Information Security
IS
- Purpose
- To continuously maintain and prevent information leaks and take measures for virus infection as an organization while maintaining and updating the security of adaptable hardware and software.
- Basic policy
- Defining the theory of measures taken by the organization and people in order to maintain and update information asset management. Establishing security by following the proper rules to use security measures and recording media related to sending out e-mails and attached files.
*In compliance with information security management regulations, employees receive continuous education at training sessions.
Information Security
Management Regulations
1. Organizational measures
2. Human measures
3. Information asset management
4. Access restrictions and authorization
5. IT equipment use
6. Physical measures
7. IT basic operation management
8. System development and maintenance
9. Contracted operations and maintenance
10. Measures for security Incident information and continuous business management
11. Handling Personal numbers and specific personal information
Cyber Security Insurance
Covered by property insurance for damages caused by unauthorized access from outside IT equipment and computer virus, inadvertent deletion, and information leaks from inside the company.