IR

Data Security and Privacy

#Organizational Chart for Data Security #ITGC #Information Security Campaign #Personal Information Processing Systems #Security Management System #ISMS Certification

As Korea’s largest one-person media platform, SOOP prioritizes data security and user privacy. We operate an information protection management system that exceeds the level required by law, and we strive to ensure that streamers can use our services with peace of mind through personal information impact assessments across our services, regular internal audits, and ISMS certification. We also operate a dedicated organization to prepare for cyber threats and increase investment to respond to new security threats to build a trusted platform environment.

Governance

To protect users’ personal information, our Data Security Committee and key executives such as the CISO and CPO oversee information protection. The Data Security team, a department dedicated to information protection, is in charge of establishing and operating information security and personal information management strategies and systems and systematically manages risks by reporting directly to SOOP’s Data Security Committee when they arise.

Organizational Chart for Data Security

Decision-Making Body/Decision Maker

(As of December 31, 2023)
Decision-Making Body/Decision Maker
Composition Chief Technology Officer(CTO), Chief Information Security Officer(CISO), Chief Privacy Officer(CPO), Head of Management Support, Data Security Team Leader, Data Protection Officer, Talent Management Team Leader
Roles (Regulations)
  • General management of the information security management system
  • Operation of information protection and security control systems(Information Protection Guidelines)
Responsibilities
  • Enacting and revising privacy statements, policies, and regulations
  • Establishing Information protection strategy
  • Managing personal information risk assessment and handling personal information leaks
  • Deliberation, review, and resolution of other information security-related issues
Reporting Frequency Reporting as needed

Dedicated Organizations and Key Roles

  • Technical Leading(TL) Division, Data Security Team

    • Establish an information security strategy and internal control plan
    • Operate a data security management system
    • Strengthen information protection skills
    • Establish and operate a breach response system
    • Conduct information security training and awareness programs for employees
    • KISA Information Security Disclosure
    • Obtain and maintain privacy-related certifications
    • Report information security issues to management
    • Keep the entire organization up to date on the latest information security issues and trends
  • User Communications Department

    • Establish a privacy management plan
    • Conduct internal audits(twice a year)
    • Data Protection Officer
      • Handle complaints or comments about personal information from data subjects and review improvements

      • Oversee the ongoing management of personal information processors

      • Train personal information processors

      • Review and reflect improvements to the personal information processing system

      • Assist in inspections on compliance with personal information processing standards

      • Other matters required for personal information protection

Strategy

SOOP has taken various measures to respond to major risks and opportunities related to data security and privacy, including a privacy/ security management system, a response process in the event of an incident, and enhanced technical capabilities.

Risks and Opportunities

Risks and Opportunities
Risks and Opportunities
Risks Impact on Business Model and Value Chain Duration of Impact1)
Increasing data security regulations, privacy breaches, and cybersecurity threats
  • Information leaks lead to human rights infringement and property damage
  • Litigation and dispute risk, operational risk, and reputational risk
  • Short-term, medium-term, long-term
Risks and Opportunities
Opportunities Impact on Business Model and Value Chain Duration of Impact1)
Creating new business opportunities and strengthening competitive edge
  • Increase credibility as a business partner and expand opportunities for collaboration
  • Enhanced security technology makes organizations more resilient, enabling them to respond quickly in the event of an incident and ensures business continuity to strengthen competitiveness
  • Medium- to long-term
1) Short-term: less than 1 year, medium-term: 1-5 years, and long-term: more than 5 years.

Impact on Financial Position, Financial Performance, and Cash Flows

SOOP actively discloses its information security status every year. By disclosing information protection investments, budgets, and major activities, SOOP continues to conduct information protection activities that stakeholders can trust. As of December 2023, we have invested KRW 52.26 billion in information technology and KRW 970 million in information Security. The main investment purposes are the introduction of network security equipment and security solutions such as firewalls and harmful site blocking.

재무상태 표
Investment in Information Technology in 2023 Investment in Information Security in 2023
52.26billion 970billion

Privacy Protection Principles

SOOP annually formulates internal plans for personal information management and discloses them to all employees ensures that all employees are aware of their responsibilities and obligations related to personal information protection. In addition, disciplinary measures may be taken for violations of personal information-related responsibilities and obligations in accordance with the Information Protection Regulations, and such violations and the level of discipline may also affect employees’ performance evaluations.

01
SOOP complies with all laws and international standards on the protection of personal information.
02
SOOP always discloses the processing of the users’ personal information transparently.
03
SOOP respects the users’ rights to make decisions about their personal information.
04
SOOP collects only the minimum personal information needed to meet its objectives and manages this information responsibly.
05
SOOP prioritizes the protection of user privacy

Privacy Policy

SOOP complies with the personal information protection regulations, such as the Personal Information Protection Act and the Act on Promotion of Information and Communications Network Utilization and Information Protection. SOOP has established and operates a privacy policy in accordance with relevant laws to best protect the rights and interests of users.

Privacy Policy

How We Handle Data Breaches

To prepare for personal information leakage, we have established the ‘Leakage Response Guidelines’ and a systematic response procedure for dealing with potential incidents. We have systematized response steps, including notifying individuals/institutions in accordance with relevant laws, identifying the cause of the leakage, taking measures, and reflecting improvements. Additionally, we have designated teams for each step to provide relief to those affected by the incident and minimize damage.

In addition, in order to strengthen our employees’ ability to respond to such incidents, we conduct personal information breach simulation trainings twice a year. These exercises help us review and improve our incident response strategies based on various scenarios. In 2023, we held two simulation trainings, with a 100% participation rate, and an average of 797 employees participated in each training.

사고 대응 절차
  • 01 Initial Response

    • Record timeline-based incident circumstances
    • Operate an emergency contact network per risk level
  • 02 Root Cause Investigation

    • Identify the cause of the incident
    • If action cannot be taken internally, report the matter to higher-level staf
  • 03 Action

    • Internal action
    • Action through related departments or external contractors
  • 04 Action Delayed

    • If action is delayed, escalate the risk level
    • Report the matter to the highest-level staf
  • 05 Notification

    • Notify actions taken for each risk level
  • 06 Root Cause Analysis

    • Collect and analyze data
    • Determine the details of the incident
    • Draft an accurate report so that the situation is easily understood
  • 07 Recurrence Prevention

    • Decide how to prevent incidents from spreading or recurring
  • 08 Completion

    • Draw up security policies to identify and prevent similar attacks
    • Change procedures, record information about the incident, draw up long-term security policies, draft plans to modify technology
  • Held

    2 Simulation Trainings
  • Engagement Rate

    100%
  • Employees Participated in the Trainings

    An Average of 797
*As of 2023

Measures to Strengthen Safety and Security

SOOP is committed to enhancing the safety and security of our services. We are effectively defending against DDoS attacks by filtering malicious traffic through the Clean Zone service. We are also working with security companies to monitor and take additional measures to prevent attacks on SOOP’s users and streamers.

Strengthening ITGC with Mandatory External Audit of Internal Accounting Control System

In 2023, the Enforcement Decree of the Act on External Audit of Stock Companies was amended to require an external audit for SOOP’s internal accounting control system. In order to respond to external audits, we have revamped our IT-related control processes. In particular, we have strengthened our ITGC for important accounts related to financial statements, separated operators and approvers for important data change tasks and conducted frequent reviews, and mandated monthly internal audit activities to ensure data integrity.

ITGC, Information Technology General Controls

ITGC(Information Technology General Controls) controls IT systems to ensure the reliability and stability of organization’s IT systems, referring to the control activities over the acquisition, development, and maintenance of IT infrastructure, security management, and information technology. It includes control over program development and change, data and program access security, and operational management(backup and failover).

Information Security Disclosure

Since 2023, SOOP discloses information security status in detail through the KISA Information Security Disclosure Portal, and we were recognized as an Excellent Disclosure in Information Security Investment company in 2023 and 2024. The portal discloses SOOP’s information security-related data, such as governance, investment details, personnel, and activities. As of December 31, 2023, SOOP had 270.3 employees in information technology and 5.1 employees dedicated to information protection, and its information protection activities included providing information security and privacy training to all employees, conducting hacking simulation trainings, and conducting self-inspections and subcontractor audits for personal information protection.

  • Employees in Information Technology

    270.3
  • Dedicated to Information Protection

    5.1 Employees
  • Conducted

    2 Subcontractor Audits
  • Published

    9 Employee Privacy Guides
  • Revision to the Privacy Policy and Guidelines

    1
  • Privacy Training

    6 all-employee privacy trainings 2 all-employee hacking email trainings 2 privacy trainings
(As of Dec. 31, 2023)

Information Security Campaign

In June 2023, SOOP launched a campaign to promote a culture of personal information protection. The campaign established five security rules, including changing passwords regularly, using secure passwords, and not sharing accounts. These rules were distributed through SOOP’s user communication channels. This helped users recognize the risk of personal information leaks and encouraged them to take more proactive security measures.

Information Security Training

SOOP conducts a number of activities to boost the awareness of personal information controllers and processors of the importance of protection of personal information. In 2023, we conducted an information protection pledge procedure for all employees and held regular personal information protection trainings twice a year. In addition, SOOP also conducted ad-hoc trainings through a selfoperated training course system.

Information Security Trainings in 2023
Information Security Trainings in 2023
Content Company-wide security training
Subject All employees New employees
Frequency Twice a year
(first and second half)
Twice a year
(first and second half)
2023
Performance
470 employees completed the course in the first half 70 employees completed the course in the first half
321 employees completed the course in the second half 40 employees completed the course in the second half

Risk Management

Pre- and Post- Control Measures for Privacy Protection

SOOP complies with personal information protection laws and internal management regulations by checking the sensitivity of personal information collected and used in all services in advance. In addition, SOOP conducts personal information impact assessments at all times and operates a management system that comprehensively manages the rights and usage status of personal information processors.

We conduct an annual inspection of our personal information management to ensure compliance with procedures such as the collection, use, provision, protection, and destruction of personal information, and rights of users with respect to their personal information. We also conduct an annual inspection of the status of personal information protection for personal information subcontractors (all entities entrusted with processing SOOP’s personal information). We also prepare a personal information self-inspection list for each company and request improvements when violations or deficiencies are identified, and if there is no continuous improvement or the level of personal information protection is low, we conduct on-site inspections to ensure that improvements and measures are taken quickly. These follow-up control measures are checked by the CPO and are continuously managed to ensure that any deficiencies are improved.

Personal Information Impact Assessment
  • Adoption of Service Review the appropriateness of privacy protection in the adoption stage
    • Service planning
    • System establishment
    • Service development
  • Operation of Service Review the appropriateness again when updating items to be collected/used
  • End of Service Check on the safe discard of collected information when ending the service

Management of the Personal Information
Processing Systems

SOOP designates systems that handle personal information related to the services provided to users as ‘Personal Information Processing Systems,’ including business systems and database systems. We have also established systematic authorization standards and operating procedures for all actions related to the Personal Information Processing Systems, such as access, menu, inquiry, modification, and extraction. We also recommend using secure authentication methods to prevent unauthorized access by third parties. Additionally, to address external threats, we have encrypted the information access paths.
Furthermore, we have assigned approval groups for each system menu so that only the data processors who need the access to a specific menu can examine the information. These permissions require an application process and approval by the person in charge of personal information protection, and are granted through an appropriateness review. Logs of all acts performed by personal information controllers, such as granting, accessing, creating, changing, and deleting approvals are kept for a certain period of time, and we periodically review the appropriateness of approvals and revoke the approvals for unnecessary accounts.

Security Management System

SOOP classifies the assets in the information security management system according to the importance of the service and conducts a criticality assessment and risk analysis on a regular and ad-hoc basis. The criticality assessment and risk analysis are conducted according to the predefined items in the information protection management system and self-defined criteria; risk ratings are calculated; priorities and measures for improvement are reviewed; and plans for improvement are developed.

In this process, all assets of SOOP are subjected to periodic risk analysis and improvement on an annual basis to identify vulnerabilities so that users can use the service with confidence in a safe environment. The information security system is strictly controlled so that only relevant personnel or employees who have been authorized in advance through the approval process can access it. SOOP clearly determines and grants only necessary permissions through an appropriateness review according to the scope of work of employees, and all activities such as access history and configuration changes and attempts by unauthorized users are monitored. In addition, SOOP is working with a security system specialist company to detect and respond to abnormal signs or attempts by external hackers 24 hours a day and 365 days a year to prevent security breaches in advance.

Information Security Management System ISMS Certification

SOOP has received the Information Security Management System(ISMS) certification from the Korea Internet & Security Agency. We were first certified in 2014 and have been maintaining and renewing our certification ever since.

The ISMS certificate issued in 2022 is valid until January 2026. In 2023, we underwent a follow-up examination and successfully maintained our certification.

ISMS Certification

Metrics & Targets

SOOP has set and been systematically managing goals related to data security and privacy. In particular, we have had zero data breaches in the past three years, and we are committed to achieving zero data breaches in 2024.

Metrics & Targets
2021 2022 2023
Training Completion Rate(%)

New Hire Security Training

100 100 100

Malware Training

100 100 100
Personal Information Self-Check (number of cases) - 2 2
Personal Information Subcontractor Inspections (number of cases) - 2 2
Investment in Information Security(KRW) - 864,565,261 974,429,144
The Number of Personal Information Breaches 0 0 0
*Data on the number of personal information self-checks, subcontractors Inspections, and investments in information security in 2021 are not available.
List

Content List

  • Special Report: SOOP Way

    User Satisfaction Management

    #System of Satisfaction Management#Strategy of Satfisfaction Management #User Supporters Program #Communication Channels
    more
  • Special Report: SOOP Way

    Mutual Growth with Partners

    #Contents Support Centers #Psychological Counseling #Support for New Streamers #MCN
    more
  • Special Report: SOOP Way

    Data Security and Privacy

    #Organizational Chart for Data Security #ITGC#Information Security Campaign#Personal Information Processing Systems #Security Management System #ISMS Certification
    more
  • Special Report: SOOP Way

    User Protection

    #Media Content Operation Policy #Youth Protection Policy #Real-Time Monitoring #AI Filtering #Healthy Content Culture #Culture of Respect for Life #Copyright Violation
    more
  • Special Report: SOOP Way

    Talent Attraction and Development

    #Recruit Process#Training #Performance Management #Organization Assessment#HR ON
    more
  • Special Report: SOOP Way

    Work-Life Balance

    #Flexible Work Hour System #Workcation #e-town Hall #Internal Idea Competition #Welfare Programs
    more
  • Special Report: SOOP Way

    DEI

    #Female Employees #Maternity Protection System #Family-Friendly Enterprise
    more
Top