Data Privacy and Cybersecurity

Data Privacy and Cybersecurity

The company realizes that information technology systems have played an increasingly important role in the company's operations. This is in line with the continuous growth and expansion of the company's business to prevent unauthorized access to information or use of information and systems by users and various forms of threats. The company has guidelines for controlling the security of information technology systems. By preparing an operational plan Announcement of policy and having a clear work process, There is internal and external communication with relevant agencies to inform them of information technology system security management in accordance with laws and various practices. related including operations that meet international standards to ensure that the company's information can be protected and build confidence and trust among all stakeholders.

The Company has established a working group on information technology security consisting of the Executive Chairman and executives from various related departments. which has the following structure:

Role and Responsibility

  1. The Board of Directors is responsible for approving policies and measures to maintain the security of the information technology system, prioritizing prevention of issues stemming from inappropriate network usage and threats from users and other sources.
  2. The Information Technology System Security Working Group, Led by the Executive Chairman, oversees security operations to ensure compliance with legal and regulatory requirements, assessing information risks under risk management supervision.
  3. Employees are obligated to adhere to policies, regulations, directives, and operational manuals concerning information system security measures.

The working group is tasked with overseeing information system security operations to align with relevant standards and laws, implementing corrective and preventive measures, and enhancing operational efficiency. The company ensures that operational results are reported to the Audit Committee and Risk Management Committee at least once a year.

Management Apporach

  1. Installation of network security software (Firewall) to prevent data leakage from external attacks computer viruses.
  2. Determination and enhancement of access authority to prevent information leakage.
  3. Implementation of a data backup plan and regular checks to ensure compliance with the information security policy.
  4. Internal communication initiatives to raise awareness among employees regarding the proper and secure use of technology.
  5. Development of a manual for protecting personal information and information security, along with the establishment of a Business Continuity Management Plan (BCP) to address interruptions in business operations caused by IT system threats.
  6. Engagement of an external IT Auditor to evaluate internal controls and manage IT system risks, with audit results reported directly to the Audit Committee and the Risk Management Committee.

Year in review

The Company conducted two rehearsals of the information technology system recovery plan to test the emergency contingency plan and to review information technology system controls by external auditors regarding access to programs and data, storing and reviewing traces of the use of high-privilege accounts at the database level. Following verification, the results of the review and improvement suggestions were summarized with executives and relevant agencies to enhance the efficiency of the company's work processes. In 2023, the company did not experience any incidents of information technology security breaches or personal data breaches, aligning with the goals set by the company.