Information Security
Hyosung actively bolsters its information security system and engages in a variety of activities to prevent the disclosure of sensitive company data.
Information security issues are constantly evolving as a result of changes in business and information technology. Hence, companies are responsible for actively strengthening their information security systems in order to effectively address evolving information security threats. Considering that information is not a tangible asset, information itself has value, and the nature of conducting business while sharing information within and outside the organization, it is essential to identify information flow in the course of work and identify information security risks. Moreover, it is crucial to pinpoint precisely where risks may occur.
Hyosung has established information security regulations and operating standards to prepare for information security risks resulting from external cyber terrorism or internal data leakage, as well as a system to monitor their compliance. In addition, we implement various measures to prevent the leakage of sensitive data, such as reviewing security logs and deploying multifunction devices with security solutions.
Information security policy and system
Information security organization (holding company)
Information security organization (business company)
Increasing awareness of information security among employees
Type | Target | Cycle |
---|---|---|
Announcement via email/internal bulletin | All employees | Occasional |
Occasional | All employees | Daily |
Offline manager training | Information security managers at each department | Yearly |
Online training for all employees | All employees | Yearly |
Privacy
Designation and management of protected areas
Regular security surveillance and response to security incidents
Access control
Integrated log management
Security review and vulnerability assessment
Safe PC use
Centralized document management system
Controlling document saving and exports
PC saving control
Export control
Document class classification
Access control by role
Log analysis
Establishment of an external cooperation system