reports information security in compliance with the policy and reports to the Board of Directors.
- Perform major updates of systems irregularly. In the case of major information security risks, the announcement is made, and corresponding measures are adopted. Arrange information security courses every year for training an employee to identify fishing emails. The system is protected by password, and the authentication scheme is Single sign-on which is easy to maintain and manage.
- To strengthen network security, cope with the popularity of the Internet of Things and the information security issues associated. Reduce hazards caused by viruses, worms, and other network attacks, adopt various security preventive measures and update periodically, including the technologies of firewalls, intrusion detection systems, anti-virus software, etc., in order to respond to and reduce harm caused by various network attacks in a timely manner.
- The information system infrastructure has been established with host machine redundancy and remote data backup mechanisms of high availability in order to ensure uninterrupted service. Daily perform network operating environment detection and regular data backup and store the backup at a remote site for preservation. Enhance various simulation tests of the machine room and emergency drills in order to ensure the normal operation of information system and data security, thereby reducing system interruption risks caused by unexpected natural disasters and human errors, such that the expected system recovery target time can be satisfied. In the future, the Company will perform upgrade on selected systems for system infrastructure, expansion flexibility and disaster recovery, information security, etc. According to the risk level, design is planned and appropriate software/hardware equipment is upgraded. In addition, the storage space of remote data backup is evaluated.
- The specific managing measurements are as follows: (a) In 2025, the IT department sent at least five newsletters or notifications to all employees, reminding employees to be alert to any abnormal letters and immediately notify IT personnel. (b) The Cyber security manager also arranges information security internal training courses for the IT personnel. In addition, updates and exchanges of the latest information on cyber security from related manufacturers. Two internal trainings for information security were held in 2025. (c) The setting of accounts and related authorities must be approved in advance. (d) An audit for computer system cycle-cyber security was performed in May 2025.
Intellectual Property Management Plan and Implementation Status
A. Intellectual Property Management Plan:To enhance the Company’s operational competitiveness in the plywood manufacturing industry and to safeguard the outcomes of its ongoing efforts, the Company has established an intellectual property (IP) management plan aligned with its business objectives. Through effective IP management, the Company aims to create corporate value and achieve a sustainable operating model. The scope of the Company’s IP management covers patents, trade secrets, brands, and trademarks.
- Patent Protection of Innovative Achievements:The Company strengthens the identification, protection, and utilization of intellectual property arising from the research and development of new products, technologies, and manufacturing processes. External legal counsel is engaged to review relevant technical patents to avoid potential infringement issues and to mitigate operational risks.
- Alignment with Business Objectives:The acquisition, deployment, and management of intellectual property are focused on supporting the Company’s medium- and long-term business objectives, including:
- Development of environmentally friendly and energy-efficient materials
- Maintenance and advancement of international certifications (EU, U.S., Japan, etc.)
- Expansion of market share for mid- to high-end products
- Brand and Trademark Management:The Company actively applies for trademark registrations in various countries and conducts periodic reviews to assess the necessity of trademark maintenance. Through trademark opposition, cancellation, and enforcement actions, the Company prevents infringement by third parties and safeguards its trademark rights.
- Trade Secret Management:For engineering or procurement projects involving technology development or technical collaboration, business partners are required to sign confidentiality agreements. Employee employment contracts stipulate confidentiality obligations during and after employment, prohibiting the disclosure of the Company’s trade secrets.
- Employee Participation and Training:The Company regularly conducts patent and trademark training sessions and internal workshops to enhance IP risk awareness and protection capabilities among R&D and sales personnel.
B. Annual Implementation Status:The Company reports intellectual property–related matters to the Board of Directors on an annual basis. The most recent report was submitted on December 24, 2025.
|
Item |
Implementation Status |
|
Intellectual Property Inventory |
Completed an inventory of patents and trademarks related to plywood manufacturing processes and products, and established an IP asset register. While the industry does not have a strong demand for patents, the Company conducts annual reviews of product certifications. A total of 5 valid product certifications and 97 trademarks were inventoried, covering key markets including Thailand, American, Japan, Malaysia, Vietnam, Korea, Indonesia, India, China, and Peru. |
|
Technology Development and Applications |
2 new product certifications currently under application; 3 product certifications updated; others remain valid or do not require updates. 25 trademark applications filed and 16 enforcement actions undertaken to strengthen eco-friendly brand identification. |
|
Internal Training |
Approximately 112 participant attendances, totaling 112 training hours, covering R&D, production, and quality assurance departments. Training topics included trade secret management and trademark usage guidelines. |
|
Integration of IP and Operations |
In line with the Company’s strategy to expand into mid- to high-end markets, low-formaldehyde improvement technologies were introduced to enhance the competitiveness of high value-added products in Southeast Asian and European markets. Trademark resources were integrated into new product packaging and customer communications. |
|
IP Risk Management |
-Regular monitoring of major competitors’ patent portfolios and opposition cases. An external patent alert mechanism has been established by the legal function, with 16 enforcement cases handled by retained law firms. –622 employee confidentiality agreements executed. -No incidents of the Company’s trademark usage infringing upon third-party trademarks have occurred in recent years. |

