Page 75 - Amata-one-report2020-en
P. 75
BUSINESS OPERATION AND OPERATING RESULTS CORPORATE GOVERNANCE FINANCIAL STATEMENTS ENCLOSURES
Cyber Security (Network and Digital Data Security)
Cyber Security (Network and Digital Data Security)
As we are now moving to digitalization era, fast technology development has influenced business operations,
works, and lives in every way. They change lifestyle of people in the society and working behaviors, and businesses
have to implement digital technology to lift up standards and potential of the organization for competitive advantage.
In addition, New Normal faced by all organizations boosted up and accelerated usage of digital technology. Usage of
information technology and digital data play significant roles for seamless business operations under many restrictions.
Risk Incurred
Communication via large computer networks or internet which connected with complicated network systems that
linked with computer systems throughout the world posted the risks to security of networks digital data, as they may
leak or loss due to various factors.
Risk Factors
At present, frequency of network and digital data attacks tended to increase with more severity continually and it
may lead to damage or loss of crucial business information. Business information leakage may cause by the Company’s
security system and carelessness of the digital data users, such as electronic meeting, usage of electronic mail,
transmission of digital data on personal device on a large computer network and networks with various security levels,
i.e., mobile phone or laptop, and they can cause security risk to digital data.
Risk Impact
If important business information has leaked or damaged or lost, it may jeopardize the Company’s businesses, i.e.,
loss of business opportunity and continuity of project developments, and it may also impact to the Company’s reputation.
Risk Management
Due to growing tendency on usage of network system and digital data, the Company put emphasis on cyber
security, by not only inspecting and monitoring closely, but also implementing proactive measures to reduce likelihood
of leakage or loss of important business information, for instance development of effective system and equipment to
detect security vulnerability of computers and network system in the Company, testing Disaster Recovery Site every
year. The Company constantly builds awareness of information technology threat to the employees, which covering
preventive measures and information technology laws. The employees have been constantly reviewed on business
ethic and strict measures have been imposed to the person who violates the Company’s business ethics.
Amata Corporation Public Company Limited 75