Risk Management

Risk Management Policy and Process

Taiwan Mobile Co. (TWM) established a risk management policy in 2011, and relevant policies and procedures were disclosed on the official website. The policy was revised for the third time by the board of directors in 2022 as the highest principle for risk management. The Company actively plans risk management policies, the organizational structure and risk management systems; potential risks in the operation of the Company are dealt with on a preventive basis before they occur.

The Risk Management Committee (RMC) was set up in 2015 after the approval of the board of directors to reinforce the organization’s risk management mechanism. Our Chief Finance Officer is assigned to be the chairman of RMC by chairman of board. All the records of RMC operations are submitted to the chairman of the board for approval. Starting from 2021, the status will be reported to the board of directors at least once a year to ensure that all risks are effectively managed.

The Internal Audit Office conducts an annual review of the risk management mechanism and annual year-end risk assessments, and rates the importance and possibility of each risk, then calculates the risk value according to the results of the rating. The risk value becomes the basis for the following year's audit plan.

In 2023, the audit results did not show any internal control deficiencies and abnormalities. Nevertheless, 123 concrete suggestions for improving operational procedures were proposed as ways to improve the quality of management. The improvements and suggestions are to be tracked on a quarterly basis until they have been completed.

Risk Management Scope

TWM integrates and manages various important risks that may affect operations and profits by proactive and cost-effective manner along with a response mechanism from the three-level risk management.

The company's important risks include "Operating risk", "Risks related to information privacy and security", "Innovation risk"... and so on. Please read the detail content in the company's annual report.

Risk Management Structure
Responsible unit (Risk Ownership) Function
Operational Risk Ownership (first line) Corporate Affairs, Information Technology Group, Technology Group, Consumer Business Group, Enterprise Business Group, Home Business Group, Finance Group Risk factors are analyzed and assigned to responsible units to monitor and ensure timely and effective detection. Each unit shall ensure, on a daily basis, that risks are kept under acceptable levels. Should there be any changes in condition or other factors, the responsible unit shall report these to the Company for an appropriate course of action.
Risk Management and Compliance Oversight (second line) Risk Management Committee* Integrate the Company's risk management framework and internal control mechanism. Execute risk management strategies and conduct a review of the efficiency of the overall risk management mechanism. Exercise control over the four following committees:
1) Operations and Management Committee Conduct periodic reviews of each business group’s operating targets and performance to meet the Company’s guidance and budget.
2) Communication Quality Assurance  Committee Ensure and manage network communication quality.
ESG Steering Committee Establish a functional committee governance system, strengthen management functions, and commit to the implementation of corporate social responsibility and sustainable management.
1) ESG Working Group Integrate operations and core resources to promote the Company’s ESG policies to move toward sustainable development.
2) Occupational Safety and Health Working Group Supervise and minimize potential risks to workers’ health and safety.
3) Environmental Working Group Develop and manage the Company's policies and objectives for environmental and energy management.
4) Innovation Working Group Integrate the Company’s innovation strategies and establish a management mechanism.
5) Brand Development Working Group Implement the brand spirit of "Open Possible" and build a seamless brand experience from the inside out through employee conduct, products and services, internal and external working environments, and marketing communications.
Cyber Security and Data Privacy Protection Committee Demonstrate the Company’s commitment to these principles by investigating reported breaches of information privacy principles and policies, and, if necessary, take appropriate corrective measures.
TOP Board of Directors Responsible for assessing material risks, designating actions to control these risks and keeping track of their execution.
Independent Audit Unit (third line) Internal Audit Office Regularly monitor and assess potential and varying levels of risks that the Company might face and use this information as a reference for drafting an annual audit plan. Report any discrepancy to the concerned unit chief and ensure that remediation efforts are completed.
*Note The Board of Directors exercises control over the ESG Steering Committee and the Cyber Security and Data Privacy Protection Committee. In addition, the Chairman exercises control over the Risk Management Committee. If any major event or incident happens, the responsible unit shall report it to the Operations and Management Committee and corresponding Committee or Working Group to undertake any necessary measures.

Risk Operation

TWM sets up RMC which is chaired by the Chief Financial Officer and consists of 6 members including the chairman of board and the highest-ranking officer or their agent from each major risk management area. RMC is responsible for supervising and strictly controlling risk management related issues, and promotes a risk management-oriented management model to achieve the goal of improvement continuously.

The RMC is hold at least once every six months, and communicates with various functional committees as “Operations and Management Committee”, “Occupational Safety and Health Working Group”, “Communication Quality Assurance Committee”, “Environmental Working Group”, “Cyber Security and Data Privacy Protection Committee” , “ESG Working Group” and “Innovation Management Working Group” and other special committees and working groups to discuss the issues of risk management regularly , for accurately control risk issues in different fields.

In the event of a major event or proposal, each responsible unit shall report it to a meeting of operation management or each management committee to decide the necessary measures. Each functional committee not only proactively focus and identify the potential risk issues within internal and external for the company, but bring up appropriate solutions.

The operation record of the RMC is submitted to the chairman for approval. The Internal Audit Office follows up the status of operation and report to the Board of Directors at least once a year to ensure that relevant risk issues are effectively managed.

The company has proactively promoted the mechanism of risk management since 2011.
The followings are the status of main operating over the years.

  • Formulated Risk Management Policy in 2011
  • The Risk Management Committee was established in 2015
  • Revised the Risk Management Policy in 2017
  • The Risk Management Policy was revised the second time in 2020
  • The Chief Internal Auditor attended the Board of Directors to report the business of the Risk Management Committee on August 5, 2021.
  • The Risk Management Committee meeting was convened for second time to discuss 17 issues in 2021.
  • Revised the Risk Management Policy for third time and approved by the Board of Directors in2022.
  • The Chief Internal Auditor attended the Board of Directors to report the business of the Risk Management Committee on August 1st , 2022.
  • The Risk Management Committee meeting was convened for second time to discuss 19 issues in 2022.
  • The Chief Internal Auditor attended the Board of Directors to report the business of the Risk Management Committee on August 4 , 2023.
  • The Risk Management Committee meeting was convened in May and October 2023 to discuss 17 issues which are submitted by special(functional) committees to discuss the related issues of risk along with the mitigation plans.

Risk Management Procedure

The RMC and ESG working group reviews global, local, industrial trends, and identifies relevant risks that are applicable to TWM on a corporate level, discuss the risk prioritization according to the impact levels and the possibility of occurrence.

Annually, an inventory is conducted based on the risk categories and risk items, and each risk item is further reviewed to adjust the risk description based on emerging international trends. After evaluating potential impacts, each responsible unit shall select priorities according to risk levels and adopt corresponding measures and actions to control risks under acceptable range, and risk appetites and risk tolerances shall be formulated for relevant major risks and submitted to RMC for approval.

Risk tolerance indicators, thresholds of overall gap between target/metric and actual performance that the company is accepting to tolerate, are established and monitored for each risk item. Taking "Changes in customer behavior" and "Information privacy and person data protection" as examples:

  • Changes in customer behavior:We Set the proportion of "Double-Play" plan covers 80% of our existing own households client as Risk tolerance Indicators
  • Information privacy and person data protection:Implementation of robust measures to protect customer personal information , with the ultimate goal of achieving zero data leaks. TWM’s objective was to achieve a reduction of over 90% in data leak incidents upon implementing Number Masking Service.

The risk prioritization, impact of each major risk and mitigating actions, please refer to the Risk Management Matrix and Analysis of Key and Emerging Risks and Opportunities.


Risk Management Matrix

Analysis of Significant and Emerging Risks and Opportunities

△ Significant Risk
△ Emerging Risk:defined as an emerging and external risk that is expected to have a significantly long-term impact on the company's business.

Please Swipe Left or Right View All.
Category Risk Emerging Risk correlate with WEF category TWM Material Topics Description Trend Impact Mitigating actions
Regulatory 1. Legal Compliance
Legitimacy/legal compliance
  • To prevent telecom fraud issues, the National Communications Commission (NCC) promulgated the “Regulations Governing the Use of the Subscriber Numbers on Telecommunications Enterprises” with the aim of strengthening the management of the use of subscriber numbers and the Know Your Customer (KYC) mechanism. It also imposes a responsibility on Mobile Network Operators (MNOs) to oversee and audit Virtual Mobile Network Operators (MVNOs), with penalties for non-compliance.
On the rise

The new law has increased the company’s legal compliance obligations and costs, such as:

  • The company must strengthen the management of applications for subscriber numbers by corporate customers, including confirming usage purposes, maintaining user lists, and, whenever necessary, conducting on-site visits to verify the authenticity of relevant information. In particular, the prohibition on transferring numbers except for internal activities will affect the company's revenue and operational model for corporate customer business.
  • If the company wishes to cooperate with MVNOs, it must bear the responsibility for auditing and supervision, including pre-cooperation checks, confirmation of KYC implementation capabilities, and regular post-cooperation inspections. This will impact the willingness of MNOs to collaborate with MVNOs.
  • For corporate customers whose primary business involves reselling numbers, the company will actively assist these customers in registering with the NCC as telecommunications enterprises (MVNOs) or becoming the company's distributors. We will also strengthen their KYC implementation capabilities to obtain qualifications for reselling numbers, in order to reduce the impact on our corporate customer business.
  • Since the regulations prohibit the resale of numbers, the market order is facing reorganization. Users who previously applied for numbers through corporate customers are expected to turn to telecommunications enterprises (MNOs) for applications. The company will adjust the market strategy accordingly and actively seek to attract customers to increase revenue.
2. Policy and legislation changes
Societal Legitimacy/legal compliance
  • To enhance the resilience of communication networks, The Ministry of Digital Affairs ( MODA) supported the telecom in using non-geostationary satellite orbit as emergency response communication networks.. Our competitors have already taken the lead in collaborating with international low Earth orbit (LEO) satellite providers. If the company does not accelerate its efforts to catch up, it may affect our competitiveness.
Remaining stable
  • Our competitors have taken the lead by signing an exclusive service agreement with OneWeb, the world's second-largest low Earth orbit (LEO) satellite operator. They are expected to commence commercial operations before the end of 2024.
  • TWM can only negotiate and cooperation with other, smaller international satellite operators. These smaller operators have launched fewer satellites, and there is still a considerable distance before they can achieve full coverage or formal commercial operations.
  • Low Earth Orbit (LEO) satellites, as a complement to ground-network communications, it not only enhances our country's network resilience but also promise to address the coverage gaps of traditional 4G/5G signals, which currently cannot fully cover all of Taiwan.
  • The company is actively negotiating cooperation with other international satellite operators. We intend to build a diverse network using alternative satellite technologies that offer more greater mobility and ease of use.
Network bandwidth resources 3. Climate change/ natural disasters
Environment Climate Change Mitigation and Adaption
  • New climate-derived disaster events represent external risks, leading to increased storm intensity and prolonged high temperatures.
  • Increased manpower for emergency repairs following natural disasters.
  • Unstable electricity and water supply.
On the decline

The disaster events arising from climate change have significantly impacted our company's operations and finances and will continue to exert the following effects. According to the 2023 TCFD report, disasters such as flooding, landslides, and debris flows have already resulted in financial losses. Analysis of our own assets revealed that 78 facilities are exposed to at least one type of disaster risk. In terms of financial impact, we have calculated 1) operating losses and 2) increased costs, as detailed below:

1) Operating Losses:

  • 75 HUB machine rooms suffer the risk of flooding, with the severest threat being the failure of power supply. These measures would ensure no service interruptions or compromised quality, thereby preventing operational losses.
  • One and two Hub machine rooms are located near debris flow area and landslide areas, respectively, which could potentially impact the annual revenue of the affected base stations by approximately 360 million NTD.

2) Increased Costs:

  • When the 78 machine rooms experienced an impact (including response to 75 flooding emergency event, one debris flow and two landslides, the estimated annual labour cost is approximately 81.89 million NTD.

Our company has adjusted its climate strategy to address the identified impacts. The following measures have been implemented to manage these impacts through 1) capital investment, 2) human resources, and 3) the addition of equipment, as detailed below:

1) Capital Invested:

  • Investment or establishment in relocation of new site: The cost of machine rooms after debris flow and landslide event swould be approximately 1 million NTD per occurrence.

2) Human Resource:

  • (Flooding Prevention) For the 75 machine rooms, the installation of detection systems and power generators would cost approximately 1.82 million NTD.
  • Mudslide/Landslide Prevention) the execution of slope monitoring operations, technical inspection and analysis services, along with the installation of power generators in the 3 machine rooms, would cost approximately 1.1 million NTD.

3) Adding equipment or preventative measures:

  • (Flooding Prevention) For the 75 machine rooms, the installation of leak detection systems and temporary generators would cost approximately 22.14 million NTD.
  • Mudslide/Landslide Prevention) the execution of slope monitoring operations, technical inspection and analysis services, along with the installation of temporary generators in the 3 machine rooms, would cost approximately 28.88 million NTD.
4. IT infrastructure maintenance and operations Network quality and coverage
  • The failure rate of infrastructure was increased with years of use.
  • Outdated systems and infrastructure should be phased out.
  • The demand for air conditioner of computer room was increased due to the growth of information system.
Remaining stable
  • The failure rate of infrastructure was increased with years of use and impact the operation of the information system.
  • Outdated systems and infrastructure cannot meet business needs and affect competitiveness.
  • If the existing air conditioner of computer room reaches the threshold value, it will not only increase operating costs, but also risk affecting the operation of the information system.
  • Regularly checking the operation status of infrastructure equipment and consider the vendor's support to carry out timely replacement and updates and design a backup mechanism to ensure the normal operation of the information system.
  • To implement a private cloud platform for quickly building information systems to support business development and enhance competitiveness.
  • In addition to the original water-cooled air conditioners, it is planned to build air-cooled air conditioners while improving the fault tolerance of the air conditioners and keeping the air conditioner load below the threshold value.
5. Telecommunication technology innovation Network quality and coverage
  • Comparison of big data quality analysis using traditional KPI analysis
Remaining stable
  • When applying AI to improve network quality, the network quality learning model is influenced by numerous factors, coupled with network obstacles affecting model accuracy. AI misjudgments may lead to operational teams crowding out or prolonging the resolution time of actual network issues.
  • Combine and compare traditional analytical methods with AI models, continuously optimize and adjust to enhance AI reliability and effectiveness.
6. Bandwidth resources planning Network quality and coverage
  • Network integration engineering expected quality changes not meeting consumer expectations.
On the decline
  • Merger case engineering needs to be carried out gradually, expected changes psychologically affect user experience, leading to user correspondence, customer complaints, and group effects, impacting company image.
  • Network spectrum will increase high-load phenomena at base stations due to a large increase in users, causing more users to experience poor quality.
  • Plan spectrum usage priorities, coupled with dynamic scheduling of overall spectrum resources to enhance user experience.
  • Adjust merger case engineering on a rolling basis to improve user experience earlier.
  • Accelerate the completion of network integration to enhance user experience.
Information security 7. Information privacy and person data protection
Technological Privacy protection
  • Personal privacy regulations are becoming strict domestic and abroad, and public awareness of personal information protection raised.
  • Emerging services and product ranges increase personal information leakage and the leakage affects reputation.
On the rise
  • Privacy regulations are becoming strict domestic and abroad, and in recent years, customers’ demands for personal information (PI) protection have increased significantly. Predictably, the Government plan to set a competent authority which named as Personal Data Protection Commission will strengthen information security (IS) and privacy supervision in the further. As a result, to establish and improve PI and privacy management, the company must continue to invest various resources and minimize external risks related to IS and privacy-related regulations of competent authorities and customer expectations.
  • In addition, to provide various high-quality services, it is expected that the scope of innovative services and products will increase in the next 3 to 5 years, which will involve a large amount of PI and privacy processing. If we accidentally leak customers’ PI, we must face the relevant legal responsibilities, for example a compensation within 500 to 20,000 NTD for each customer, if the circumstances are serious, a fine of not less than 150,000 but not more than 15 million NTD may be imposed. Besides those compensation, TWM will loss of users, administrative penalties, revenue reduction, and reputation damage.
  • In response to the external impact of information security (IS) and privacy, We must build a customer personal information (PI) and privacy protection mechanism, pay attention to international development trends and regulatory requirements, cooperate with the development of innovative services and products, and continue to optimize related processes involving PI and privacy.
  • We verify the PI and privacy management effectiveness through an impartial third party. We continue compliance the ISO 27001 "Information Security Management System (ISMS)" and the BS 10012 and ISO/IEC29100 privacy framework standards certificates, integrate corporate operating procedures such as promote the IS maintenance plan, etc. We also expand the scope of PI and management and privacy and obtain the certificate of the latest international privacy protection standard-ISO27701 "Personal Data Privacy Management System" to improve IS and privacy level, and following take actions.
  1. Establish and revise information security policies and regulations on a rolling basis.
  2. Strengthen the functions of the dedicated information security organization.
  3. Continuously conduct personal data security audits and personal data infringement drills.
8. Cyber Security and Cyber Attack
Technological Information security
  • Network attack techniques change rapidly, and the scope of attacks expands to whole enterprises and upstream /downstream of the value chain.
  • Competent authorities are increasingly strict on the cyber security protection requirements for the telecommunications industry.
On the rise
  • In recent years, industries around the world have faced various emerging cyber-attacks from external sources that are beyond the control of the companies themselves. We predict that in the next 3 to 5 years, hacking tactics will continue to change such as applicated artificial intelligence (AI). TWM will be impacted by those various attacks, such as ransomwares encrypt corporate files, hackers use social engineering to steal sensitive information. If hackers launch DDoS attacks to block our telecommunication services one day, TWM will lose about 170 million NTD in revenue.
  • TWM is the critical infrastructure of telecommunications approved by the Executive Yuan and is one of the major telecommunications companies in Taiwan. If we cannot resist the attack, we could take the relevant legal responsibilities, and face customer compensation, loss of users, administrative penalties, revenue reduction, and reputation damage. The competent authority has formulated information security management requirements for mobile broadband and requires telecommunications operators to implement information security management. The company needs to invest in protection against attacks that will continue to increase to avoid cybersecurity-related hacker attacks and external risks.

In response to the external impact of cyber security, we must continue to invest resources to establish and promote security protection measures to fulfill the competent management of personal information and security management requirements. We review the effectiveness of the protection mechanism and the achievement of information security objectives and report the progress and benefit to the Cyber Security and Data Privacy Protection Committee. Information security protection mechanism includes:

  1. Implement the inspects of the external certification body and the Mobile Broadband Information Security Management Requirements by the Ministry of Digital Affairs (MODA).
  2. Conduct annual penetration test to simulate hacking to test system security, and fix vulnerability.
  3. Establish various quantitative indicators to track the security level.
  4. Strengthen the Security Operation Center (SOC) service and evaluate the introduction of red team exercises.
  5. Monitor and analyze information security protection systems and equipment, and evaluate the introduction of Zero Trust Architecture (ZTA).
Business operation 9. Greenhouse gas emissions Climate change mitigation and adaptation
  • Specific climate commitments such as 100% renewable energy usage by 2040 (RE100); achieving net-zero emissions by 2050 and carbon emissions cap.
  • Timeliness and effectiveness of responses to civilian group oversight.
  • Requirements for carbon information disclosure (e.g., CDP).
Remaining stable
  • Despite not being a regulated entity under emission reduction in Taiwan’s Climate Change Response Act, Taiwan Telecom aims to meet international climate agreements and initiatives (RE100 and Net Zero) due to growth in telecom services and increased energy use. This requires an increase in the installation of renewable energy facilities and the purchase of green electricity, raising operational costs. Also includes improving energy efficiency at data center facilities/operational sites, with a near increase in capital expenditure costs of approximately 55 million NTD, including the replacement of old air conditioning and the use of high-efficiency SMRs (Power Conversion Efficiency ≥ 96% SMR).
  • NGO groups (such as Greenpeace) continuously monitor corporate energy savings; a lack of positive response may affect the company's reputation.
  • Self-assessment of carbon information disclosure for international corporate sustainability ratings; a lack of positive response may reduce investors' confidence in the company.
  • Conducting organizational carbon audits.
  • Establishing energy/environmental management systems.
  • Supporting government green energy policies.
  • Constructing green energy infrastructure.
  • Increasing the use of renewable energy and improving energy efficiency.
  • Media promotion of green energy strategies.
  • Continually improving through international sustainability initiatives and ratings.
10. Occupational safety and working rights Supply chain management Occupational safety
  • Crucial technical talent have been occurred work-related injuries.
  • Contractor's works security vulnerability.
Working rights
  • Workplace discrimination incidents result in legal violations.
Remaining Stable Occupational safety
  • If the number of occupational disasters increases, it may cause employees to be temporarily disabled and unable to work, affecting operations.
  • If there are loopholes in the contractor's works safety, it will affect goodwill.
Working rights
  • Discriminatory treatment in remuneration, benefits, promotions, raises, tenure, trainings, working conditions or employment rights due to gender, age, marital status, race or disability. The company's discriminatory practices result in legal violations, leading to reputational damage and government penalties.
Occupational safety
  • Increase safety education and training for all employees.
    Establish operating procedures and provide appropriate protective equipment for use.
  • Develop contractor safety and health management standard operating procedures for contractors to follow, and implement contractor management and supervision.
Working rights
  • The company operates its recruitment process through open hiring and explicitly states that there will be no differential treatment based on gender, age, marital status, race, or disability in terms of remuneration, benefits, promotions, raises, tenure, trainings, working conditions, and employment rights.
11. Sustainable and Responsible Supply Chain Management
Supply chain management

Based on analyses of TWM's annual ESG assessments, international trends, and various evaluations, the following risks are assessed as likely to impact the TWM’s supply chain:

  • Cybersecurity risks arising from inadequate information management or insufficient cybersecurity measures.
  • Cybersecurity risks due to the misuse of incorrect information stemming from improper identification of information sources.
  • Transportation risks from supply chain disruption or material shortages caused by extreme weather events.
  • Occupational safety risks for suppliers and contractors due to heat-related injuries caused by extreme weather events.
  • Increased operational costs for suppliers due to heightened government regulation and related taxes as a result of delayed climate action.
  • Increased operational costs for suppliers caused by changes in international standards and regulations of biodiversity, thereby affecting the sourcing of raw materials or the provision of products/services.
Remaining stable
  • If suppliers experience data breaches or hacking incidents, it could erode the confidence of stakeholders such as customers, investors, and potentially leading to disruption in business activity and damage in reputation.
  • If suppliers use false information, it could indirectly lead to vulnerability in the system and bad operational decision; leading TWM to disruption in business activity and damage in reputation.
  • Extreme weather events may cause disruptions such as material shortage and supplier's logistics, thereby impacting the timeliness of supply and leading to operational disruptions for TWM.
  • Extreme weather events could expose suppliers and contractors to heat-related injuries, resulting in labor shortages and the inability to provide timely services, thereby impacting TWM operations.
  • In response to international trends, regulatory authorities worldwide are increasing their demands for carbon management. If suppliers fail to meet carbon reduction requirements, they may be subject to carbon fees or taxes, leading to increased operational costs.
  • If suppliers' operational scope, location of raw material sourcing, or activities that affect local biodiversity, it could lead to risks such as factory relocations or material shortages, increasing the likelihood of operational disruptions or reputational damage for TWM.
  • Regularly conduct supply chain due diligence to identify the impact of suppliers' cybersecurity risks on TWM. For high-risk suppliers, require them to provide Corrective Action Plans and regularly track their progress.
  • Identify key products of TWM, inventory critical suppliers, and analyze their impact. Strengthen assessment management for critical suppliers and adjust the blueprint of global supply chain or seek alternative suppliers.
  • Regularly conduct supply chain due diligence to identify the impact of suppliers' occupational safety risk on TWM. For high-risk suppliers, require them to propose occupational safety Corrective Action Plans and regularly track their progress.
  • Identify high carbon-emission suppliers and collaborate with suppliers with insufficient GHG management capabilities. Initiatives may include group procurement of green electricity and assisting in setting SBT to establish a low-carbon supply chain.
  • Regularly conduct supply chain due diligence to identify the impact of suppliers' biodiversity risks. For high-risk suppliers, recommend that they raise their awareness and management on biodiversity.
12. Infectious disease pandemic and epidemic
Employee’s physical and mental health
  • Operational disruption caused by employees infected with emerging infectious disease;infected with emerging infectious disease of technical talent has led to a decline in the quality of communication services and affected operations.
On the decline
  • Emerging infectious viruses are highly contagious, making employees unable to attend work due to illness and affecting their physical and mental health, thereby affecting company operations.
  • Establish a "health management system" to set up active "infectious disease/fever" notifications to control the health of office personnel, and carry out follow-up control if there are clusters.
Market 13. Alternative and emerging business models Circular economy
  • The replacement cycle of mobile phones is extended. It’s difficult to attract users to transfer 5G higher-rate plans by only offering flagship handsets’ plans.
Remaining stable
  • Due to the high similarity in the content of mobile plans offered by different providers, users face a lower threshold when considering switching providers. Furthermore, telecom companies are all striving to expand their user base and offer a variety of plan options to broaden their market presence. They are also utilizing OTT services or leveraging group resources to enhance their sales competitiveness. Consequently, Taiwan Mobile is encountering competitive pressures extending beyond its traditional telecom domain.
  • TWM is persistently utilizing its group resources to strategize the "momobile" plans. It offers increasingly higher rewards for higher-tier plans and actively pursues exclusive partnerships for telecommunications services and products. These include globally recognized services such as HBO GO, Apple One, and YouTube Premium. Moreover, it has introduced the "OP Life " plans to provide a comprehensive service experience and has curated gaming player bundles. These initiatives aim to not only establish Taiwan Mobile's unique plans sales advantage but also attract users to transition to higher-tier plans.
14. Intensified Competition
Risk management
  • The mergers of TWM and T-Star, and FET and APT have been completed. Each operator will through exclusive services or difference terminal equipment related to 5G service to facilitate the promotion of 5G service.
  • Peer company continues to expand the application of point economy in end-users' life circles.
Remaining stable
  • Each operator is actively allocating resources to the development of 5G services and applications, with the goal of becoming the first provider to offer a groundbreaking service. This is intended to enhance incentives for users to upgrade to 5G and seize market share. Taiwan Mobile must confront the risk of potential decreases in both users and revenue due to the absence of a killer 5G application.
  • Competing telecommunications companies are launching shopping reward programs akin to Taiwan Mobile's "momobile" or adopting bonus rewards as a gift model. This raises concerns about eroding Taiwan Mobile's unique position as an e-commerce pioneer and its profitability.
  • By packaging exclusive telecommunications projects with diversified multimedia entertainment services, Taiwan Mobile aims to enhance its market competitiveness and attract a broader 5G user base. This includes exclusively representing internationally renowned services such as HBO GO and offering complimentary YouTube Premium services exclusively to telecom customers.
  • To strengthen its sales advantage, Taiwan Mobile is deepening its integration with momo shopping resources. The plan offers momo dollar rebates and discounts for purchases made on momo's platform. Additionally, it introduces the option to use momo dollars for discounts on mobile phones, accessories, and MyMoji. This expansion of momo doallr usability enhances the ecosystem of momo dollars and creates synergies within the group.
15. Changes in customer behavior
Customer experience
  • According to the increasing in 5G penetration and the popularity of home broadband, the hotspot on the consumer side will shift to smart homes, IoT devices and other exclusive terminal and audio-visual services.
Remaining stable
  • Competing telecommunications companies are exploring partnerships with broadband providers to integrate dual-service sales models. They are replicating Taiwan Mobile's " Double Play" plan sales model, which may potentially undermine the promotion of Taiwan Mobile's Double Play plan and impact its revenue.
  • Leveraging successful collaboration models within the group, Taiwan Mobile plans to further expand its "Double Play" service to enhance coverage. Additionally, it aims to diversify its offerings by expanding the range of one-stop comprehensive experience products (OP Life) and collaborating with various types of mobile gaming/VR gaming devices to introduce smart player bundles. Moreover, it will utilize Matter to interconnect IoT products across brands and create a more comprehensive range of smart home bundles. This strategy is designed to incentivize users to choose higher-tier plans and strengthen customer loyalty.
16. Demographic changes Service impact management
  • The continuous decrease in newborn numbers contributes to an aging structure in population, the changing demands for telecom services tailored to the elderly should be addressed.
Remaining stable
  • Taiwan's society is progressively aging, resulting in a decrease in mobile subscription demand, thereby impacting company revenue. The evolving demand for mobile services has led to a gradual decline in the effectiveness of stimulating monthly subscription fee increases through mobile phone contract bundling.
  • Although older users tend to replace their phones less frequently, the acceptance and usage of digital technology have increased. This can be capitalized on by implementing diverse product and service packaging projects, as well as comprehensive one-stop experience service bundles, to transform the bundling product model. By providing diverse choices and addressing the pain points of segmented technology product searches, this approach can also lead to an increase in monthly subscription fees.
17. Geopolitical and Economic/Political Changes
Geopolitical Supply chain management

If suppliers operating location, origin of raw materials, or the transportation route passes through such areas of political instability, TWM may face operational disruptions and delays. Potential risks include:

  • Trade Wars: escalation of trade wars could to lead to increased prices of key raw materials, thereby affecting production costs.
  • Regional Conflicts: political instability and international conflicts could disrupt or obstruct supply chain.
  • Policy Changes: changes in national regulations, trade restrictions, and other national policies could impact the import and export processes of the supply chain.
On the rise

Recent geopolitical shifts in certain regions have led to increase in degree of uncertainty, posing external risks that are difficult for enterprises to control. Potential operational impacts on TWM in the next 3~5 years include:

  • Raw Material Supply Disruptions: if raw materials are blocked or production is disrupted, it could lead to inability to obtain key raw materials needed for the supply chain, thereby affecting TWM's ability to acquire them on time. Additionally, trade wars and/or policy changes that cause raw material c
  • Transportation Route Disruptions: blocked or disrupted routes in regions could affect the timely delivery of supplies impacting the availability of critical parts for TWM; this could hinder sales, maintenance, and other operational processes.
  • Identify the key services and products of TWM, inventory critical suppliers, and analyze their impact. Strengthen assessment management for critical suppliers and simultaneously adjust the blueprint of TWM's global supply chain
Talent management 18. New technology talent needs Green application and circular economy
  • Unable to recruit emerging key technology talent in a timely manner
  • Unable to effectively attract and retain emerging key technology talent
  • Increased recruitment costs
  • Rapid iteration of AI technology
Remaining stable
  • Recruitment difficulties leading to technology talent vacancies will affect the construction or development of new network equipment or services.
  • Talent loss affects project progress and network operation quality.
  • Inability to continuously acquire AI-related technologies may easily lead to competitive lag.
  • Combine professional training programs from telecom equipment vendors to enhance employees' mastery of new technology skills, and cultivate internal seed instructors to compile e-Learning materials, establishing a new technology training database.
19. skill requirements change Green application and circular economy
  • Rising demand for talent in emerging fields/specialized skills.
  • Increased costs for talent recruiting, retention or training
On the rise

As industries and technology trends continue to evolve, the company's competitiveness will be impacted if we fail to cultivate, hire, or retain talent in emerging fields/specialized skills.

  • Based on industry trends and strategic development, we conduct annual training needs assessment to develop yearly training plans.
    We provide diverse development opportunities to cultivate talent in anticipation of future expertise, enhancing workforce efficiency and strengthening the company's competitiveness.
  • Technical supervisors map out required skills and certifications in response to trends. Supervisors evaluate employees on skills/licenses and tailor training programs accordingly.
  • Employees will collaborate with supervisors to create their own individual development plans in accordance with feedback from multifaceted appraisal system and career plans. This helps employees acquire knowledge and skills they need at work or for their next role within the organization.
  • We have established promotion plans for R&D/Technical Managers and Assistant Managers, aiming to motivate and strategically plan the professional career development of our R&D and technical talent.
  • The company initiates "Work Club" scheme to encourage cross departmental collaboration. Employees from different departments can work on projects together, learn new things from each other, which contributes to their overall personal and professional development.
  • We cultivate employees to acquire professional skills necessary for innovative services, broaden their knowledge base, and undergo the company's transformation together.
Innovation management 20. Innovation and creativity energy growth
Technology innovation & application
  • Innovative applications (such as AI) are gradually taking shape to enhance the innovation capabilities. The rapid growth of innovative application is an external risk that is not under the control of TWM itself. If TWM is not able to grow the innovation and creativity capabilities in a timely manner, leading to insufficient innovation momentum, TWM may not be able to maintain customer stickiness, causing customers to switch to competitors.
  • The innovation application can also improve business productivity. If internal innovation momentum is insufficient, TWM’s market competitiveness may be affected.
On the rise
  • With the rapid advancement of AI technology, there may be new applications in multimedia production, gaming entertainment, smart homes, or personalized services in the next 3 to 5 years. If TWM's product innovation growth is insufficient, it will be difficult to compete with new domestic and international service providers, and it will be unable to create more innovative service for customers to catch revenue.
  • Some AI technologies and applications come from external sources that are beyond the control and management of TWM itself, requiring cooperation with external partners. If relevant technologies and resources cannot be secured, it will be impossible to meet customers' demands for innovation and change, attract their attention and time, and there will be a risk of lacking competitiveness.
  • Continue to launch technological innovative applications, such as myVideo, game services, teleco-financial services, smarter home services and myMoji services, etc.
  • Organize innovation competitions and demo days to create innovation culture internally and to reward employees for cross-department cooperation. It also encourages employees to make the innovation applications fulfillment so as to increase innovation momentum.
21. Responsiveness to the trend of innovation Technology innovation & application
  • Emerging technologies (such as green energy technology applications) need to be deployed in advance. Without sufficient understanding and insight, market opportunities may be missed, resulting in a decrease in competitiveness.
Remaining stable
  • If you fail to grasp the development trends of forward-looking technologies early and prepare in advance, you will lose business opportunities due to lack of competitiveness when customer needs arise.
  • If green energy-related technology applications are not deployed early, the cost savings and environmental protection benefits brought by new technologies will not be achieved.
  • Actively deploy emerging technologies in advance, such as participating in investment in green energy technology, launching myCharge service with partners, etc.
  • Through strategic alliances or cross-industry cooperation, create MVP(minimum viable product) first, then gradually expand and promote.

Risk Culture

Focused training throughout the organization on risk management principles
In order to fortify risk response competency of employees and cultivate risk management culture, we conduct risk management trainings every year with topics such as how to conduct risk management and information security (see comment for more details). We also test employees with simulated phishing attacks. Such trainings and simulation sessions aim to enhance awareness of employees and train them to respond effectively in accordance with Company’s regulations. Consequently, creating risk management culture within the company is a responsibility for all employees, ensuring sustainable business operations. In 2023, the total number of hours for the risk management course is 78,032.6 hours.

New employee orientation programs include risk management, such as code of conduct, information security training, labor safety and health, and prevention of discrimination and harassment. These programs aim to enable new employees to understand our company culture and our stand on risk.

Financial incentives which incorporate risk management metrics
Employees are encouraged to propose suggestions on how to lower risks and improve the performance and quality of their work while achieving objectives. Awards will be given to employees in recognition for suggestions deemed valuable to the company, and these credits will be noted in their evaluation. Employees with better performance will receive higher bonus and salary increase. On the contrary, if an employee violates the regulations of internal control system or information security policy, the employee may be recorded a warning, and may not receive a rewarding performance evaluation. The poor performance ranking will lead to a lower bonus and salary adjustment.