Principles

The Board of Directors consists of twelve members, all of whom were appointed by the Shareholders' Meeting. The Board has established four sub-committees to oversee management in all aspects and has outlined the qualifications for directors to ensure diversity in terms of gender, age, knowledge, and experience across various fields. The sub-committees are as follows:

  1. The Audit Committee (AC)
  2. The Executive Committee (ExCom)
  3. The Nominating and Corporate Governance Committee (NCG) and
  4. The Management Development and Compensation Committee (MDC)

There is also the establishment of sub-committees at management level to support and ensure comprehensive oversight of all operational aspects in line with Corporate Governance Principles, as follows:

  1. The Risk Management Committee (RMC)
  2. The Sustainability Development Committee (SDC)
Qualification Of Directors
Board of Directors’ Duty and Authority
Group Board Meeting Timetable 2026

Annual Corporate Policy Review:

The resolution of the Board of Director meeting no.8/2025 held on 24 November 2025 was to review and approved the Corporate Good Governance Policy and relevant practices as detailed below.

Corporate Governance and Code of Conduct
Anti-Corruption and Relevant Practices
Human Rights Policy and Employees Handbook
Sustainable Development Policy
Risk Management Policy
Personal Data Protection Policy
Cyber Security Policy
  1. Information Security Policy
  2. User Management
  3. Computer room access control
  4. Workstation Policy
  5. Email usage Policy
  6. Password Policy
  7. IT Service Management
  8. Data and Application Owner
  9. Backup and Restoration
  10. Cyber Security Policy
  11. Data Class Policy
  12. Data Encryption Control Policy
  13. Data Loss Prevention (DLP) Policy
  1. Third Party Access Policy
  2. Vulnerability Management Policy
  3. Malware Protection Policy
  4. Device and Media Handling and Destruction Policy
  5. Physical Security Policy
  6. Access Control Policy
  7. Bring Your Own Device Policy (BYOD)
  8. Remote Access Virtual Private Network (VPN)
  9. Internet Usage Control
  10. Incident Handling Policy
  11. Change Management
  12. Disaster Recovery Plan
  13. Audit Log Management