Go to article

ESG Management

Hyundai Department Store Group is
conducting sustainable development
through eco-friendliness, socially
responsible management, and the
improvement of its corporate governance.

Information Protection

Hyundai Department Store Group verifies the stability and reliability of its security management system every year, through prominent information protection institutions in Korea and abroad. Moreover, we protect the Group’s assets by providing an integrated service through data security consultations and the development of security solutions. Also, to be able to correspond instantly to external cyber-attacks, we operate security control system around the clock, every day of the year, engaging in the diagnostics of internal vulnerabilities, mock hacking, failure management, and regular mock training to ensure protection of personal information as well as the ontinuity of our business.

Information Security

icon

Information Security
Certification

  • Information Security and Certification of the Information Security Management System for Personal Protection (ISMS-P)
    - Hyundai Department Store,
    Hyundai Home Shopping,
    Hyundai Department Store Duty Free
  • Certification of the Information Security Management System (ISMS)
    - Handsome, Hyundai Livart, Hyundai Ezwel, Hyundai Futurenet
  • International Information Security Management Certification (ISO/IEC 27001)
    - Hyundai Department Store Duty Free
icon

Information Security
Policy

  • Protect personal information and prepare systems/guidelines on information security
  • Guidelines on administrative technology, and physical security
  • Privacy Impact Assessment, a guide to infringements and violations, and a guide to the recovery from IT disasters
icon

Information Security
Activities (365 days, 24 hours)

  • Examine the security of new or modified services in advance
  • Perform security audits on the security level and analyze the vulnerabilities for each affiliate
  • Resolve and prevent security risks through continuous management/supervision
  • Vulnerability tests and mock hacking (server/DB/network/App vulnerability inspections/management)
  • Operate and monitor Endpoint, WEB/App, and network security solutions
  • Foster a mindset that prioritizes personal information protection among employees