Information Security Policy

Last updated: September 1, 2025

To protect information assets from various threats and manage them appropriately, we establish the following policies。

1. Purpose

We maintain confidentiality, integrity, and availability to ensure stable service and customer trust。

2. Governance and responsibility

3. Policy operation

4. Incident response

If an information security incident occurs or signs are detected, we will promptly investigate the cause, prevent further damage, recover, and report to relevant authorities as necessary。

5. Compliance with laws and regulations

We comply with the Act on the Protection of Personal Information and other relevant laws, guidelines, and internal rules。

6. Continuous improvement

We evaluate operations through inspections, audits, and reviews, and make improvements as necessary。