Governance
Governance
Ethical Management
Ethical Management Menu
Information Protection
SK Chemicals is committed to ensuring the safety and management of valuable information assets of customers and the company by introducing an abnormal sign monitoring system to prevent confidential data leaks. In 2023, the company obtained international standard information security certification (ISO 27001), establishing a global-level information security system.
Information Security Declaration
SK Chemicals aims to maximize the profits of each subsidiary through internal information protection to secure competitiveness and is committed to providing High-Quality Service through the protection of customer information.
Information Security Management Organization
SK Chemicals designates the CEO as the Chief Information Security Officer (CISO) and supports the management (budget, personnel) of the security organization.
-
CISO (Digital Innovation Center Head)
-
IT
Chief Information Security Officer (CISO)
(Digital Innovation Center Head) -
Personal Information
GC
Personal Information Data Protection Officer
(Corporate Culture Department Head)LS
Personal Information Data Protection Officer
(LS Management Support Department Head)LS Biz
Personal Information Data Protection Officer
(LS Management Support Department Head) -
Physical
Head Office Physical Security Officer
(Corporate Culture Department Head)Regional Office Physical Security Officer
(Factory Manager or Management Support Department Head)
Information Security Roadmap
-
Phase 1 (2022)
Priority tasks for strengthening ID/device security and preventing data leaks- Establishment of document security classification system and enhancement of document usage history management
- Enhancement of user credentials and business device security
-
Phase 2 (2023)
Detection and automated response to security incidents for IDs/devices- Automated document security and compliance management
- Automation of threat detection and response
-
Phase 3 (2024)
Integration of authentication systems and advanced detection of internal information leaks- Automatic detection of internal information leak attempts
- Implementation of authentication systems based on Modern Authentication