Close

If you agree to continue browsing, you accept the use of cookies on this site and have the option to disable them if you wish.

Accept & Continue
Cybersecurity In The Digital Transformation Age

Insights

Think Tank

Cybersecurity In The Digital Transformation Age M

Insights

Think Tank

Cybersecurity in the Digital Transformation Age

Mar 20, 2019

CYBERSECURITY Next Generation of Cybersecurity in the Digital Transformation Age

Executive Summary

Digital transformation, or Dx, is a powerful business enabler that is impacting all industries, in all shapes and sizes, and is constantly pushing business leaders to fundamentally change their technology ecosystems and create innovative business models that adapt to changing business needs.

One of the key aspect that plays an important role in Dx is the integration of security, as it is a crucial factor in inspiring the consumer confidence that will result in commercial success for the new emerging technologies.

So, how can businesses enable Dx journey in a secure and compliant manner, knowing that the world of cybersecurity is always changing, with new threats and countermeasures emerging on a daily basis?

Cybersecurity setting the Cyber-scene

The cybersecurity global market is growing rapidly and is considered a crucial investment in today’s market.

The worldwide spend on information security products and services in 2017 was $101.544 billion, set to increase to $114 billion by the end of this year, followed by $124 billion by 2019, representing an almost 20% increase in the space of 2 years.

The major forces driving the cybersecurity market growth are strict data protection directives and rising cyber terrorism, in which professional cybercriminals will cost businesses over $2 trillion by 2019.

“BFSI will continue to drive the highest growth and market share for the overall security products and services market with 16.6% CAGR between the years 2016 to 2021.”

In Malaysia, The Financial Services segment (BFSI) is also one of the most mature markets in terms of cybersecurity regulations and fast adoption of advanced technology. BFSI will continue to drive the highest growth and market share for the overall security products and services market with 16.6% CAGR between the years 2016 to 2021.

And while BFSI is the largest vertical in the managed security services market, robust growth in Manufacturing and Public Sector will become next largest industries by 2021 with 16.8% and 14.9% CAGR respectively due to an increased adoption of cybersecurity solutions in those verticals.

Hyper-connectivity in a data-driven world

For the past decade, ensuring the security of data and infrastructure has become one of the most pressing concerns among businesses. In today’s hyper-connected world the need to be equipped with the right security solutions is even more crucial, mainly due the difficulties and complexity in managing the IT environment and protecting it against threats.

Organisations with the aim to drive their business through data is considered vulnerable and has a higher risk in exposing themselves to cyberattacks, data breaches and/or leakages - with the potential of risking themselves to any issues related to information security management.

Organisations across the globe that recognise the need in getting the right security policy and practise as part of their critical success factor for large IT transformation projects, believes that it is essential in enhancing customer experience.

Cyber threats are growing in volume and the nature of the threats is continuously evolving. With organisations actively adopting cloud- based delivery models and committing to digital transformation, the traditional cybersecurity models become unsustainable and obsolete.

To ensure seamless protection over time, it is vital for organisations to adopt the next generation of cybersecurity model to protect their data, infrastructure and reputation. With a comprehensive set of security solutions, not only are they able to enhance their customer experience, organisations can also unlock new business potential through security innovation by creating new business opportunities, as well as deliver new products and services that are well matched for the current market.

Starting with the end in mind, in embracing, supporting and educating businesses on the importance and implementation of security as a crucial part of digital transformation, TM ONE has recently organised its inaugural LEAP Summit 2018 conference with the theme “Transformation Through Intelligence. Are You Ready?”. The summit was aimed at providing a platform for the Enterprises and Public Sector to share their dynamic thoughts and experiences during their transformation journey. During this full day summit, Vito Di Bari, the ‘New European Guru of Innovation’ and Ajay Sunder, Frost and Sullivan ICT Vice President gave a sneak peek on the possibilities on how we can gear up further for the digital evolution leap in the next 3 to 5 years, and possibilities of what may happen in next 7 years to come.

The delegates also gained insights on how innovation in digitisation, analytics, artificial intelligence (AI) and automation can create vast opportunities for businesses and industry makers, and perk up the digital economy as the country takes the leap into becoming a digital nation, in which security plays a vital role in ensuring the realisation of our digital journey.

Issues, challenges and risks

Gartner predicted that 60% of digital businesses will suffer major service failures by 2020 due to the inability of security teams to manage digital risk.

The top three globally-identified key challenges with regards to security operations are the ability to timely detect and effectively respond to security incidents, the impact of new technologies such as cloud, data centre, mobile and Software-Defined Networking (SDN), and internal awareness and training to upskill employees.

And it is a known fact that for organisations who put security as an a erthought, will more likely face higher risk in having their systems, especially their data base, being hacked by unknown individuals with the intention of either to steal or to just make a statement.

How each organisation is being impacted by a security breach is dependent on the timing, duration and which industry it belongs to – with the most common business impacts crossing all industries and ranging from loss of revenue and productivity, reputational damage, corrupted business data, loss of intellectual property, level of trust declines, psychological stress to employees, as well as external fines and litigation.

The attacks are closer than you think

Back in 2017, the New Straits Times paper quoted CyberSecurity Malaysia’s CEO that ‘Almost 10,000 online incidents reported to CyberSecurity Malaysia each year,” where “one of the reported incidents were data breaches, classified under the intrusion category”5, with 22 incidents on data breaches reported between January to September 2017 alone.

A few of these high profile security breaches and incidents happened in Malaysia, with the most recent incident being an attack by ransomware in early November 2018.

It was reported in the local news media that the computer system of Malaysia’s largest media company, Media Prima Berhad, “was locked out by cyber attackers”, and was demanded to “pay millions of ringgit in ransom” in cryptocurrency amounting to 1000 bitcoins, that is equivalent to RM16 million. It was reported that their “office email system was affected”, and “the company has migrated to another system.”

In another cyberattack that happened in Singapore back in June 2018, hackers infiltrated SingHealth’s database, the largest healthcare group institution. The personal particulars of 1.5 million patients, including the outpatient prescriptions of Prime Minister and a few ministers, were illegally accessed and copied”.

Data Breach & Encryption Attacks

In another instance, a Canadian online news media reported that Cathay Pacific Airways suffered a data breach where passport details, addresses and emails of its 9.4 million passengers were illegally accessed. Due to the extensive repercussion and reputable damage it has incurred, “Hong Kong’s privacy commissioner launched a compliance investigation into Cathay Pacific Airways, saying the carrier may have violated privacy rules and the data was misused.”

To-date, Symantec reported in its online blog that the SamSam Ransomware continues its incurable cyberattack against many organisations, with recent ones seen against “67 different targets”, heavily targeting the US, with the rest “logged in Portugal, France, Australia, Ireland and Israel”. SamSam targets it attacks where it simultaneously encroaches “into networks and encrypting multiple computers” before demanding ransom from its target.

Another version of ransomware that is also considered well-known back in 2017 is the WannaCry Ransomware, where it targets only the Microsoft Windows operating System. WannaCry works by encrypting all computer files, and demand ransom to be paid in bitcoin cryptocurrency, before the set deadline.

The saying ‘better safe than sorry’ resonate well when it comes to taking preventative measures in dealing with cybersecurity attack. As the common norm of mobile devices, social media and open-source online collaborative tools have grown to be an essential part of our lives, especially at work, the need to be equipped with adaptive technology that grows and scale with the market has now become part of the requirement.

Organisations are constantly open to potential consequences and security risk, and IT leaders would need to possess infrastructure capabilities, application integration as well as skills and competencies in managing data residing on- or off-premises.

With the increasing volume and frequency of cyber-attacks, there is also a need to have an automated security mechanism that would efficiently handle incidents, and enable resources to focus on other core areas that would need customised troubleshooting.

A cohesive and integrated security solution that aids in the preparation, response and mitigation, monitor and view what to do before, during and after an attack, would be the best preventative measure applied in an organisation.

And to better fortify their security solutions, they should invest in real-time data analytics capabilities and artificial intelligence (AI) to better improve cyber defence posture as part of security automation initiatives.

Organisations with an Automated Detection and Response (a tool that enhances and works at the similar speeds of attackers) - coupled with an Endpoint Security Automation, Incident Response Automation, Machine Learning (ML) and Artificial Intelligence (AI) principles, and Cloud Security and Software-Defined Security (SDSec) - can eliminate false positives, and enable more intelligent threat detection, response, prevention, security operations and maintenance, and faster support of changing business and regulatory requirements.

Future of Cybersecurity in the Era of Digital Transformation

Next Generation Cybersecurity Threats - Is your business ready for it?

The next generation of cybersecurity threats would arrive in – and target - the cloud, primarily due to misconfiguration of cloud services, exploitation of cloud workloads, unauthorised access to cloud accounts and data breaches in the cloud.

Another new wave of attacks include IoT-compromised and along with traditional threats such as phishing emails, ransomware, DDoS attacks and web-based application attacks.

Another battlefield could be the cybersecurity for Operation Technology (OT) environment where the "airgap" between IT & OT no longer exists with the adoption of IoT and cloud services. Compliances and security measures will revolve around data privacy and data protection in different environments, with more focus on cloud and OT.

Traditionally, businesses tend to ignore security threats or risks when migrating to the cloud due to the misconception of cloud and IoT security.

Nowadays, businesses will need to prioritise their cybersecurity risks and threats in order to protect their data, optimise migration workloads to the cloud as well as to comply with regulations and avoid unnecessary potential loss of capital and operational spend, at the same time protecting the business’s brand equity.

Although there is a shift in the security responsibility model, businesses are still responsible to ensure security is wrapped together in the process when implementing cloud services, no matter what service models they are applying the business to.

From the supply point of view, companies that offer IoT and cloud services need to invest in security measures by design, which will require cost for security testing and embedding security feature into their services or products before releasing into the market.

The most common challenge that organisations face is its legacy IT infrastructure. However, despite reservations from CIOs, organisations have started adopting cloud-based models, moving away from legacy IT.

This has opened up opportunities for more security incidents to happen where application attacks and perimeter-less network, encouraged by the massive use of connected smart gadgets, would risk businesses from all angles.

So for organisations to fully embed cloud-based models into their process, all security aspects must be included at the heart of the process.

Data centres have also become the key target of cyber criminals, hacktivists as well as sponsored attackers. Whether seeking financial gain, competitive intelligence or notoriety, attackers carry out their assaults using a range of weapons. The top most dangerous threats to a data centre security include DDoS attacks, Web application attacks, DNS infrastructure attacks, SSL-induced security and weak authentication.

The next wave of data security will include IoT deployment – the integration of multiple sensors, tiny computer chips and communications devices with physical objects - enabling seamless communication between them and other computing devices such as cloud servers, computers, laptops and smartphones. These devices will exchange large volumes of data between them, and will require aspects of data integrity, confidentiality and availability to be fully ingrained in the process.

Any approach to IoT security should be based on data-driven empirical evidences that warn of a specific harms, and be adaptable over time and works flexibly cross-borders. Without placing cybersecurity as a priority, organisations will be left vulnerable to threats that are becoming more rampant with the growth of IoT deployment and digitisation.

Blockchain technology is arguably one of the most important applicable inventions in this data-driven era, and it extends beyond the remains of today’s famous cryptocurrency trend. It has massive potential to solve problems, particularly inefficiencies in a number of information processing systems, such as securing the authenticity of legal contracts and tightening supply chain traceability.

In terms of security, blockchain, or in its simplest terms, a public ledger, is seen as a potential solution as an application that streamlines and processing big data, as an endpoint protection software, a financing tool, as well as a supply chain management software.

It’s clear that the blockchain technology is still in its infancy, especially when it comes to its role in the cybersecurity space - but that didn’t stop a handful of innovators from taking blockchain out for a spin.

Regulatory Requirements

Regulatory compliance is a critical component of any successful security program.

Regulations are designed guidelines with the purpose of protecting organisations, clients and consumers against any potentially devastating consequences of cyberattacks.

Regulatory requirements have undeniably evolved and tightened its reigns over time, especially in the BFSI industry. Organisations in the BFSI sector are continuously burdened by the need to interpret what the global regulatory landscape means for their business operations. Hence, the focus is to bridge information gaps and ensuring higher minimum standards for compliance with the aim to create a culture of info-security among businesses and the public.

Rather than taking a "check-the-box" approach, organisations should implement an integrated and cross-discipline effort – in order to adopt an enterprise-wide program of cyber risk management - tailored to business objectives, while also maintaining a tolerable level of risk.

By taking an integrated approach to the broad objectives of cybersecurity management, organisations can achieve its business and security-focused goals, as well as regulatory compliance in an effective and efficient manner.

The impact on the General Data Protection Regulation (GDPR) - that came into effect in May 2018 in Europe - will affect organisations that are currently doing business with Europe. The new law has placed data protection and security firmly on the agenda of all corporate boards. This year will see a continued increase in scrutiny of data protection, especially with third parties.

As Malaysia is on the midst of transforming itself into a digital nation, it is imperative to address recurring cyber anomalies. Thus, organisations must support the government’s effort in improving the effectiveness of cybersecurity because ultimately, it warrants trusted systems and strategies that necessitate staunch cybersecurity practices. We must acknowledge the recent ITU’s Global cybersecurity Index, which ranked Malaysia as one of the most committed countries in the world in strengthening cyber capabilities to better protect and nurture our local businesses and consumers.

Managed Security Solution Offerings by TM ONE

As a Service Provider and the nation’s Digital Enabler, TM ONE offers a full suite of Managed Security Services to support the transformation journey of organisations in realising their full potential of digital capabilities. Organisations are able to enjoy peace of mind and focus on their core business operations knowing that TM ONE is managing their security systems.

At TM ONE, we understand that customers would prefer to work together with a single service provider that takes care of the business for them, especially in the area of data security management.

TM ONE offers end-to-end Managed Security Solution as the one-stop solution centre to strengthen the security portfolio of the organisation, which comprises of:

By capitalising on TM’s network coverage and ownership in Malaysia, TM ONE gives customers the edge in early detection and mitigation of threats passing through networks.

This allows for faster mitigations and remedies through proactive early detection. In addition to that, customers can minimise impact of technology obsolescence and the inability to scale as they leverage on TM ONE’s Managed Security Services offerings.

TM ONE’s Managed Security Services offerings is an expanded platform where TM ONE has established the state-of-the-art Integrated Operation Centre (IOC), which incorporates its Network Operations Centre (NOC), Security Operations Centre (SOC) and Smart Services Operations Centre at Jalan Damansara, Menara TM ONE.

The IOC works as a centralised command centre and provides a holistic monitoring, analysing and management of customer’s network infrastructure, security posture as well as smart services, using home-grown security experts with expertise in different vendor technologies that provides 24/7 support throughout the year.

TM ONE has been operating its local SOC since 2005 and it has since maintained its high availability through a primary and Disaster Recovery (DR) SOC that is located in Cyberjaya. The SOC is ISO/IEC27001:2005 certified; delivering 24x7x365 proactive monitoring, analysing and management of over 1,000 security devices proactively. TM ONE Certified expertise includes but not limited to CISSP, CISM, CISA, CCIE Security, SANS GCIH and CCIE R&S.

Our customers can also leverage on TM ONE’s Managed Security Information and Event Management (SIEM) offering for ease of centralised monitoring and management meant for security-related activities across multiple sites using TM ONE SOC advanced and high performance SIEM tools. And be assured that events of security threats, breaches etc are proactively monitored and addressed. This inherently reduces the risks of business expenses as a result of security exploits.

The SOC of the future will be built with security assimilated early on during the development stage. The fundamental end goal is for security to become much more automated and less manual to cater upcoming industry trends such as the push for moving business data to the cloud, where it is centralised and easier to access and analyse.

TM ONE’s wide portfolio is a fit for customers looking to engage a leading ICT Service Provider as opposed to having to manage multiple vendors in term of roadmaps, billings, support, functionality etc. As an end-to-end provider of ICT services, TM ONE is able to support customer’s broader ICT aspirations and goals while at the same time providing the necessary expertise to address specific security objectives. Being one of the largest ICT service provider in the country affords TM ONE access to partnering with best of breed security providers.

Summary & Final Note

The evolution of security as a form of defence to a solution-based differentiator is driving the urgency for businesses to accelerate its digital transformation – this is evidenced by the maturity level of cyber criminals that has drastically advanced over the years. As almost anyone is capable of launching a cyberattack at virtually zero cost, we will see more and more automated and widespread non-targeted attacks.

The world of the attackers has developed into sophisticated models that adapts to business plan, captures revenue streams, and assigns individuals with specialised professions based upon their expertise and skill set.

For organisations to be able to counteract, and sustain itself against these attacks, they must collectively rethink their approach towards security so that it will not dampen their effort as they go through their digital transformation journey. One possible approach is to implement smart security applications, fully equipped with capabilities that flexibly adapt to the country’s changing regulatory requirements.

And as we move to the future, the use of Big Data Analytics, Artificial Intelligence (AI) and IoT will slowly shape the cybersecurity trend – thus enabling businesses to run deeper analysis from the collected data. A smart security application, coupled with a data automation solution, will ultimately help to reduce security risk, time and cost of deploying changes and flexibly updating data within an organisation’s integrated system.

An apt solution will not be complete without expert hands. Businesses seeking to upskill their teams can look to TM ONE as their partner in enabling them to fully digitalise their operations and thus empowering businesses to realise their digital transformation journey.

Get in touch with us today to learn why organisations trust TM ONE’s Managed Security Solution, and how we can help to move beyond perimeter-based security services and offer more advanced ICT services for businesses.

Step into the future of your business

TM ONE aspires to be the ENABLER for businesses to realise the full potential of their digital opportunities.

To accelerate this aspiration, TM ONE established a Customer Digital Experience Centre known as TM ONE Experience Center (TM ONE EC). TM ONE EC will help to entice business customers’ digital experience through seamless vertical and horizontal solutions where it is brought together by our people, processes and state-of-the-art technology.

TM ONE’s effective digital experience hosts a customised and dynamic use of solutions and services that are well-suited for enterprise and public sector customers’ journey towards digital transformation.

To support this vision, we built TM ONE EC as a flagship of TM ONE digital experience at the 21st floor of Menara TM ONE. It is an immersive environment where customers, employees, partners and other relevant stakeholders experience how TM ONE intend to make Life Easier for a Better Malaysia through Smarter Living, Smarter Businesses, Smarter Cities, Smarter Communities and Smarter Nation.

All engagements will be carefully planned and matched with the right journey and will be fully guided - to ensure your satisfactory and exceptional first-hand experience of TM ONE solutions. After the engagement, the team will conduct validation activities to ensure that the expectations of customers are met, and potential businesses, partnerships, ideas and collaborations are seeded from the experience.

TM ONE Experience Centre is a space for opportunities that inspires customers and partners to nurture their collaboration & innovation spirit. It is a strategic tool to engage with C-levels, decision makers, and influencers to showcase how TM ONE will drive Digital Transformation in Malaysia and in the region.

For more information on TM ONE Experience Centre, visit
https://www.tmone.com.my/experience-centre

Our Solutions

Explore our comprehensive range of solutions, designed to cater to business processes across various industries. All to help you run your business simpler, better and faster.

Bpo B

Business Process Outsourcing Services

Transform business practices. Improve customer experience.

Cloud B

Cloud Services

The efficient way to see business results, faster

Security B

Security Services

Business digitisation begins with the best security

Data Centre B

Data Centre Services

Ease business operations with the intelligent data centre.

Network B

Network Services

Vast connectivity, that’s a given

Collaboration B

Collaboration Services

Making powerful connections

Smart Services B

Smart Services

For a smarter way of living

Privacy Notice

Dear TM ONE Customers,

Thank you for your continuous support. As you are aware, Personal Data Protection Act 2010 (PDPA) that was passed in 2010 came into force on 15 November 2013. In our effort to ensure compliance to the said Act, we wish to draw your attention to TM ONE’S Privacy Notice as follows:

What Personal Information Do We Collect?

If you choose to transact with TM ONE i.e. for subscription of any products and / or services or use of TM ONE’S Portal, you will be asked to provide your personal information such as and may not be limited to name, identification card number, mailing address, phone number(s), email address(es), contact preferences. Where you intend to use TM ONE’S Portal for purposes of making transactions involving online payments, your credit card information may also be collected for the purpose of processing your payments.

You will also be required to explicitly provide your consent to the provision of your personal information aforementioned in the form and manner as indicated in the registration process, failing which you will not be able to subscribe for the products and / or services or register for the use of our Portal.

When you transact with TM ONE, we may collect or receive and store certain personal non-identifiable information. Such information is collected passively using various technologies and for now cannot be used to specifically identify you. This information may include:-

The above is collectively known as “Non-Personal Information”. If we do combine Non-Personal Information with Personal Data, the combined information will be treated as Personal Data for as long as it remains combined.

If you do not wish for your Personal Data to be collected via cookies, you may deactivate cookies by adjusting your internet browser settings to disable, block or deactivate cookies, by deleting your browsing history and clearing the cache from your internet browser.

How We Use Your Personal Information?

Your personal information will be used or processed for the following purposes:-

By submitting your information to TM ONE, you hereby consent and authorize TM ONE to process and verify any information about you from any third party, especially credit bureau or credit reference agencies, which TM ONE may require in connection with your application for any of TM ONE’s products and/or services and/or review of the existing account with TM ONE. Such consent and authorization will extend to any information obtained from any of the account(s) presently maintained for you, any new application for any form of services rendered or products provided by TM ONE, such historical financial or credit records, data or information whether or not provided personally or by any other sources relating to you which was collected, received, captured, compiled, secured and/or obtained by TM ONE through or by whatever means or methods or forms.

Disclosure of Your Personal Information

If you choose to register and transact with TM ONE, your personal information may be shared where necessary and only on a need to know basis with other TM ONE subsidiary or agencies so as to serve you in the most efficient and effective manner. An example might be in terms of resolving or addressing complaints that require escalation to other TM ONE Subsidiary or agencies. TM ONE may disclose your personal information to the following parties for the purposes stated above:-

Your personal information will not be disclosed to any unauthorized third party.

Your personal information may be disclosed due to reasons of law, legal process, litigation, and/or requests from public and governmental authorities and any disclosure will be to such public and governmental authorities only. We may also disclose information about you if we determine that disclosure is necessary or appropriate for purposes of national security, law enforcement, or other issues of public importance.

If you would like to request access or correction of your personal information or where you elect to limit TM ONE’s right to process your personal information, you may contact TM ONE personnel or call at +603 77128888. Any request of access to correct personal information may be subjected to a fee and also to applicable provisions in the PDPA. However, we reserve the right to decline requests which jeopardize the security and privacy of the personal information of others as well as requests which are impractical or not made in good faith. We may review and update this Privacy Notice from time to time to reflect changes in the law, changes in our business practices, procedures and structure, and the community’s changing privacy expectations. The latest version of the Privacy Notice will be made available at www.tmone.com.my

In the event of any conflict between the English and other language versions, the English version shall prevail.

Terms & Conditions (TM ONE Website)
TM ONE Website Use and Access Agreement

  1. ACCEPTANCE OF TERMS – GENERAL
    • The use of TM ONE Website is subject to the terms and conditions (“T&C”) provided herein. By accessing and using TM ONE Website you agree to be bound by this T&C and any modifications and amendments, which may be posted by TM ONE on TM ONE Website from time to time.
    • You agree that TM ONE may modify and amend this T&C at any time without notice. Unless explicitly stated otherwise, any new service introduced by TM ONE, shall be subject to this T&C. All such notices are hereby incorporated by reference into the T&C. You are responsible for regularly reviewing TM ONE T&C posted on TM ONE Website. By continuing to use TM ONE Website, you are deemed to have agreed to be bound by any modifications and amendments to this T&C.
    • You can access TM ONE Website home page and browse the Website without disclosing your personal data.

    The service and links of the TM ONE Website may include links to third party websites and are subject to Section 7 herein ;

    • You shall mean any user of TM ONE Website.
    • “TM ONE” shall mean TM ONE Berhad and “TM ONE Group” shall mean any subsidiary of TM ONE Berhad.
    • “TM ONE Service” shall mean the information, communications and technology services and products provided and made available to you by TM ONE Group.
  2. USE AND SECURITY
    • Information on TM ONE Website may contain technical inaccuracies or typographical errors. Information may be changed or updated without notice. TM ONE may also make improvements and/or changes to TM ONE Website at any time without notice.
    • TM ONE Website may not be available to all devices which connect to the Internet. You assume all responsibility regarding the end-user equipment and software necessary to access TM ONE Website and assume all risk associated therewith.
    • TM ONE Website may not be available to be accessed from all regions and countries of the world. TM ONE reserves the right, in its sole discretion, to limit or terminate your ability to access TM ONE Website from certain regions or countries, and you assume all risk associated with the accessibility of TM ONE Service, Website from any given region or country of the world.
    • TM ONE Website collects or receives and stores certain personal non-identifiable information. Such information is collected passively using various technologies and for now cannot be used to specifically identify you. This information may include:-
      • device-specific information such as hardware model, operating system version, unique device identifiers, mobile network information, memory, sound card data, Internet Protocol (IP) address;
      • cookies that may uniquely identify your browser;
      • details of how you access and/or use TM ONE Portal or TM corporate website for example your search queries;
      • total number of visitors accessing and/or using TM ONE Portal or TM corporate website;
      • diagnostic and usage data generated by your device;
      • how you and other users use and interact with TM ONE portal or TM corporate website, even if you are not registered at or signed in.
      • details whether you open, read, or delete messages sent via targeted marketing which includes web beacons, cookies or similar technologies.
      The above is collectively known as “Non-Personal Information”. If we do combine Non-Personal Information with Personal Data, the combined information will be treated as Personal Data for as long as it remains combined.

      If you do not wish for your Personal Data to be collected via cookies, you may deactivate cookies by adjusting your internet browser settings to disable, block or deactivate cookies, by deleting your browsing history and clearing the cache from your internet browser.
    • TM ONE reserves the right to limit or prohibit your entry into its Website in its sole discretion and shall not be liable for such limitation or prohibition.
  3. YOUR CONDUCT
    • You agree to use TM ONE Website only for lawful purposes and in accordance with this T&C.
    • You agree to notify TM ONE immediately of any unauthorised use or any other breach of security at the end of each session. TM ONE cannot and will not be liable for any loss or damage arising from your failure to comply with this provision.
    • You agree to abide by all applicable local, state, national and international laws and regulations and are solely responsible for all acts or omissions that occur under your usage, including the content of your communication through TM ONE Service. Recognising the global nature of the Internet, you agree to comply with all local rules regarding online conduct. Specifically, you agree to comply with all applicable laws regarding on-line communication in the country in which you reside.
    • You may not use TM ONE Website in any manner that could damage, disable, overburden, or impair the TM ONE Website (or the network(s) connected to TM ONE Service) or interfere with any other party’s use and enjoyment of TM ONE Service. You may not attempt to gain unauthorised access to the TM ONE Website, computer systems or networks connected to TM ONE Website, through hacking, password mining or any other means. You may not obtain or attempt to obtain any materials or information through any means not intentionally made available through TM ONE Website.
  4. TERMINATION/ACCESS RESTRICTION
    • Without limiting anything herein contained, TM ONE reserves the right to terminate TM ONE Website at any time without notice and for any reason.
    • In addition to any termination rights TM ONE may have under this T&C, TM ONE may terminate your access to TM ONE Website without notice and in its own discretion in the occurrence of the following:
      • You materially violate any notice posted from time to time on the TM ONE Website, any applicable law, rule or regulation relating to the use of the TM ONE Service; or
      • Any law, regulation, or governmental action renders all or any portion of the TM ONE Website (or your use of the TM ONE Service) unlawful or impracticable; or
      • Your use of TM ONE Website impairs or threatens to impair the integrity or functionality of TM ONE network in any manner; or
      • If TM ONE believes that you have violated or acted inconsistently with the letter or spirit of this T&C.
    • You agree that TM ONE shall not be liable to you or any third-party for any termination of your access to the TM ONE Website.
  5. DISCLAIMER & LIMITATION OF LIABILITY
    • TM ONE makes no warranty that TM ONE Website will meet your requirement or that TM ONE Website will be secure, timely, uninterrupted or error free, or that any data, content, information, software or other material accessible on or through TM ONE Website are true, accurate, or are free of viruses or other harmful components. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for accuracy of data input and output, and for maintaining a means external to TM ONE Website for the reconstruction of any lost data. All use of TM ONE Website is at your own risk and you are solely responsible for all damages resulting there from.
    • TM ONE Website is not intended for “mission critical” circumstances and is provided on an “as is,” “where is” and “as available” basis, without warranties of any kind, express or implied, including, but not limited to warranties of title, quiet enjoyment, noninfringement or implied warranties of merchantability or fitness for a particular purpose.
    • To the maximum extent permitted by applicable law, TM ONE disclaims all warranties, express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, title and noninfringement with respect to TM ONE Website and transactions performed through the service or on the Internet generally. TM ONE makes no representations or warranties as to the quality of the call or any connection to or any transmission over the Internet.
    • To the fullest extent permitted by applicable law, under no circumstances, including, but not limited to, negligence, shall TM ONE be liable for any direct, indirect, incidental, special or consequential damages, damages for loss of profits (even if TM ONE has been advised of the possibility of such damages or even if such damage is foreseeable), that result from the use of or the inability to use TM ONE Website any changes to TM ONE Website and unauthorised access to or alteration of your transmissions or data, any communication, transmission, material or data sent or received or not sent or received, or any transactions entered into through TM ONE Website or arising in connection with the fraudulent or unlawful acts of any third party.
    • You specifically agree that TM ONE is not responsible or liable for any threatening, defamatory, obscene, offensive or illegal content or conduct of any other party or any infringement of another’s rights, including intellectual property rights.
    • If you are dissatisfied with TM ONE Website, the materials available on or through the TM ONE Service, Website or with the provisions of this T&C, you agree that your sole and exclusive remedy is to discontinue using TM ONE Website or any of TM ONE other products and services.
    • TM ONE will take reasonable measures to maintain the privacy and security of all private information provided by you to TM ONE Website, but third parties (such as hackers) may breach or attempt to breach TM ONE security measures or may gain unauthorised access to TM ONE database or other equipment containing your information. You agree that TM ONE shall not be liable for damages of any sort, whether arising under contract, tort, or otherwise, with respect to any breach of security of TM ONE Website or any other company equipment or user information.
  6. INDEMNITY
    • You agree to indemnify, defend and hold TM ONE, its officers, directors, employees, agents, shareholders, licensors, suppliers and any third party information providers to TM ONE Service and Website harmless from and against all losses, expenses, damages and costs, including attorneys’ fees, resulting from any violation by you of this T&C or asserted by any third party due to or arising out of your use of or conduct on TM ONE Website.
  7. LINKS TO THIRD PARTY SITES
    • TM ONE Website may contain links to third party Web sites (“Linked Websites”) and include advertisements. You agree that Linked Websites and advertisements are necessary for TM ONE to provide TM ONE Service. Such links and advertisements are provided to you only as a convenience. TM ONE shall not be responsible if the Linked Website is not working appropriately. TM ONE has no control over such websites and resources and shall not be responsible for the contents of any Linked Website or advertisement, including without limitation any link contained in a Linked Website and does not endorse any content, advertising, products, or other materials on or available from such websites or resources. You are responsible for viewing and abiding by the privacy statements and terms of use posted at the Linked Websites, and for taking precaution to ensure that whatever you select for your use is free of viruses, worms, Trojan horses and other items of a destructive nature.
    • Any dealings with third parties (including advertisers) over the Linked Websites or participation in promotions, including the delivery of and the payment for goods and services, and any other terms, conditions, warranties or representations associated with such dealings or promotions, are solely between you and the advertiser, merchant or other third party. You agree that TM ONE shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such website or resource. The purchase of any product or service from a merchant from a Linked Website is a transaction solely between you and that merchant, and any question or dispute you may have regarding any such product or service should be addressed directly to the responsible merchant. TM ONE has no responsibility or liability for any merchant or your relationship with such merchant.
  8. DISCLOSURE AND CONFIDENTIALITY
    • TM ONE reserves the right to disclose any personal information about you or your use of the TM ONE Service and without your prior permission if TM ONE in good faith, believes that such action is necessary to:
      • (1) conform to legal requirements or comply with legal process;
      • (2) protect and defend the rights or property of TM ONE or its holding or affiliated company;
      • (3) enforce this T&C ; or
      • (4) act to protect the interests of its members or others.
    • Any non-personal information or material sent to TM ONE by you will generally NOT be treated as confidential.
  9. PROPRIETORY RIGHTS COPYRIGHT
    • TM ONE Website, all images, text, graphics, logos, sound, programs and any other material (“Content”) found on TM ONE Website are protected by trademark, copyright, or other intellectual property laws and international treaties. Any commercial use of TM ONE Website and Content found on TM ONE Website is strictly prohibited, without TM ONE express and prior written consent. Any reproduction or redistribution of TM ONE Service, and Content found on TM ONE Website, not in accordance with the T&C herein is expressly prohibited by law, and may result in severe civil and criminal penalties.
    • Elements of TM ONE Website, its design and layout are protected by trade dress and other laws and may not be copied or imitated in whole or in part.
    • No logo, graphic, sound or image from this Website may be copied or retransmitted unless expressly permitted by TM ONE.
  10. TRADEMARKS AND THIRD PARTY MATERIALS
    • TM ONE reserves all rights in its corporate names, service marks, logos, trade names, trademarks, websites and domain names (collectively “Marks”) and nothing in this T&C grants you the license to use such Marks. Additionally, other marks which appear on this site may be marks of third parties that are not affiliated with TM ONE. TM ONE and the TM ONE Group do not control or endorse the content of third party websites.
  11. GENERAL
    • This T&C are governed by the laws of Malaysia, without reference to conflict of laws principles. Any dispute between you and TM ONE regarding this T&C will be subject to the exclusive jurisdiction of the courts located in Malaysia and you expressly waive all defences to jurisdiction. You agree that TM ONE Website shall, for the purpose of determining jurisdiction and applicable law, be deemed to have originated and been provided by TM ONE in and from Malaysia.
    • This T&C contain the entire understanding between the parties hereto with respect to TM ONE Website, and supersedes all previous oral or written agreements or understandings between you and TM ONE, and no advice or information, whether oral or written, obtained by you from this Website (whether before or after the date you accept this T&C) shall create any obligation or warranty on the part of TM ONE not expressly stated herein. You may also be subject to additional terms and conditions that may apply when you use any services offered by TM ONE Group, third-party content or third-party software. Neither the course of conduct between the parties nor trade practice shall act to modify any provision of this T&C.
    • TM ONE performance of this T&C is subject to existing laws and legal process, and nothing contained in this T&C is in derogation of TM ONE right and obligation to comply with governmental, court and law enforcement requests or requirements relating to your use of TM ONE Website or information provided to or gathered by TM ONE with respect to such use.
    • If any provision of this T&C is held invalid, the remainder of this T&C will continue in full force and effect, and if any provision(s) of the T&C is held by a court of competent jurisdiction to be contrary to law, then such provision(s) shall be construed, as nearly as possible, to reflect the intentions of the parties with the other provisions remaining in full force and effect. This T&C shall not be construed against any party as the principal draftsperson hereof. A printed version of this T&C and of any notice given in electronic form shall be admissible in judicial or administrative proceedings.
    • TM ONE failure to insist upon or enforce strict performance of any provision of this T&C shall not be construed as a waiver of any provision or right unless acknowledged and agreed to by TM ONE in writing.
    • Notices to you shall not be modified, except by an express modification by TM ONE as described herein and may be made via either email or regular mail or by displaying notices or links to notices to you generally on TM ONE Service.
    • TM ONE reserves the right to amend any of the provisions of this T&C from time to time. Amendments will be effective immediately upon notification on TM ONE Website. Your continued use of TM ONE Website and participation of, TM ONE Service will represent an agreement by you to be bound by this T&C as amended.
    • You may not assert any claim against TM ONE in connection with TM ONE Website unless you have given TM ONE written notice of the claim within fourteen (14) days after you knew or should have known of the facts giving rise to such claim. You agree that any cause of action arising out of or related to TM ONE Website must commence within one (1) year after the cause of action arose; otherwise, such cause of action is permanently barred.
    • TM ONE may assign its rights and duties under this T&C to any party at any time without notice to you and this T&C shall be binding upon and inure to the benefit of each party’s respective permitted successors and assignees.

Should you have any questions concerning this T&C, or if you desire to contact TM ONE for any reason, please send an e-mail to info@tmone.com.my