본문바로가기

Governance

Ethical Management

Information Protection

SK Chemicals is committed to ensuring the safety and management of valuable information assets of customers and the company by introducing an abnormal sign monitoring system to prevent confidential data leaks. In 2023, the company obtained international standard information security certification (ISO 27001), establishing a global-level information security system.

ISO 27001 Certification
Information Security Declaration

SK Chemicals aims to maximize the profits of each subsidiary through internal information protection to secure competitiveness and is committed to providing High-Quality Service through the protection of customer information.

Information Security Management Organization

SK Chemicals designates the CEO as the Chief Information Security Officer (CISO) and supports the management (budget, personnel) of the security organization.

  • CISO (Digital Innovation Center Head)

  • IT

    Chief Information Security Officer (CISO)
    (Digital Innovation Center Head)

  • Personal Information

    GC
    Personal Information Data Protection Officer
    (Corporate Culture Department Head)

    LS
    Personal Information Data Protection Officer
    (LS Management Support Department Head)

    LS Biz
    Personal Information Data Protection Officer
    (LS Management Support Department Head)

  • Physical

    Head Office Physical Security Officer
    (Corporate Culture Department Head)

    Regional Office Physical Security Officer
    (Factory Manager or Management Support Department Head)

Information Security Roadmap
  • Phase 1 (2022)
    Priority tasks for strengthening ID/device security and preventing data leaks

    • Establishment of document security classification system and enhancement of document usage history management
    • Enhancement of user credentials and business device security
  • Phase 2 (2023)
    Detection and automated response to security incidents for IDs/devices

    • Automated document security and compliance management
    • Automation of threat detection and response
  • Phase 3 (2024)
    Integration of authentication systems and advanced detection of internal information leaks

    • Automatic detection of internal information leak attempts
    • Implementation of authentication systems based on Modern Authentication