Article NO. Content

Title:

Reference Guidelines on the Supply Chain Risk Management of Service Enterprises in Securities and Futures Markets 

Announced Date: 2023.11.13 (Articles 4, 7, 10 amended,English version coming soon)
Current English version amended on 2022.04.26 
Categories: Information Operations
Article 3     (Definitions)
  1. Information technology outsourcing:
  2. A situation where an organization outsources information and communication services in whole or in part to software and hardware suppliers, maintenance and operation contractors, and cross-institutional partners outside the organization.
  3. Information asset:
  4. An asset pertaining to the processing of information, including hardware, software, data, documents, and personnel, etc., such as information of the operating system, applications, and other software of a server or a user’s computer.
  5. Information and communication system:
  6. A system used for collecting, controlling, transmitting, storing, circulating, deleting information or otherwise processing, using, and sharing information.
  7. Information and communication service:
  8. A service relating to the collection, control, transmission, storage, circulation, erasure, or other processing, use, or sharing of information.
  9. Cloud computing service:
  10. A flexible, scalable, and self-operatable service available to users for the purpose of sharing computing resources through network technology.
  11. Trade secret:
  12. A method, technology, manufacturing process, prescription, program, design, or other information that can be used in production, sale, or operation, meeting the following requirements:
    1. information not known to people whom such type informationcommonly involves
    2. information of an actual or potential economic value on account of its secrecy
    3. information for which everyone has taken reasonable measures of confidentiality
  13. Access:
  14. Various ways of accessing information assets, including acquisition, use, safekeeping, inquiry, revision, adjustment, destruction, etc.
  15. Project officer:
  16. The project manager, head of the department in charge of the particular business, or person designated thereby.
  17. Security by design:
  18. The process of incorporating the concept of information and communication security into a service or product during its inception. Security requirements are listed, security risks identified, and control measures implemented during the design stage of the development process, as the basis for the verification of security functions to ensure a secure life cycle of the software.
  19. Privacy by design:
  20. The process of incorporating the concept of privacy protection into a service or product during its inception. Privacy protection requirements are listed, relevant risks identified, and control measures implemented during the design stage of the development process, as the basis for the verification of security functions.
  21. Information and communication security event
  22. An event where a system, service, or network is found upon evaluation to show signs of a possible breach of the information and communication security policy or failure of a protective measure, which impacts the operation of the information and communication system, constituting a threat against the information and communication security policy.