Skip to text Skip to main menu

ESG

Social

Information Protection Policy

Hyundai Polytech recognizes information security as an essential element for sustainable management and has established and faithfully practices an 'Information Security Policy' as follows to safely protect Hyundai Polytech's assets from information security threats.

Hyundai Polytech Information
Security Policy

1. Establish information security organization and system suitable for the company's scale and business, and continuously improve information security levels.

2. Establish and continuously develop prevention, detection, and response systems for information security incidents to create a safe business environment.

3. Improve information security awareness of company employees and partners to establish an information security culture.

Information Protection Organization

Hyundai Polytech is building an information protection organization to safely protect against information security threats.

Information Protection Organization Chart

Information Protection Activities

  • Vulnerability Assessment and Simulation Training Implementation
    Hyundai Polytech conducts practical simulation training once or more annually to strengthen the company's security level and improve employee awareness for cyber attack prevention and damage minimization.
    We conduct training by sending the latest trending social engineering hacking emails to employees and perform DDoS attacks on operating sites.
    Additionally, we check through IPS and WAF for operating server vulnerability detection response to already identified vulnerability attacks.
  • Security Solution Operation
    Hyundai Polytech operates security solutions such as spam mail blocking and intrusion prevention for information leakage prevention. We minimize trade secret leakage and exposure risks through policy application that detects and blocks external information leakage history through DLP (Data Loss Prevention), operate sensitive information management encryption, and operate dualization and backup solutions and storage through operating server virtualization solutions.

Information Security Regulations Information Security Regulations Download