Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | |||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Risk Management and Strategy
As part of our overall risk management system, we have developed processes for assessing, identifying and managing material risks from cybersecurity threats. Our cybersecurity risk management processes include development, implementation and improvement of policies and procedures that seek to safeguard information and ensure availability of critical data and systems. Our internal cybersecurity risk professionals consult with company subject matter experts to gather information necessary to identify cybersecurity risks, and evaluate their
nature and severity, as well as identify potential mitigants and assess the impact of those mitigations on residual risk. We seek to adopt a continuous improvement model in our cybersecurity risk management in order incorporate result of
testing or any incidents in our processes. We also use external cybersecurity risk professionals for specific projects.
We understand the importance of preserving trust and protecting personal information. To assist us, we have cybersecurity governance and data privacy frameworks in place, which are designed to protect information and information systems from
unauthorized access, use, disclosure, disruption, modification or destruction.
Our cybersecurity risk management processes include the following:
Additionally, in connection with our cybersecurity risk management processes, we engage:
Our cybersecurity risk management processes include the oversight and identification of threats associated with our use of third-party service providers. We review the privacy protection and cybersecurity practices of vendors that may handle personal data, and we seek to contractually obligate such vendors to operate their environments in
accordance with cybersecurity standards.
Our business strategy, results of operations and financial condition have not been materially affected by cybersecurity threats or cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by any future material incidents. As
of the date of this annual report, we have not experienced any material information security breach incidences. See “Risk Factors” in Part III of this annual report for more information on our cybersecurity related risks.
|
||||||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] |
As part of our overall risk management system, we have developed processes for assessing, identifying and managing material risks from cybersecurity threats. Our cybersecurity risk management processes include development, implementation and improvement of policies and procedures that seek to safeguard information and ensure availability of critical data and systems. Our internal cybersecurity risk professionals consult with company subject matter experts to gather information necessary to identify cybersecurity risks, and evaluate their
nature and severity, as well as identify potential mitigants and assess the impact of those mitigations on residual risk. We seek to adopt a continuous improvement model in our cybersecurity risk management in order incorporate result of
testing or any incidents in our processes. We also use external cybersecurity risk professionals for specific projects.
|
||||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | As of the date of this annual report, we have not experienced any material information security breach incidences. See “Risk Factors” in Part III of this annual report for more information on our cybersecurity related risks. | ||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] |
Governance
MANAGEMENT
The cybersecurity risk management processes described above are managed by our CISO. Our CISO joined Telmex in 1996. Previously, our CISO was a member of the board of directors of SCITUM Group and HITSS Group,
both of which are dedicated to the development and integration of software solutions and IT services. Our Corporate Information Security Committee supervises the implementation of América Móvil’s Information Security Strategy. Additionally,
each subsidiary has its own local Information Security Committee. The committees’ functions include identifying main operational risks for the business, developing and managing security strategies by creating and monitoring “Strategic
Information Security Plans,” which are updated annually or semi-annually, managing and allocating corporate and local budgets for information security and determining priority actions in the face of current or future threats.
Our CISO reports to our board of directors’ Audit and Corporate Practices Committee, and holds extraordinary meetings as needed.
BOARD OF DIRECTORS
Our Board of Directors, through its Audit and Corporate Practices Committee oversees data privacy and cybersecurity risks. Our CISO provides periodic updates to our Audit and Corporate Practices Committee on our cybersecurity risks and actions taken to mitigate that risk, which information is then reported to our full Board to the extent deemed to be material.
The CISO reports on compliance and regulatory issues, evolving threats and mitigating actions. In overseeing cybersecurity risks, the Audit and Corporate Practices Committee focuses on thematic issues within an aggregated strategic lens and uses a risk-based approach.
|
||||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Audit and Corporate Practices Committee oversees data privacy and cybersecurity risks. | ||||||||||||||
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our CISO provides periodic updates to our Audit and Corporate Practices Committee on our cybersecurity risks and actions taken to mitigate that risk, which information is then reported to our full Board to the extent deemed to be material. | ||||||||||||||
Cybersecurity Risk Role of Management [Text Block] |
MANAGEMENT
The cybersecurity risk management processes described above are managed by our CISO. Our CISO joined Telmex in 1996. Previously, our CISO was a member of the board of directors of SCITUM Group and HITSS Group,
both of which are dedicated to the development and integration of software solutions and IT services. Our Corporate Information Security Committee supervises the implementation of América Móvil’s Information Security Strategy. Additionally,
each subsidiary has its own local Information Security Committee. The committees’ functions include identifying main operational risks for the business, developing and managing security strategies by creating and monitoring “Strategic
Information Security Plans,” which are updated annually or semi-annually, managing and allocating corporate and local budgets for information security and determining priority actions in the face of current or future threats.
Our CISO reports to our board of directors’ Audit and Corporate Practices Committee, and holds extraordinary meetings as needed.
|
||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | ||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The CISO reports on compliance and regulatory issues, evolving threats and mitigating actions. In overseeing cybersecurity risks, the Audit and Corporate Practices Committee focuses on thematic issues within an aggregated strategic lens and uses a risk-based approach. | ||||||||||||||
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our CISO provides periodic updates to our Audit and Corporate Practices Committee on our cybersecurity risks and actions taken to mitigate that risk, which information is then reported to our full Board to the extent deemed to be material. | ||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |