Information assets to which the Information Security Policy applies are information obtained or learned in the course of SyncMOF’s business activities, as well as all information possessed by SyncMOF for business purposes.
SyncMOF establishes a system that can quickly implement information security measures by setting up an Information Management Committee and appointing an information management supervisor for each organization to protect all information assets owned by SyncMOF and manage them properly.
SyncMOF shall develop internal rules on information security and ensures that all employees comply with the clear set rules and policies to protect the information assets and manage them properly.
SyncMOF complies with various laws and regulations related to information security, codes of conduct formulated by administrative bodies and industry groups, internal regulations, and rules. SyncMOF conducts information security audits regularly and as appropriate to verify that these security measures are functioning effectively, and responds strictly if there have been any violations in order to ensure appropriate information management.
To prevent unauthorized access, data corruption, information leakage, and tampering of data assets, SyncMOF takes appropriate and necessary information security measures from organizational, physical, technical, and humanitarian perspectives. These security measures are continuously improved and modified to adapt to social and technological changes.
SyncMOF continuously provides education and training to all employees to ensure that information security literacy is improved, and the information assets are appropriately managed.
SyncMOF examines the qualifications of its outsourced contractors before signing a contract and requires them to maintain an equivalent or higher level of information security standards. Furthermore, SyncMOF regularly conducts audits for its outsourced contractors to ensure that their security stand is ards are adequately maintained.
SyncMOF continuously improves its information security management system by regularly assessing and reviewing the above efforts.
Please feel free to contact us if you have any concerns about MOFs and PCPs,
property measurements, implementation steps, and estimation of the cost.
We look forward to working with you to open up the way to a new future.