Skip to content

Sustainability

Governance

Information Security

Recognizing legal and ethical management as our top priority, we are enhancing our
management system to ensure all members adhere to fundamental principles and standards.

  1. Home
  2. Sustainability
  3. Governance
  4. Information Security

Information Security Governance

SK Enmove establishes an information security management system by complying with domestic and international information security compliance standards and continuously managing information security risks through internal regulations such as [Security Management Regulations] and [Personal Information Security Regulations]. In accordance with internal regulations, SK Enmove appoints a Chief Information Security Officer (CISO) and a Chief Privacy Officer (CPO) to ensure stable operations of the information security management system.

Information Security Policy

To secure business continuity, SK Enmove operates the information security management system in accordance with the [Security Management Regulations] which outline administrative, technical, physical protection measures and the [Personal Information Security Regulations] which stipulate principles and protective measures for processing personal information to protect the rights of information subjects. Additionally, by establishing an information security strategy following the PDCA (Plan-Do-Check-Act) cycle and effectively monitoring security levels, SK Enmove continues to enhance its information security capabilities.

Information Security Management System

PLAN, DO, CHECK, ACT
  1. PLAN

    Collection of information
    security strategies considering
    ESG management environment

  2. DO

    Operation of information
    security management system
    and managing security level

  3. ACT

    Supplementing and improving
    information security strategies

  4. CHECK

    Verification of the effectiveness
    of security strategies through
    monitoring and inspections

Information Security Activities

  • Inspection and Monitoring
  • Operation of Incident
    Response System
  • Information Security Awareness
    Education and Training