
Data Security and Privacy
#Organizational Chart for Data Security #ITGC #Information Security Campaign #Personal Information Processing Systems #Security Management System #ISMS Certification
As Korea’s largest one-person media platform, SOOP prioritizes data security and user privacy. We operate an information protection management system that exceeds the level required by law, and we strive to ensure that streamers can use our services with peace of mind through personal information impact assessments across our services, regular internal audits, and ISMS certification. We also operate a dedicated organization to prepare for cyber threats and increase investment to respond to new security threats to build a trusted platform environment.
Governance
To protect users’ personal information, our Data Security Committee and key executives such as the CISO and CPO oversee information protection. The Data Security team, a department dedicated to information protection, is in charge of establishing and operating information security and personal information management strategies and systems and systematically manages risks by reporting directly to SOOP’s Data Security Committee when they arise.
Organizational Chart for Data Security


Decision-Making Body/Decision Maker
(As of December 31, 2023)Composition | Chief Technology Officer(CTO), Chief Information Security Officer(CISO), Chief Privacy Officer(CPO), Head of Management Support, Data Security Team Leader, Data Protection Officer, Talent Management Team Leader |
---|---|
Roles (Regulations) |
|
Responsibilities |
|
Reporting Frequency | Reporting as needed |
Dedicated Organizations and Key Roles
-
Technical Leading(TL) Division, Data Security Team
- Establish an information security strategy and internal control plan
- Operate a data security management system
- Strengthen information protection skills
- Establish and operate a breach response system
- Conduct information security training and awareness programs for employees
- KISA Information Security Disclosure
- Obtain and maintain privacy-related certifications
- Report information security issues to management
- Keep the entire organization up to date on the latest information security issues and trends
-
User Communications Department
- Establish a privacy management plan
- Conduct internal audits(twice a year)
- Data Protection Officer
Handle complaints or comments about personal information from data subjects and review improvements
Oversee the ongoing management of personal information processors
Train personal information processors
Review and reflect improvements to the personal information processing system
Assist in inspections on compliance with personal information processing standards
Other matters required for personal information protection
Strategy
SOOP has taken various measures to respond to major risks and opportunities related to data security and privacy, including a privacy/ security management system, a response process in the event of an incident, and enhanced technical capabilities.
Risks and Opportunities
Risks and Opportunities
Risks | Impact on Business Model and Value Chain | Duration of Impact1) |
---|---|---|
Increasing data security regulations, privacy breaches, and cybersecurity threats |
|
|
Opportunities | Impact on Business Model and Value Chain | Duration of Impact1) |
---|---|---|
Creating new business opportunities and strengthening competitive edge |
|
|
Impact on Financial Position, Financial Performance, and Cash Flows
SOOP actively discloses its information security status every year. By disclosing information protection investments, budgets, and major activities, SOOP continues to conduct information protection activities that stakeholders can trust. As of December 2023, we have invested KRW 52.26 billion in information technology and KRW 970 million in information Security. The main investment purposes are the introduction of network security equipment and security solutions such as firewalls and harmful site blocking.
Investment in Information Technology in 2023 | Investment in Information Security in 2023 |
---|---|
52.26billion | 970billion |
Privacy Protection Principles
SOOP annually formulates internal plans for personal information management and discloses them to all employees ensures that all employees are aware of their responsibilities and obligations related to personal information protection. In addition, disciplinary measures may be taken for violations of personal information-related responsibilities and obligations in accordance with the Information Protection Regulations, and such violations and the level of discipline may also affect employees’ performance evaluations.
- 01
- SOOP complies with all laws and international standards on the protection of personal information.
- 02
- SOOP always discloses the processing of the users’ personal information transparently.
- 03
- SOOP respects the users’ rights to make decisions about their personal information.
- 04
- SOOP collects only the minimum personal information needed to meet its objectives and manages this information responsibly.
- 05
- SOOP prioritizes the protection of user privacy
Privacy Policy
SOOP complies with the personal information protection regulations, such as the Personal Information Protection Act and the Act on Promotion of Information and Communications Network Utilization and Information Protection. SOOP has established and operates a privacy policy in accordance with relevant laws to best protect the rights and interests of users.
Privacy PolicyHow We Handle Data Breaches
To prepare for personal information leakage, we have established the ‘Leakage Response Guidelines’ and a systematic response procedure for dealing with potential incidents. We have systematized response steps, including notifying individuals/institutions in accordance with relevant laws, identifying the cause of the leakage, taking measures, and reflecting improvements. Additionally, we have designated teams for each step to provide relief to those affected by the incident and minimize damage.
In addition, in order to strengthen our employees’ ability to respond to such incidents, we conduct personal information breach simulation trainings twice a year. These exercises help us review and improve our incident response strategies based on various scenarios. In 2023, we held two simulation trainings, with a 100% participation rate, and an average of 797 employees participated in each training.
사고 대응 절차
-
01 Initial Response
- Record timeline-based incident circumstances
- Operate an emergency contact network per risk level
-
02 Root Cause Investigation
- Identify the cause of the incident
- If action cannot be taken internally, report the matter to higher-level staf
-
03 Action
- Internal action
- Action through related departments or external contractors
-
04 Action Delayed
- If action is delayed, escalate the risk level
- Report the matter to the highest-level staf
-
05 Notification
- Notify actions taken for each risk level
-
06 Root Cause Analysis
- Collect and analyze data
- Determine the details of the incident
- Draft an accurate report so that the situation is easily understood
-
07 Recurrence Prevention
- Decide how to prevent incidents from spreading or recurring
-
08 Completion
- Draw up security policies to identify and prevent similar attacks
- Change procedures, record information about the incident, draw up long-term security policies, draft plans to modify technology
-
Held
2 Simulation Trainings -
Engagement Rate
100% -
Employees Participated in the Trainings
An Average of 797
Measures to Strengthen Safety and Security
SOOP is committed to enhancing the safety and security of our services. We are effectively defending against DDoS attacks by filtering malicious traffic through the Clean Zone service. We are also working with security companies to monitor and take additional measures to prevent attacks on SOOP’s users and streamers.
Strengthening ITGC with Mandatory External Audit of Internal Accounting Control System
In 2023, the Enforcement Decree of the Act on External Audit of Stock Companies was amended to require an external audit for SOOP’s internal accounting control system. In order to respond to external audits, we have revamped our IT-related control processes. In particular, we have strengthened our ITGC for important accounts related to financial statements, separated operators and approvers for important data change tasks and conducted frequent reviews, and mandated monthly internal audit activities to ensure data integrity.
ITGC, Information Technology General Controls
ITGC(Information Technology General Controls) controls IT systems to ensure the reliability and stability of organization’s IT systems, referring to the control activities over the acquisition, development, and maintenance of IT infrastructure, security management, and information technology. It includes control over program development and change, data and program access security, and operational management(backup and failover).
Information Security Disclosure
Since 2023, SOOP discloses information security status in detail through the KISA Information Security Disclosure Portal, and we were recognized as an Excellent Disclosure in Information Security Investment company in 2023 and 2024. The portal discloses SOOP’s information security-related data, such as governance, investment details, personnel, and activities. As of December 31, 2023, SOOP had 270.3 employees in information technology and 5.1 employees dedicated to information protection, and its information protection activities included providing information security and privacy training to all employees, conducting hacking simulation trainings, and conducting self-inspections and subcontractor audits for personal information protection.
-
Employees in Information Technology
270.3 -
Dedicated to Information Protection
5.1 Employees -
Conducted
2 Subcontractor Audits -
Published
9 Employee Privacy Guides -
Revision to the Privacy Policy and Guidelines
1 -
Privacy Training
6 all-employee privacy trainings 2 all-employee hacking email trainings 2 privacy trainings
Information Security Campaign
In June 2023, SOOP launched a campaign to promote a culture of personal information protection. The campaign established five security rules, including changing passwords regularly, using secure passwords, and not sharing accounts. These rules were distributed through SOOP’s user communication channels. This helped users recognize the risk of personal information leaks and encouraged them to take more proactive security measures.
Information Security Training
SOOP conducts a number of activities to boost the awareness of personal information controllers and processors of the importance of protection of personal information. In 2023, we conducted an information protection pledge procedure for all employees and held regular personal information protection trainings twice a year. In addition, SOOP also conducted ad-hoc trainings through a selfoperated training course system.
Information Security Trainings in 2023
Content | Company-wide security training | |
---|---|---|
Subject | All employees | New employees |
Frequency | Twice a year (first and second half) |
Twice a year (first and second half) |
2023 Performance |
470 employees completed the course in the first half | 70 employees completed the course in the first half |
321 employees completed the course in the second half | 40 employees completed the course in the second half |
Risk Management
Pre- and Post- Control Measures for Privacy Protection
SOOP complies with personal information protection laws and internal management regulations by checking the sensitivity of personal information collected and used in all services in advance. In addition, SOOP conducts personal information impact assessments at all times and operates a management system that comprehensively manages the rights and usage status of personal information processors.
We conduct an annual inspection of our personal information management to ensure compliance with procedures such as the collection, use, provision, protection, and destruction of personal information, and rights of users with respect to their personal information. We also conduct an annual inspection of the status of personal information protection for personal information subcontractors (all entities entrusted with processing SOOP’s personal information). We also prepare a personal information self-inspection list for each company and request improvements when violations or deficiencies are identified, and if there is no continuous improvement or the level of personal information protection is low, we conduct on-site inspections to ensure that improvements and measures are taken quickly. These follow-up control measures are checked by the CPO and are continuously managed to ensure that any deficiencies are improved.
Personal Information Impact Assessment
-
Adoption of Service
Review the appropriateness
of privacy protection in the
adoption stage
- Service planning
- System establishment
- Service development
- Operation of Service Review the appropriateness again when updating items to be collected/used
- End of Service Check on the safe discard of collected information when ending the service
Management of the Personal Information
Processing Systems
SOOP designates systems that handle personal information related
to the services provided to users as ‘Personal Information Processing
Systems,’ including business systems and database systems. We have
also established systematic authorization standards and operating
procedures for all actions related to the Personal Information Processing
Systems, such as access, menu, inquiry, modification, and extraction.
We also recommend using secure authentication methods to prevent
unauthorized access by third parties. Additionally, to address external
threats, we have encrypted the information access paths.
Furthermore, we have assigned approval groups for each system menu
so that only the data processors who need the access to a specific menu
can examine the information. These permissions require an application
process and approval by the person in charge of personal information
protection, and are granted through an appropriateness review. Logs of
all acts performed by personal information controllers, such as granting,
accessing, creating, changing, and deleting approvals are kept for a
certain period of time, and we periodically review the appropriateness of
approvals and revoke the approvals for unnecessary accounts.
Security Management System
SOOP classifies the assets in the information security management system according to the importance of the service and conducts a criticality assessment and risk analysis on a regular and ad-hoc basis. The criticality assessment and risk analysis are conducted according to the predefined items in the information protection management system and self-defined criteria; risk ratings are calculated; priorities and measures for improvement are reviewed; and plans for improvement are developed.
In this process, all assets of SOOP are subjected to periodic risk analysis and improvement on an annual basis to identify vulnerabilities so that users can use the service with confidence in a safe environment. The information security system is strictly controlled so that only relevant personnel or employees who have been authorized in advance through the approval process can access it. SOOP clearly determines and grants only necessary permissions through an appropriateness review according to the scope of work of employees, and all activities such as access history and configuration changes and attempts by unauthorized users are monitored. In addition, SOOP is working with a security system specialist company to detect and respond to abnormal signs or attempts by external hackers 24 hours a day and 365 days a year to prevent security breaches in advance.
Information Security Management System ISMS Certification
SOOP has received the Information Security Management System(ISMS) certification from the Korea Internet & Security Agency. We were first certified in 2014 and have been maintaining and renewing our certification ever since.
The ISMS certificate issued in 2022 is valid until January 2026. In 2023, we underwent a follow-up examination and successfully maintained our certification.
ISMS Certification

Metrics & Targets
SOOP has set and been systematically managing goals related to data security and privacy. In particular, we have had zero data breaches in the past three years, and we are committed to achieving zero data breaches in 2024.
2021 | 2022 | 2023 | |
---|---|---|---|
Training
Completion Rate(%) New Hire Security Training |
100 | 100 | 100 |
Malware Training |
100 | 100 | 100 |
Personal Information Self-Check (number of cases) | - | 2 | 2 |
Personal Information Subcontractor Inspections (number of cases) | - | 2 | 2 |
Investment in Information Security(KRW) | - | 864,565,261 | 974,429,144 |
The Number of Personal Information Breaches | 0 | 0 | 0 |