INFORMATION SECURITY MANAGEMENT SYSTEM POLICY OF UBCAB HOLDING LLC
/ Document No: ISMS-DOC-02-1 /
Date: September 22, 2025
INTRODUCTION
“UBCAB HOLDING” LLC (hereinafter referred to as the “Company”) is a leading fintech and technology holding company in Mongolia, comprising multiple subsidiaries operating in ride-hailing, delivery, 24/7 customer service, logistics, fintech payment solutions, vehicle leasing, and software development.
In its daily operations, the Company processes highly sensitive information, including financial systems, personal data of users and drivers/couriers, location data, fintech platform data, and customer interaction records. Therefore, ensuring information security is of critical importance to maintaining business continuity, service quality, and customer trust.
By implementing the international ISO/IEC 27001:2022 standard, “UBCAB HOLDING” LLC establishes a comprehensive system to protect the confidentiality, integrity, and availability of information assets based on risk management principles and adopts an integrated security approach across all business sectors. This is particularly important in areas such as ride-hailing, protection of user data and location data in delivery services, PCI DSS compliance for payment data in fintech services, and secure operations in software development and cloud services.
In recent years, new requirements have emerged in Mongolia’s legal and regulatory environment regarding information security and personal data protection. The Cybersecurity Law adopted in 2021, the Personal Data Protection Law effective from 2022, as well as regulations issued by the Financial Regulatory Commission and the Bank of Mongolia on information technology and financial service security, require companies to adhere to a high level of information security standards.
Accordingly, “UBCAB HOLDING” LLC and its subsidiaries declare through this policy that they will not only implement an ISMS compliant with ISO/IEC 27001, but also comply with industry-specific standards and regulations, including taxi service standards, financial regulatory requirements, PCI DSS for payment systems, and AML/KYC requirements at both domestic and international levels.
This Information Security Policy defines the key principles and requirements to be followed within the Information Security Management System (ISMS), tailored to the operational characteristics of “UBCAB HOLDING” LLC and all its subsidiaries.
The policy serves as a foundational document that ensures leadership commitment and direction in information security and defines ISMS objectives and goals. Furthermore, through this policy, the Company establishes requirements for:
SCOPE
This policy shall apply to “UBCAB HOLDING” LLC and all its subsidiaries. The provisions of this policy shall fully apply to information security activities across all organizational structures, units, and affiliated entities of the Company. Specifically, the policy shall be implemented within the following scope:
The implementation of this policy shall be ensured across the entire Group, including software development, system code, and technical solutions. Where necessary, each subsidiary may develop and implement internal procedures and guidelines tailored to its operational specifics.
In such cases, these procedures and guidelines must be fully aligned with this policy and shall be governed under the unified framework of the Information Security Management System (ISMS) of “UBCAB HOLDING” LLC.
OBJECTIVE
The objective of this policy is to ensure an appropriate level of protection for the information assets of “UBCAB HOLDING” LLC and all its subsidiaries, thereby:
Through this Information Security Policy, the Company’s top management demonstrates its leadership and commitment to information security management and uses this policy as a foundational document for defining ISMS objectives.
This policy establishes information security objectives and principles aligned with the ISO/IEC 27001:2022 standard and serves as the basis for developing supporting policies, procedures, and guidelines. Within this framework, the Organization sets the following objectives:
In order to achieve these objectives, this policy defines the scope and measures for establishing and maintaining the Information Security Management System across the Organization, including:
TERMS AND DEFINITIONS
The following terms used in this policy shall be understood as defined below:
POLICY PRINCIPLES
“UBCAB HOLDING” LLC and its subsidiaries shall adhere to the following fundamental principles to ensure information security:
Principle of Legal and Regulatory Compliance:
The Organization shall fully comply with all applicable laws, regulations, and rules issued by regulatory authorities related to information security. This includes, but is not limited to, the Law on Personal Data Protection of Mongolia, the Cybersecurity Law, and other relevant legal acts. The Organization shall also strictly fulfill information security obligations and requirements stipulated in contracts and agreements with third parties.
Principle of Accountability (Information Asset Ownership):
All information assets owned by the Organization shall have clearly defined owners. Asset owners are responsible for defining acceptable use, access levels, and implementing appropriate protection measures. Information assets shall be classified, and corresponding protection requirements shall be applied based on their classification (e.g., confidentiality levels).
Principle of Need-to-Know:
Access to information shall be granted only to authorized personnel based on business necessity. Users shall be provided with the minimum level of access required to perform their duties, and privileges shall be managed and reviewed in a controlled manner. Technical and organizational measures shall be continuously improved to prevent unauthorized access.
Principle of Information Classification and Labeling:
The Organization shall classify all information assets according to defined classification levels and apply appropriate protection and handling procedures. Information shall be labeled (e.g., public, internal use, confidential, highly confidential), and specific rules for storage, transmission, and disposal shall be established for each classification level. Employees are responsible for handling information in accordance with its classification.
CONTROL DOMAINS
Access to the Company’s information and system resources shall be granted only to authorized employees and users. Access rights shall be granted, modified, and revoked in accordance with formal procedures, ensuring that each user is provided only with the minimum level of access necessary to perform their duties.
User account management, password policies, multi-factor authentication (e.g., 2FA), and network access controls shall be implemented to ensure that only authorized individuals can access information. Access rights shall be recorded, periodically reviewed, and unnecessary privileges revoked. Particular attention shall be given to administrative and privileged accounts, and their usage shall be logged and monitored.
Cryptographic techniques shall be widely used to ensure the confidentiality and integrity of information. Sensitive data (e.g., customer personal data, payment card data) and data transmitted between systems shall be protected using approved cryptographic algorithms (e.g., AES, RSA).
Secure protocols such as TLS/SSL shall be used for data transmission, and data shall be encrypted during storage. Cryptographic keys shall be securely managed throughout their lifecycle (generation, distribution, storage, archival, and destruction). Procedures shall be established for detecting, recovering from, and auditing key-related incidents.
All information assets (including data, software, hardware, and documents) shall be inventoried, classified, and assigned to responsible owners. An asset register shall be maintained, and asset owners shall be responsible for the proper use and protection of their assigned assets.
Information assets shall be classified based on their value, sensitivity, and risk level, and appropriate protection measures shall be applied. Mechanisms shall be in place to monitor asset integrity, usage, and location, and all changes to assets (creation, transfer, disposal) shall be recorded and managed in accordance with established procedures.
Information security requirements shall be integrated into recruitment and termination processes. Background checks may be conducted where appropriate. Job descriptions shall include information security responsibilities, and employees shall acknowledge compliance with policies as part of their employment contracts. Regular information security training shall be provided.
When an employee’s role changes or employment is terminated, the following measures shall be implemented:
Physical protection of facilities housing information systems and storage devices shall be ensured at a high level. Controls (e.g., security personnel, CCTV) shall prevent unauthorized physical access.
Critical areas such as server rooms shall be restricted to authorized personnel, and visitor access shall be controlled and logged. Environmental protections (e.g., fire detection systems) shall be implemented to prevent damage. Portable devices shall be protected using measures such as encryption, tracking, and remote wipe capabilities.
Best practices for IT operations shall be followed. Systems shall be securely configured, and anti-malware protection shall be implemented and regularly updated.
Multi-layered network security solutions (e.g., firewalls, IDS/IPS, VPN) shall be used to prevent unauthorized access. Logs and event data shall be continuously collected and analyzed to detect threats.
Change management procedures shall be strictly followed. All system changes shall be approved and tested prior to implementation. Security risk assessments shall be conducted for major changes, and testing shall be performed in isolated environments before deployment.
Logs shall be centrally stored, retained, and made available for investigation in the event of security incidents.
Information security requirements shall be included in contracts with third parties (e.g., banks, cloud providers, vendors). Due diligence shall be conducted during vendor selection, and certifications such as ISO 27001 may be required.
Contracts shall include confidentiality obligations and incident reporting requirements. Supplier performance and security compliance shall be periodically reviewed, and corrective actions shall be required for non-compliance.
A structured incident management process shall be established, including:
This process ensures rapid response and supports business continuity while maintaining organizational readiness.
Information security is integral to business continuity. The Organization shall develop and maintain Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP), including regular testing.
Critical systems shall be backed up regularly, with defined recovery objectives (RTO, RPO). Plans shall include roles, communication, alternate locations, and resource requirements, and shall be reviewed annually.
The Organization shall ensure compliance with all applicable legal, regulatory, and contractual requirements, including:
ROLES AND RESPONSIBILITIES
In order to ensure the successful implementation of the Information Security Policy, clear roles and responsibilities shall be assigned at all levels of the Organization. The key roles and responsibilities are defined as follows:
The executive management team shall approve the Information Security Policy and support its implementation. The Management Board shall prioritize information security across the Organization, provide necessary resources (human, financial, and technological), and lead the implementation of the policy.
They shall regularly review the achievement of ISMS objectives, monitor the overall risk posture, review internal audit results, and make decisions on improvements.
The Organization shall establish an internal Information Security Committee consisting of representatives from multiple departments. This committee shall provide guidance and oversight for the implementation of information security policies and strategies.
Where appropriate, it may operate in coordination with the risk management committee. The committee shall review information security requirements, assess risks, and coordinate policy implementation across all major departments and subsidiaries.
At the Group level, the Chief Information Security Officer (CISO) shall be responsible for the day-to-day management of the ISMS and the implementation of this policy.
The CISO’s responsibilities include developing information security strategies and plans, conducting risk assessments, advising employees, overseeing internal audits and monitoring activities, and reporting to management. The CISO shall regularly report on policy implementation, incidents, and risks, and propose improvements to management.
Managers of business units and subsidiaries shall be responsible for implementing and enforcing this policy within their respective processes and information systems.
They shall assign ownership for each information asset under their responsibility and ensure that appropriate security controls are implemented. They shall also ensure that information security assessments and risk evaluations are conducted when initiating new projects, products, or changes.
IT personnel and system/network administrators shall implement technical controls in accordance with this policy.
They shall manage user access, system configurations, network security, backups, and daily operations in compliance with security procedures. System administrators shall ensure secure configurations of systems under their responsibility and promptly report and remediate any vulnerabilities or incidents.
All employees, as well as contractors and partner personnel with access to information systems, are responsible for complying with this policy.
Each employee shall follow information security procedures and properly use and protect information according to its classification and confidentiality requirements. Employees shall immediately report any suspected or actual security incidents to the relevant unit (IT service or Information Security Manager).
They are also responsible for safeguarding their passwords, credentials, and devices, and must not disclose Company information to unauthorized parties.
The internal audit function and compliance personnel shall monitor adherence to this policy and related procedures to ensure compliance with laws, regulations, and standards.
They shall conduct regular and ad hoc audits, assess policy implementation, and report findings. Identified issues shall be categorized (e.g., major or minor non-conformities), and responsible units shall be required to implement corrective actions within defined timelines. Internal audit provides independent assurance and drives continuous improvement of the ISMS.
Third parties that may impact information security (such as suppliers, outsourcing providers, and business partners) shall comply with information security requirements as defined in contractual agreements.
Compliance with these requirements shall be monitored jointly by business units and the Information Security Manager. Where necessary, improvement actions (e.g., additional controls, independent audits) shall be required.
POLICY IMPLEMENTATION, MONITORING, AND AUDIT
During the implementation of this policy, it is essential to continuously monitor, improve, and ensure compliance with related internal procedures, processes, and technical measures. The principles and approaches for monitoring and auditing the implementation of this policy are as follows:
The approved Information Security Policy shall be communicated to all employees and relevant third parties (e.g., via internal networks, email, and briefing sessions). All employees must understand the content of this policy and be capable of implementing it in their daily work.
New employees shall receive training on information security policies and procedures upon onboarding, and all employees shall participate in regular refresher training (annually or as required). Through such training, employees’ awareness and understanding of information security shall be enhanced, fostering a culture of compliance.
The implementation of the Information Security Policy shall be regularly monitored, measured, and evaluated. Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) shall be defined, such as:
Monitoring shall be conducted using automated tools (e.g., log management systems, risk management tools), and results shall be reported regularly. If abnormal trends are detected, root cause analysis shall be performed and appropriate corrective actions implemented.
Planned internal audits shall be conducted annually to assess compliance with the Information Security Policy and all related controls.
Internal audits shall be performed by independent and qualified personnel (internal audit unit or external specialists) in accordance with ISO/IEC 27001 requirements. Audit findings shall be documented, and corrective action plans shall be developed and implemented by responsible units. Follow-up reviews shall ensure effective remediation.
Audit results shall be reported to top management, who shall determine whether updates to policies or procedures are required.
Where the Organization seeks ISO/IEC 27001 certification, it shall undergo certification audits by accredited external audit bodies. If compliance is confirmed, ISO/IEC 27001 certification shall be granted.
To maintain certification, periodic surveillance audits shall be conducted by external auditors. Recommendations and findings from external audits shall be promptly addressed to continuously improve the ISMS.
This policy shall be reviewed and updated regularly (at least annually) to reflect organizational changes, new legal requirements, and technological developments.
Updated versions of the policy shall be prepared by the Information Security Manager, reviewed by the Information Security Committee, and approved by top management. The updated policy shall be promptly communicated to all employees to ensure continued compliance.
In the event of violations of this Information Security Policy, appropriate actions shall be taken against the responsible employees or units.
Depending on the nature and severity of the violation, disciplinary measures may include formal warnings, mandatory retraining, or termination of employment in serious cases. This ensures a strong culture of compliance and accountability across all levels of the Organization.
This policy shall take effect from the date of approval and shall serve as the primary document governing information security across “UBCAB HOLDING” LLC and all its subsidiaries.
USER DATA PRIVACY AND DIGITAL SERVICE SECURITY
The Organization shall comply with the relevant laws and regulatory requirements of Mongolia when ensuring user data privacy and digital service security. These include:
The Law on Personal Data Protection of Mongolia – lawful collection, processing, storage, transfer, and deletion of personal data;
The Law on Cybersecurity of Mongolia – protection of digital services and information systems against cyber threats;
Other applicable laws and regulations (such as the Law on State and Organizational Secrets and requirements of sector regulators).
Requirements arising from these laws shall be incorporated into the Organization’s risk assessments, control measures, internal procedures, training, and audit activities.
The Organization shall protect users’ personal and financial information in accordance with the following principles:
Applications, websites, and other digital service channels shall meet the following requirements:
The information security and privacy requirements set out in this policy shall be adhered to by the following parties:
Where necessary, these requirements shall be communicated through training, briefings, and contractual obligations.
The Organization shall collect, process, and use user data in the following cases:
If data has not been collected, processed, or used in accordance with legal grounds and procedures, it shall be deleted upon the request of the data subject.
The Organization shall strive to make its key policies and principles regarding user data privacy and digital service security publicly available through the following channels:
Such transparency aims to enhance user trust and ensure legal compliance.