퀵메뉴 닫기
  • 코웨이 홈페이지
  • 무한책임 위원회
  • 코웨이 공기연구소
  • 요약보고서 다운로드
TOP
퀵메뉴 열기

Customers

  • Sustainability Management
  • Customers
  • Customer Data Protection

Customer Data Protection

Data Protection System

Due to our nature of rental service business, it is important for us to strengthen our data protection system as we collect and handle the personal data of our customers. To this end, we have established a data protection organization with the CPO and ICT Strategy Division playing a central role while improving our service quality by organically integrating product information and analysis service. We also built an integrated management system to improve the efficiency of data protection and management while organizing the Data Protection Committee for the review and resolution of important issues. In 2017, the committee held a meeting once and discussed keeping our data protection policies and guidelines up to date with legislation.

Data Protection Organization

Data Protection Activities

  • Collect
    customer information

    Enhance the identification process when signing contracts

    Provide option to accept/refuse data collection for marketing purposes

  • Archive and
    use information

    Encrypt personal data stored in DB

    Encrypt confidential documents in employee PCs

  • Destroy
    customer information

    Outsource document destruction process

    Require confirmation of data destruction from suppliers

Date Protection Management System

In order to protect our customers’ personal data and information assets, we renewed the ISMS (Information Security Management System) certification and acquired ISO 27001 which is the international standard for managing risks in information security. We also process and monitor customers’ personal data based on the integrated security control system which collects the logs of the entire system using the IDC1).Furthermore, the database encryption and document security system (DRM) helps improve the performance of our security system and protect data from being leaked.

Personal Data Process

To keep customers’ personal data secure, we ensure that VDI2)is fully implemented and used by the data processors and suppliers. In addition, we identify any vulnerabilities in our sales data system such as web and mobile apps to minimize the exposure of personal data and remove unnecessary information. Furthermore, we organize training sessions against security breaches and IT disaster recovery training sessions once a year to check our security performance and make necessary improvement in our response to security emergency situations.

  • 1)IDC: Internet Data Center
  • 2)VDI: Virtual Desktop Infrastructure
    A solution that uses the resources of a virtual server at the center to provide virtual desktop and storage space per user. It is secure against hackers and offers complete protection against data leakage.

Employee Security Awareness

Security Training

In order to raise security awareness of our employees, we organize corporate-wide training programs. The programs are sub-divided based on the job and provided both on and offline to improve its effectiveness. In 2017, we focused on our internal security regulations and case studies on documents/personal data security in line with the industrial trend, and ensured every employee completed the training.

Security Training information
Type Position Participants Completion Rate Remarks
Online Training Staff-Manager 4,100 100% Incl. sales, production positions
Contractor 104 100% -
Offline Training Executive Officers 22 100% Head of part or higher ranking officer
Newly Employed 38 100% Security training session as
part of HR Development Team’s training program
Experienced 49 100%
New Coordination Team Manager 369 100% Security training session as
part of Training Team’s training program
New Staff 90 100%
New BB* Team Manager 16 100%
  • *BB: Bluebird, Organization of young business professionals
Security Analysis

Our security analysis is divided into regular and occasional system analysis sessions while personal data stored in PCs and system access are monitored on a regular basis. In 2017, we conducted a security analysis of personal and public space against 71 teams in our headquarters and any vulnerabilities identified were promptly dealt with on site. In 2018, we will expand its scope to include research labs, sales branches, and manufacturing facilities to identify their regulatory and process compliance while service providers carry out analysis and due diligence based on the contents and scale of service. When it comes to systems such as server and network, we plan to enhance our data security control and deal with vulnerabilities once a year.

Data Protection Performance
Data Protection Performance Information
Category Description Data Protection Performance in 2017
Data Security Management System

Operation of data security management system

Continued data security management system control

Renewed ISMS certification, acquired ISO27001 for the first time

IDC

Hacking simulation (2 times/year), vulnerability analysis (1 time/year)

Security breach response training (1 time/year)

Increased the target for hacking simulation (app/web)

Conducted analysis of system vulnerabilities

Increased security breach response training

Personal Data, DB

Encryption of personal data

Data control management within DB

Improved DB encryption level and performance (algorithm)

Performed maintenance on SAP data (personal data)

PC, Document Security

Operation of PC security system

Introduced DRM (document encryption) solution

Enhanced the encryption of electronic documents and watermark of printed materials to improve security

Employees

Data security training

Increased the target for cluster training (offline)

Raise security awareness through malware simulation training

coway
  • Headquarters : 100-759, 17F, JoongAng Ilbo Bldg., 88, Seosomun-ro, Jung-gu, Seoul
  • Business Site : 136-23, Yugumagoksa-ro, Yugu-eup, Gongju-si, Chungcheongnam-do
COPYRIGHT COWAY CO., LTD. ALL RIGHTS RESERVED.