v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
In addition to routine system improvements, the major DBSS migration program in Kazakhstan has reached a critical milestone. By the end of 2025, approximately 1.5 million subscribers were successfully migrated, with no material service disruption and full operational continuity. The migration was completed in accordance with quality and performance benchmarks, demonstrating the robustness of the transition framework and readiness of the platform. The program is now entering its final phase, with the remaining B2C subscriber base migration planned for completion in the upcoming stage. This phased approach allows controlled risk exposure, operational stabilization, and continuous monitoring of performance metrics. In Uzbekistan, preparatory work, improvements, installations, and testing for the transition were carried out in 2025. The B2C transition is planned for March 2026. Transition work for the B2B portion will continue in 2026 and 2027.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We strive to become an information security certified company through reworking all of our cybersecurity standards to provide tactical cybersecurity guidance in accordance with ISO 27001 and certain process handbooks (especially risk management and incident management handbooks) at each of our operating companies. In order to enhance collaboration across the VEON Group, we commenced a new roadmap initiative to enhance alignment and transparency between HQ and our operating company cybersecurity teams. We have conducted several collaboration sessions with various operating company teams to identify potential improvement areas and to align on a future roadmap plan with special focus placed on potential cybersecurity threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity and compliance with data protection regulations remain key priorities. The ARC receives reports on our IT and cybersecurity activities on a semi-annual basis and any significant cybersecurity developments or incidents are reported to the Board of Directors if and when they arise.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit and Risk Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The ARC receives reports on our IT and cybersecurity activities on a semi-annual basis and any significant cybersecurity developments or incidents are reported to the Board of Directors if and when they arise.
Cybersecurity Risk Role of Management [Text Block] We employ a decentralized cybersecurity governance framework with full-time cybersecurity personnel with relevant cyber security expertise at the HQ level as well as at the operating company level. Our Group Chief Information Officer is responsible for developing, implementing and maintaining a robust IT and cybersecurity framework across the Group that aligns with the VEON corporate strategy and strategic goals that drives technological innovation to enhance our business operations. The chief information security officers of our operating companies have distinguished professional certifications within cyber security relevant domains such as certified information systems security professional, certified information security manager, global information assurance certification, accompanied by experience gained especially in the telecom industry over the course of several years. Within their organizations they are usually positioned with a direct reporting function to chief information or technology officers so as to retain required empowerment to serve in a best way to defend cyber security interests of the operating companies.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Group Chief Information Officer is responsible for developing, implementing and maintaining a robust IT and cybersecurity framework across the Group that aligns with the VEON corporate strategy and strategic goals that drives technological innovation to enhance our business operations. The chief information security officers of our operating companies
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The chief information security officers of our operating companies have distinguished professional certifications within cyber security relevant domains such as certified information systems security professional, certified information security manager, global information assurance certification, accompanied by experience gained especially in the telecom industry over the course of several years.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Within their organizations they are usually positioned with a direct reporting function to chief information or technology officers so as to retain required empowerment to serve in a best way to defend cyber security interests of the operating companies.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true