subject to an annual audit to maintain such certifications. In addition, our cybersecurity program is reviewed and evaluated by external, independent third parties, who assess and report on any weaknesses in our information technology systems on both a periodic and continual basis. Furthermore, we utilize the curriculum provided by the Financial Security Institute to provide cybersecurity trainings to all of our employees.
From time to time, we
engage certain third-party service providers that may process the personal information of our customers. In such cases, we enter into security management agreements with such service providers to ensure that they comply with our strict security standards. We also conduct periodic
on-site
inspections of such service providers and provide them with periodic security training sessions.
Our business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previous cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by such risks and any future material incidents. See “Item 3.D. Risk Factors—Other risks relating to our business—Our operations have been, and will continue to be, subject to increasing and continually evolving cybersecurity and other technological risks” for more information on risks from cybersecurity threats that are reasonably likely to materially affect our business strategy, results of operations and financial condition. Governance
Our board of directors’ principal role is one of
oversight, recognizing that management is responsible for the
design, implementation and maintenance of an effective cybersecurity program for protecting against, and mitigating, data privacy and cybersecurity risks. Members of our board of directors stay apprised of the rapidly evolving cyber threat landscape as well as cybersecurity risks specific to us and our subsidiaries, and provide guidance to management as appropriate in order to enhance the effectiveness of our overall cybersecurity program.
Our board of directors has delegated the direct responsibilities relating to assessing and managing cybersecurity risks to our Chief Information Security Officer (“CISO”), who provides periodic reports on risk assessment and cybersecurity strategies to the board of directors. These reports include information about our information security management system and our personal information protection policy. In addition, the CISO provides quarterly evaluation reports to the board of directors concerning the sharing of customer information among our subsidiaries. The board of directors also reviews and approves our cybersecurity risk management processes on a periodic basis. In particular, the board of directors reviews our evaluation report on our use of customer information on a quarterly basis and our evaluation report on our management and use of personal credit information on an annual basis. It also reviews our overall cybersecurity strategy plan once every three years.
The
monitoring,
assessment
and management of material cybersecurity risks is conducted by our management. We and each of our major subsidiaries operate an information security system operated by a CISO, who is responsible for managing cybersecurity risk management processes under the supervision of the board of directors at their respective companies. As part of such process, the CISO provides monthly reports to our chief executive officer on the results of our cybersecurity assessments.
We and each of our major subsidiaries also maintain an Information Security Department and an Information Security Committee, each chaired by the CISO, which monitors incidents of customer information misuse, unauthorized access to our customer information and failure to comply with information security policies, among others, through an
integrated information security management system. Our Information Security Committee is responsible for reviewing and approving the following:
| • | | our annual general information security and information technology work plans; |
| • | | strategies and plans for ensuring the safety of electronic financial transactions and the protection of our customers; |