The government’s inter-ministerial task force (TF), established to handle the Coupang data breach, convened its initial meeting and chose to quickly examine the incident’s origins and determine accountability.

The TF addressed guidelines for its functioning, such as swift issue resolution and stringent actions, during its initial meeting on the 23rd at the Government Complex in Seoul. Previously, the government established a multi-ministerial TF, headed by the Second Vice Minister of the Ministry of Science and ICT, following a significant breach of customer data at Coupang that led to extensive public concern.

The TF intends to concentrate on conversations about the investigation and legal action related to the breach, safeguarding users, revising the information and personal data protection certification systems, and enhancing corporate responsibility. Ryu Je-myung, the Second Vice Minister of the Ministry of Science and ICT, stated, “The government views the Coupang incident as a significant societal crisis that has eroded public confidence. Through the inter-ministerial TF, we intend to quickly carry out an investigation into the cause of the incident, determine responsibilities, protect users, and reinforce corporate social responsibility.” He further mentioned, “The government will support the people and uncover Coupang’s issues until all public concerns and anxieties are addressed, and ensure full accountability.”

Meanwhile, the Ministry of Science and ICT revealed plans to restructure its operations to better address cyber incidents. The ministry said, “We will rename the existing Network Policy Office to the Information Protection and Network Policy Office and enhance its responsibilities.” It also noted, “To ensure rapid investigation and response to cyber incidents, we will create a specialized Cyber Incident Investigation Team (comprising 5 members) and increase the investigation and response team size from 2 to 5 members.” The Cyber Incident Investigation Team will manage the full process of policies, including analyzing the causes of breaches, responding to them, preventing further damage, recovery, and implementing measures to avoid future occurrences.

Leave a comment

Trending