2024360 Security Technology Inc.Environmental, Social and Governance (ESG) Report
REPORT PREFACE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
This is the third Environmental, Social and Governance (ESG) Report released by 360 Security Technology Inc. ThisReport has been prepared in accordance with the principles of impartiality, standardized reporting, transparency,and completeness, and provides details on 360 Security's ESG actions and performance in 2024.
This Report is available for download in electronic format from the website of the Shanghai Stock Exchange (SSE)(http://www.sse.com.cn).
This Report presents the performance of 360 Security Technology Inc. and all its subsidiaries. Unless otherwise speci-?ed, the reporting scope of this Report aligns with 360 Security’s consolidated ?nancial statements.
Reporting Scope
This report covers the ?scal year 2024 (January 1, 2024 to December 31, 2024). To establish benchmarks and ensurecomprehensiveness, certain information may pertain to dates or periods outside the speci?ed reporting period.
Reporting Period
About the Report
This Report has been prepared based on information from o?cial sources of 360 Security. We have implementedappropriate procedures to ensure that the Report does not contain any false or misleading representations and thatthe information presented herein is accurate and complete. All data in the report are rounded results, and anyindividual discrepancies are due to the e?ects of rounding di?erences.
Data Sources
Guidelines No. 14 of the Shanghai Stock Exchange for Self-Regulation of Listed Companies—Sustainability Report-ing Trial Version (herein after referred to as the “Guidelines”)Guidelines No. 4 of the Shanghai Stock Exchange for Self-Regulation of Listed Companies—Preparation of Sustain-ability Reports
Reporting GuidelinesThis report has been prepared in accordance with the following guidelines:
China Corporate Sustainability Reporting Guide (CASS-ESG 6.0)GRI Standards 2021UN Sustainable Development Goals (SDGs)SASB StandardsIFRS S1—General Requirements for Disclosure of Sustainability-related Financial Information and IFRS S2—Climate-related Disclosure
Additionally, the report also references the following frameworks:
Report Release Method
0201
Message from the Chairman
0403
360集团创始人:周鸿祎
360 has consistently aligned its mission with advanc-ing China’s national digital transformation agenda.Inthis reporting period, we implemented a dual-track“AI+Security” development strategy, empoweringindustrial digitalization with large models to drive theevolution from digitalization to intelligentization, andupholding the security foundation of the digitaleconomy through the concept of Security-as-a-Service(SECaaS). We reshaped our Internet on PC and digitalsecurity businesses with AI. Key to this transformationwas the 360 Smart Brain, a general-purpose largecognitive AI model that was developed by our teamand boasts hundreds of billions of parameters. Wealso launched enterprise-level AI solutions and variousindustry or domain-speci?c large AI models to drivedigital transformation and upgrading of industries.Todate, 360’s large-model solutions have supportedthe training, deployment, and delivery of nearly 20vertical models across diverse industries. We havelaunched innovative products like Nano AI Search, 360AI O?ce, and 360 Security Large Model based on themodel-controlling-model concept.Guided by our mission to “make the world safer andbetter,” 360 Security has deeply embedded ESGprinciples into both our corporate strategy andday-to-day operations.As a global leader in AI-pow-ered digital security, we place user value at the core ofour operations and uphold regulatory compliance as afoundational principle. While safeguarding digitalecosystems, we remain committed to ful?lling ourcorporate social responsibilities.
Actively responding to China's “Dual Carbon Goals”(carbon peaking by 2030 and carbon neutrality by2060), we have been driving green developmentthrough technology. In 2024, by greening data centeroperations and adopting smarter energy managementsolutions, our direct greenhouse gas (GHG) emissionsdropped 39.66% year-over-year. Our data centers inBeijing and Zhengzhou reported industry-leadingPower Usage E?ectiveness (PUE) values. Additionally,our rooftop solar power and rainwater reuse systemsplayed a signi?cant role in reducing resourceconsumption.
We remain committed to safeguarding the digitalecosystem through robust security capabilities. In2024, 360 Security intercepted more than 1,300 APTattacks targeting China. Our 360 Security Large Modeland 360 Security Cloud, a Software-as-a-Service(SaaS) product, have bene?ted multiple small andmedium-sized enterprises (SMEs). Our vulnerabilitymining and network security services have beenrecognized with three honors from the China NationalVulnerability Database of Information Security(CNNVD).We provide customers with full life cycleservice support,and as the ?rst Chinese company toobtain certi?cation for our AI management system, weare committed to continued enhancement of ourmanagement capabilities in the AI ?eld.
To ensure high-quality and long-term development,we are proactively strengthening our corporategovernance system. This includes implementingrobust checks and balances and transparentdecision-making decision-making and executionprocesses, enhancing internal control and riskmanagement systems, and establishing a robustmechanism to prevent misconduct.Moving ahead, 360 Security remains steadfast insupporting China’s Dual Carbon Goals, and harnessthe power of AI technology to enhance securitysolutions and drive green transformation. We will alsocollaborate closely with our industrial chain partnersto foster a secure digital ecosystem.
As AI technologies continue to evolve rapidly, Chineselarge-model enterprises have demonstrated remarkableinnovation capabilities on the global stage. Top-tier home-grown large AI models like DeepSeek are nearing GPT-4o interms of overall performance. In fact, they have outper-formed GPT-4o in Chinese language processing and speci?cniche applications. Notably, they outperform in Chineselanguage understanding and speci?c vertical applicationscenarios. The “slow thinking” approach to complexreasoning has emerged as a new frontier in AI development.On the cost side, the signi?cant reduction in deployment andAPI access costs has lowered the threshold for developers,stimulating enthusiasm for AI application development andaccelerating the widespread adoption of large models.This year's Government Work Report outlines the Chinesegovernment's commitment to advancing the “AI Plus”initiative, supporting the widespread adoption of large AImodels, and strategically deploying computing power anddata infrastructure.These e?orts aim to accelerate thecomprehensive development of the AI industry and promoteits deep integration across various sectors.The rapid advancement of domestically developed large AImodels presents both signi?cant opportunities and novelsecurity challenges that existing cybersecurity tools areill-equipped to address. These challenges primarily manifestthree key areas: the base model, the knowledge base, andthe intelligent agent. Base models are susceptible to halluci-nations, potentially generating inaccurate information,especially in sensitive domains like policy, law, and business.Knowledge bases without adequate security safeguards arevulnerable to the leakage of core data assets.Compromisedintelligent agents can trigger cascading failures acrossinterconnected systems, potentially even damaging physicalinfrastructure damage.
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
?“Focusing on AI and security while acceleratingthe development of new quality productive forces”
Environmental responsibility:
Driving green developmentthrough technology
Social responsibility: Safeguardingthe digital ecosystem
Corporate Governance: DrivingSustainable Growth ThroughCompliance
Contents
REPORT PREFACE 01MESSAGE FROMTHE CHAIRMAN
03PERFORMANCETABLE
103REPORT INDEX106
CORPORATE PROFILECORPORATE CULTUREBUSINESS SEGMENTS2024 HIGHLIGHTSREWARDS AND HONORS
DOUBLE MATERIALITY ASSESSMENTDUE DILIGENCE AND STAKEHOLDER ENGAGEMENTMATERIALITY ASSESSMENT RESULTS
RESPONSE TO CLIMATE CHANGEENVIRONMENTAL COMPLIANCEPOLLUTION CONTROL AND WASTE MANAGEMENTENERGY CONSERVATIONWATER CONSERVATIONCIRCULAR ECONOMYECOLOGICAL AND BIODIVERSITY CONSERVATION
29 35 51 36 62 37 39 40 40
CORPORATE GOVERNANCE SYSTEMCOMPENSATION MANAGEMENTINTERNAL CONTROLTAX MANAGEMENTCOMPLIANCE MANAGEMENTRISK MANAGEMENTPARTY BUILDING LEADERSHIPANTI-BRIBERY AND ANTI-CORRUPTION POLICIESFIGHT AGAINST UNFAIR COMPETITION
89 91 92 93 93 94 95 98 101
EMPLOYEESSAFETY AND QUALITY OF PRODUCTS AND SERVICESDATA SECURITY AND CUSTOMER PRIVACYINNOVATION AS A GROWTH DRIVERETHICS IN SCIENCE AND TECHNOLOGYMUTUALLY BENEFICIAL PARTNERSHIPSRURAL REVITALIZATIONSOCIAL CONTRIBUTION
67 77 81 76
19 19 21
SUSTAINABILITY GOVERNANCE FRAMEWORKSUSTAINABILITY GOVERNANCE MECHANISMSESG CAPABILITY IMPROVEMENT
25 26 26
ABOUT 360 SECURITY
ENVIRONMENTAL COMMITMENTGOVERNANCESOCIAL COMMITMENT
MATERIALITY ASSESSMENTESG GOVERNANCE FRAMEWORK
About 360 Security
CORPORATE PROFILECORPORATE CULTUREBUSINESS SEGMENTS2024 HIGHLIGHTSREWARDS AND HONORS
Corporate pro?le
Corporate culture
360 Security, founded in 2005, is committed to empowering users with free cyberse-curity solutions. The Company has established itself as a global leader in AI-pow-ered digital security solutions.
Business segments
Our Internet business leverages high-performing tra?c channels to drive online revenue through Internetadvertising and services, and value-added service like e-commerce and online games. By e?ciently connect-ing businesses with consumers, we e?ectively monetize web tra?c.These services primarily generate revenue by displayingadvertising within our computer software products like 360Nano AI Search, 360 Search, 360 Browser, 360 Safeguard,and 360 Software Manager.
1009
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
MissionVisionCore Values
Internet services
Internet-based Commercial Services:
Building on the basic functionalities of our existing software, we generate membership subscription revenueby o?ering premium services tailored to speci?c user needs. Our product portfolio primarily comprises 360 AIO?ce, 360 Browser, 360 Safeguard, and a wide range of specialized applications addressing tasks such asinput, scanning, translation, and document management.
Internet-based AI Products:
Guided by the vision of Smart Security, we create intelligent hardware products and cloudsolutions powered by large AI models. The product line of our smart security hardwarebusiness includes smart cameras, doorbell cameras, dashboard cameras. The company isstrategically transitioning its business focus from a hardware sales model to one that integratesboth hardware and cloud services. While hardware remains the primary driver for user acquisi-tion, our value-added services, such as cloud services, play a key role in driving revenue growth.
Smart hardware
Through its '360 Security Cloud, the company has cloudi?ed its national service capabilities, making them accessibleto cities and enterprises. By promoting the SECaaS concept, 360 is driving transformation in the cybersecurity indus-try and supporting the digital transformation of nations, cities, industries, and enterprises. Meanwhile, guided by theconcept of model-controlling-model, the company has integrated large models with cybersecurity, combiningmodel technology, methodologies, web-wide data, and expert knowledge to launch the 360 Security Large Model.This initiative aims to democratize the bene?ts of large-scale Al while driving transformative advancements in cyber-security productivity.
Digital security
Security Large Model360 Security Large ModelData Security
Endpoint Security
Network Infrastructure SecurityAsset and Vulnerability Management
Website SecurityCloud Security
Connected Vehicle Security
Security Brain
Security Education and TalentDevelopment
SECURITY PRODUCT PANORAMAXinchuang (Indigenous IT Adaptation)
SaaS Services
Threat Intelligence
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
360 Data Security Management Platform360 Static Data Desensitization System360 Database Firewall System360 Database Audit System360 Database Encryption System (Access Control)360 Data Security Supervision and InspectionToolkit360 API Security Gateway System360 Database Operation and MaintenanceSecurityGateway System360 Enterprise Secure Browser360 Enterprise Secure Browser (SaaS)360 (Cloud) Host Security Protection System360 Win7 Shield Host Hardening System360 Antivirus System360 Enterprise Security Cloud360 Endpoint Protection System360 Security Cloud ? Home Edition360 Security Cloud ? Education Edition360 Endpoint Security Management System360 Endpoint Application Security Access ControlSystem360 Host Monitoring and Audit System360 Vulnerability Cloud Crowdsourced360 Vulnerability Cloud Crowdsourced/TIP
360 Security Firewall System360 Internet Behavior Audit System360 Network Intrusion Prevention System (IPS)360 Advanced Persistent Threat (APT) WarningSystem360 File Threat Analysis System360 DNS Security Monitoring System360 DNS Security Gateway System360 DNS Threat Analysis Platform360 O&M Security Management System360 Information Isolation and Exchange System
360 Cyber Space Mapping System360 Uni?ed Information Asset SecurityManagement Platform360 Asset Vulnerability ScanningPlatform360 Asset and Vulnerability DetectionManagement System360 Web Application Firewall (WAF)360 Website Cloud Protection System360 Website Cloud Monitoring System360 Yunzhen Cloud Security ManagementPlatform360 Vulnerability Crowdsourcing TestingService Platform360 Connected Cloud Access Platform360 Connected Vehicle SecurityMonitoring Platform360 Connected Vehicle Security TestingPlatformISC Security Course Education & TrainingPlatform360 Cyber Attack and Defense Training Platform360 Cyber Attack and Defense CompetitionPlatform360 Cyber Attack and Defense Training Platform360 Next-Generation Real-World Cyber Attackand Defense Range Platform360 Next-Generation Real-World Cyber Attackand Defense Range Platform(SaaS)
360 Security CloudISC Security Course Education and TrainingPlatform360 Cyber Space Mapping System360 Enterprise Secure Browser (SaaS)360 Vulnerability Cloud Crowdsourced TestingPlatform (SaaS)360 Vulnerability Intelligence Platform360 Next-Gen Real Network Cyber Range Platform(SaaS)360 DNS Security Monitoring System360 Connected Cloud Access Platform360 Website Cloud Protection System360 Website Cloud Monitoring System360 Security Cloud ? Home Edition360 Security Cloud ? Education Edition
Local Security Brain360 Security Analysis and Response Platform360 Log Collection and Analysis System360 Attack Resistance Evaluation System
360 Log Collection and Analysis SystemLocal Security Brain360 Secure Browser360 Enterprise Secure Browser360 Advanced Persistent Threat (APT) WarningSystem360 File Threat Analysis System360 Asset and Vulnerability Detection ManagementSystem360 Connected Cloud Access Platform360 Website Cloud Monitoring System360 Antivirus System360 Endpoint Protection System360 Endpoint Security Management System360 Host Monitoring and Audit System
User-?rst mindset, mission-driven approach, innovation, open collaboration, and integrityMake the world safer and betterProvide innovative solutions for a safer world360 Security's
Corporate Culture
1211
Milestones
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
In 2024, 360 Security will continue to pursue the dual-track strategy centered on AI and security. We will leverage our core technological strengths in AI and digitalsecurity to help China become a modern digital powerhouse and foster new quality productive forces.We are committed to harnessing the power of AI to transform our business segments. User feedback on our AI-powered Internet products, including N Search and360 AI O?ce, has been overwhelmingly positive. We've also made signi?cant strides in upgrading our large AI models. For example, we have enhanced the founda-tional capabilities of our proprietary 360 Smart Brain, a general-purpose large AI model with hundreds of billions of parameters. We have also launchedenterprise-level AI solutions and various industry-speci?c large AI models to drive digital transformation of industries. To date, we have completed the trainingand deployment of nearly 20 industry-speci?c large AI models.We leverage our advanced threat detection capabilities to safeguard national networks and detect advanced persistent threats (APTs) originating from overseas,rea?rming our commitment to digital security. We have a long-standing commitment to delivering e?ective solutions and practical guidance to government andenterprise clients, empowering them to address a wide range of network threats through our cloud-based, service-oriented o?erings. Guided by our model-con-trolling-model concept, we have developed 360 Security Large Model. Customers who purchase any of our standard products receive complimentary access to itscore capabilities. This initiative underscores our commitment to democratizing large AI models and fostering new quality productive forces in cybersecurity.
On March 29, 2023, we launched 360 Smart Brain 1.0, our ?rst internally developed general-purpose AI model with 100 billion parameters. Since then, we havereleased several upgraded versions of the model. In October 2024, we released 360gpt2-pro, which demonstrated signi?cant performance improvements in keytasks such as mathematical problem-solving and various complex logical reasoning. In December 2024, we unveiled 360zhinao2-o1, our latest reasoning-focusedupdate. This version uses tree search algorithms to construct thought chains and incorporates a re?ection mechanism, trained through reinforcement learning toenable self-re?ection and self-correction.In Chinese Large AI Model Benchmark Evaluation Annual Report 2024, SuperCLUE, a leading AI model evaluation organization in China, awarded a gold medal to360zhinao2-o1, recognizing it as one of the ?rst-tier cohort of domestic large models. The report highlights the model's exceptional capabilities and competitivenessin deep reasoning, computation, logical inference, and agent-speci?c tasks.In the ?rst half of 2024, 360 Security established 360 AI Group. This subsidiary develops and operates a comprehensive suite of AI solutions for businesses andgovernment agencies, including large AI models, knowledge and information services, digital collaboration platforms, and bespoke AI applications. 360 AI Group'smission is to provide clients with comprehensive, secure, and reliable support as they navigate their digital transformation. It focuses on the unique needs oftraditional industries, leveraging the power of AI to drive cost reductions and e?ciency gains. By empowering these industries to enhance quality and e?ciency,360 AI Group aims to establish a new high-quality development model. To date, the company has served numerous large and medium-sized enterprises.Our AI solutions for government and enterprise clients are built on a structured framework comprising ?ve layers and two supporting components.The ?ve layers are:
(1) Computing Infrastructure Layer: This foundational layer provides the essential infrastructure and core capabilities required for an organization's AI ecosystem.
It supports subsequent model and application development.
(2) Knowledge and Information Layer: This layer focuses on leveraging data to build a knowledge system to facilitate knowledge accumulation, sharing, and
utilization.
(3) AI Model Layer: This layer involves developing specialized models tailored to various scenarios.
(4) AI Tool Layer: This layer o?ers standardized and business-speci?c tools, laying the groundwork for e?ective execution of tool calls by intelligent agents.
(5) AI Intelligent Agent/Application Layer: This layer achieves task automation through the deployment of digital employees.
The two supporting components are:
(1) Uni?ed AI Client Interface: This provides a centralized workspace accessible to all employees of the enterprise client.
(2) AI Security: We ensure the secure operation of our AI applications across their entire lifecycle.
To better serve Internet users nationwide, 360 Security introduced N Search, an innovative AI-powered search engine. This multimodal platform goes beyondtraditional functionality of search engines by integrating search, learning, writing, and content creation into one seamless work?ow.N Search supports a variety of input methods, including text, voice, image, and video queries, re?ecting its commitment to simplicity and e?ciency. By accurate-ly interpreting user intent, N Search eliminates the need to sift through irrelevant results, providing users with precise, targeted information right away.N Searchsupports a variety of input methods, including text, voice, image, and video queries, re?ecting its commitment to simplicity and e?ciency. By accuratelyinterpreting user intent, N Search eliminates the need to sift through irrelevant results, providing users with precise, targeted information right away. Based onuser queries and uploaded documents, this product can generate diverse content, including talk shows, pingshu, podcast scripts, and unique digital avatars. Itcan also create videos from user-provided descriptions and images. This capability transforms the search engine from a simple tool into a versatile creativeplatform.Turning the concept of "search as creation" into reality.On the technical front, N Search is built upon 360 Security's pioneering Collaboration-of-Experts (CoE) architecture. By combining intent recognition with taskrouting models, it intelligently coordinates over 50 large models from 16 domestic providers — such as DeepSeek, Doubao, and Tongyi Qianwen. This enablesthe delivery of highly intelligent and personalized search results, o?ering users a signi?cantly enhanced experience.N Search recently launched a “Knowledge Base” feature that empowers users to e?ciently organize, store, and leverage individual knowledge or collectiveknowledge of a team. This feature supports a wide range of ?le formats, including documents (Word, Excel, PowerPoint, PDF, etc.), images (JPEG, PNG, etc.),audio and video ?les (MP3, MP4, etc.), source code (Python, Java, etc.), and web pages, enabling seamless integration of diverse information types into a singleplatform. Furthermore, N Search can leverage integrated large language models (LLMs) to analyze and annotate ?les within the Knowledge Base and convertthem into easily readable text. This enables users to quickly locate the information they need through keyword searches, even within non-text ?les such asimages or audio, thereby signi?cantly enhancing productivity and learning e?ciency.Since its launch, N Search has demonstrated sustained user growth. According to the March 2025 rankings released by the o?cial account “AI ProductRankings” (aicpb.com), the web-based version of N Search ranked among the world's top three AI search engines. On the mobile side, as of March 31, 2025, theNano AI Search app recorded over 19 million monthly active users (MAU).
360 Security launched Nano AI Search, advancing the frontiers of search engine technology
During the reporting period, we launched 360 AI O?ce, a membership-based subscription product designed for o?ce scenarios. The product integrates over 200o?ce-related bene?ts, including image processing, writing assistance, document editing, audio and video editing, presentation creation, and translation. Itaims to provide one-stop AI-powered o?ce and marketing solutions across diverse industries and use cases.In 2024, leveraging the capabilities of our large AI models, we revamped our entire suite of Internet applications. By updating user bene?ts, expanding our AIproduct categories, and strengthening marketing operations, the company drove rapid user growth for its internet products, with its user base exceeding 6million by year-end.
AI
Over the past decade, we have steadily strengthened China's national-level cybersecurity defenses. To date, we have identi?ed 57 APT groups, representing 98% ofall such entities discovered within the country, including state-sponsored hacking organizations such as the U.S. Central Intelligence Agency (CIA) and NationalSecurity Agency (NSA). These groups have been involved in prolonged, covert cyber operations targeting critical infrastructure, scienti?c research institutions, andgovernment agencies across China.In response to a foreign cyberattack targeting Northwestern Polytechnical University, CVERC and our company quickly assembled a joint technical team to conducta thorough investigation. Together, we successfully reconstructed a comprehensive picture of the incident, detailing its technical characteristics, attack methods,intrusion paths, and source. The resulting report served to challenge the U.S.'s advantage in cyber operations directed at China.During the 2025 Asian Winter Games, major event information systems and critical information infrastructure in Heilongjiang Province were hit by a large numberof foreign cyberattacks. Leveraging our advanced cybersecurity data analytics capabilities and our in-house, security-focused large AI model, we quickly traced theorigin of these attacks. The investigation attributed the attacks to the U.S. National Security Agency (NSA) and linked the operation to three speci?c operatives andtwo American universities.Furthermore, in 2024, we published Global Advanced Persistent Threat Report 2024, providing in-depth analysis of active APTs. We also intercepted over 1,300 APTattacks targeting China's 14 critical sectors such as government, education, research, defense, and transportation. These attacks posed a serious risk to nationalsecurity. 360 Security is dedicated to providing government and businesses with e?ective solutions and best practices to combat challenges and threats in today'sdynamic digital security landscape shaped by the evolving political climate and international relations
Security Field
Through multiple updates, the core functionality of 360 Smart Brain has been continuously improved
By leveraging AI to rede?ne our Internet product suite, we doubled our membership subscription revenue
360 Security established 360 Digital Intelligence Group to lead its expansion into the digital and intelligenttransformation
By detecting and defending against APT attacks, 360 Security has strengthened the foundation for digital security
The company leverages cloud computing, big data, and AItechnologies to deliver security services through aninternet-based model, pioneering the world's ?rst cloud-basedthreat detection and elimination technology. Through servingC-end users, we have accumulated leading global-scale safetybig data, developed the capability to monitor global andnetwork-wide security landscapes, and established acomprehensive cloud-based operational service system. Thisinitiative has provided a groundbreaking "China Solution" fordigital security, addressing the nation's critical challenge of"detecting" advanced threats—a long-standing bottleneck inthe ?eld.
With 'visibility' as the core,360 Security isleading the industry's e?orts to develop a'China solution' for digital security
In March 2024, 360 Security launched 360 Security Large Model 3.0, designed toemulate the way the human brain processes information. Drawing on rich datasets,expert insights, and high-performance computing, the model ensures accuratesecurity detection while achieving in-depth threat discovery. 360 Security LargeModel has been successfully deployed in real-world scenarios, including AdvancedPersistent Threat (APT) attack mitigation, ransomware interception, protectionagainst vulnerabilities, and attack-defense drills. Recognized for its technologicalstrengths and innovation, this model has garnered signi?cant industry recognition,receiving certi?cations and awards from authoritative organizations such as IDC andCCID Consulting.This model has been integrated into 360 Security's entire security product portfolio,driving continual enhancements in performance and functionality. In 2024, 360Security Large Model was successfully tested and deployed in real-world settings forover 50 major clients in the government, energy, ?nance, and education sectors, andin the public cloud environments of more than 500 SMEs.
Built on the model-controlling-model concept, 360Security Large Model is leading the AI security sector
Awarding Organization: China Academy of Informationand Communications Technology(CAICT)
1413
Rewards and honors
CAICT revealed the results of its ?rst AI safetybenchmark test of Q1 2024, and 360 Security'sproprietary general-purpose AI model, 360Smart Brain, ranked ?rst in overall performance
Awarding Organization: Key Laboratory of Standards andApplications for New Generation Arti?cial Intelligence, Ministryof Industry and Information Technology (MIIT)
Co-leading organizations of the NationalLarge AI Model Benchmark Testing Group
Awarding Organization: China CybersecurityThreat Governance Alliance (CCTGA)
Recognized as “Outstanding Contributor toMalicious Domain Name Takedown”
Awarding Organization: China NationalVulnerability Database(CNVD)Recognized as “Outstanding Contributionfor Information Submission” and “Special
Collaboration Contribution Unit”
Awarding Organization: China National Vulnerability Database of Information Security(CNNVD)The Annual Award for Outstanding Contribution to Vulnerability Control, the Award for Outstanding Contributionto Phase 2 Vulnerability Control, the Annual Award for Outstanding Technical Support, the Core TechnologicalSupport Award, the Excellent Vulnerability Management Award, and the Award for Outstanding Contribution to
Phase I Vulnerability Control 2024,etc.
Awarding Organization: National Computer networkEmergency Response Technical Team (CNCERT)
Designated as “Class-A CybersecurityEmergencyService Support Unit ” and“CybersecurityEmergency Service Support Unit”
Awarding Organization: National Vulnerability Database (NVDB)Recognized as “Most Contributive Unit to Vulnerability Governance Cooperation” and
“Top Contribution Unit to Vulnerability Reporting”Recognized as “Three-star Technical Support Unit” by the General-Purpose Internet
Product Vulnerability Database
Awarding Organization: Arti?cial Intelligence Industry Alliance(AIIA)the Cybersecurity Capability Certi?cate for Security-focused Large AI Models a keycontributor to the development of Capability Requirements and Assessment
Awarding Organization: Anti Network-Virus
Alliance of China(ANVA)
Recognized as “OutstandingMember Organization”
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
1615
Awarding Organization: China Electronics Standardization Institute
Became a member of the Data SecurityHigh-Quality Enterprise Cultivation Working Group
Awarding Organization: ChinaInformation
Industry AssociationDigital Government Innovation Best Practice
Awarding Organization: Beijing Bureau of
economy and information technologyRanked No. 1 among Beijing-based “Specialized,Sophisticated, Distinctive and Innovative”enterprises by the number of invention patents
Rewards and honors
北京奇虎科技有限公司1
360 Smart Life received the CPSMost Promising Enterprise Award
Awarding Organization: HKCNSAAwarding Organization: Beijing MunicipalFederation of Industry and Commerce
Awarding Organization: World Internet Conference
Awarding Organization: Internet Security Conference(ISC.AI)
Awarding Organization: CyberSecurity Association of China
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Became a member organization of the
?rst council of the Hong Kong ChinaNetwork Security Association (HKCNSA)
Zhou Hongyi, founder of 360 Security, was elected as the ?rst chairman of theWorld Internet Conference's Specialized Committee on Arti?cial Intelligence.
Recognized as one of the Top 100 Digital Security Companies in Innovation Capabilityand one of the Top 10 Innovators of the Year in the Digital Security Field at ISC.AI 2024
360 Security Large Model was recognized as one of the Top Ten BestExamples of Innovation-driven Development in China's Internet Sector(2024) and one of the Most Innovative AI Applications of the YearRanked No.2 on the 2024 list of Beijing's Top 100Most Innovative Private Enterprises, based onscienti?c and technological innovation capabilities
Awarding Organization: Shenzhen Security andProtection Industry Association and OrganizingCommittee of China Public Security Expo (CPSE)
Materiality Assessment
DOUBLE MATERIALITY ASSESSMENTDUE DILIGENCE AND STAKEHOLDER ENGAGEMENTMATERIALITY ASSESSMENT RESULTS
Double materiality assessment
Due diligence and stakeholder engagement
To identify key ESG issues for this report, we conducted a dual materiality analysisin accordance with the Guidelines, referring to the material analysis principles,methods, and processes outlined in the ISSB Standards, the GRI Standards, andother relevant disclosure frameworks. We established a rigorous process for issueidenti?cation and materiality assessment and evaluated each ESG factor from both?nancial and impact perspectives. This approach enabled us to determine the mostsigni?cant issues for our company and assess their actual and potential impacts onour operations.
To comprehensively and accurately identify ESG issues, we have identi?ed six primary stakeholder groups: govern-ment and regulatory bodies, shareholders and investors, clients and users, employees, suppliers and partners, andcommunities and media, based on considerations of the speci?c characteristics of our industry, the realities of ouroperations, and our business model. We have also established a regular stakeholder engagement mechanism. Byproactively gathering stakeholder concerns and feedback through regular/irregular interviews, surveys, targetedcommunication, and other channels, we aim to create more sustainable and relevant value for our stakeholders.
2019
Financial stabilityTransparencyRisk management
Innovation
Annual General MeetingsCorporate announcementsInvestor communication
Shareholders/Investors
Quality products and servicesUser experienceData security and privacy protect-ion
User feedback channelsSocial media engagementCustomer satisfaction surveysClients and Users
Compliance with laws and regulations
Compliance initiativesFair competitionClimate change responsePollution prevention and control
Management of resources
Energy e?ciencySupply chain securityProduct and service security
Labor rights
Policies and guidelinesRegulatory audit
VisitsDisclosure of informationGovernment andRegulatory Bodies
StakeholdersCommunication and feedbackConcerns
StakeholdersCommunication and feedbackConcerns
RecruitmentProtection of employee rightsEmployee training and development
Work-life balance
Employee training and communicationEmployee wellness programsEmployee feedback channelsEmployee satisfaction surveysEmployees
Fair cooperationMutual bene?tsSustainable supply chainSupplier capacity building
Supplier management
Supplier meetings
Industry eventsTechnical cooperationSuppliers and Partners
Environment protectionSocial welfare programsCorporate Social Responsibility
Strategic partnershipsMedia engagementCommunity engagement
Communities and Media
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Materiality assessment results
In 2024, we conducted a thorough review of our ESG issues to ensure theircomprehensiveness and alignment with established Guidelines, stakeholderfeedback, and our current operations. This review led to the addition and deletionof certain issues. The deleted issues were integrated as indicators within otherrelevant topics. We also updated the naming of some issues to maintain consis-tency with the Guidelines; these changes are detailed in this report.
2221
High Financial and Impact MaterialityTopics
360's double materiality matrix
Product and Service Safety and QualityInnovation-Driven DevelopmentInformation Security and Privacy ProtectionEmployee Rights Protection
(four material topics)
High Financial Materiality, Low ImpactMateriality Topics
Climate Change MitigationEnergy UtilizationWater Resource UtilizationSustainability-Related Governance
(four material topics)
Compliance ManagementCorporate GovernanceSupply Chain ManagementCircular EconomyEnvironmental Compliance ManagementBusiness Ethics and Anti-Corruption
(six material topics)
Social ContributionRural RevitalizationAnti-Unfair CompetitionPollution control and waste managementEcosystems and Biodiversity
(?ve material topics)
High
HighLowimpact materiality
?nancial materiality
360 Security Technology Inc 2024 Dual Materiality Topics List
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Low Financial Materiality, High ImpactMateriality Topics
Low Financial and Impact MaterialityTopics
Product and Service Safety and Quality
Compliance ManagementCorporate GovernanceSupply Chain ManagementCircular EconomyEnvironmental Compliance ManagementBusiness Ethics and Anti-Corruption
Social ContributionAnti-Unfair CompetitionEcosystems and Biodiversity
Pollution control andwaste managementRural Revitalization
Information Security and Privacy ProtectionEmployee Rights ProtectionClimate Change MitigationEnergy UtilizationWater Resource Utilization
Sustainability-Related Governance
Innovation-Driven Development
ESG Governance Framework
DOUBLE MATERIALITY ASSESSMENTDUE DILIGENCE AND STAKEHOLDER ENGAGEMENTMATERIALITY ASSESSMENT RESULTS
Sustainability governance framework360 Security places a strong emphasis on building a robust ESG governance system.To ensure e?ective alignment between our ESG strategy and our operations, wehave implemented a top-down, three-tiered governance framework, designed inaccordance with the Guidelines. This framework comprises the Board of Directorsat the highest level of decision-making, senior management overseeing the imple-mentation of the ESG strategy, and various functional departments responsible forthe implementation of the ESG strategy.
ESG capability improvementDuring the reporting period, to advance our ESG e?orts, promote ESG-related innovation, andenhance the expertise of our personnel, we participated in multiple ESG training sessions andother ESG-related activities organized by the Shanghai Stock Exchange. This included collect-ing 2024 exemplary ESG practices among listed companies.
Sustainability governance mechanismsTo ensure the standardization and ongoing improvement of our ESG performance,we have established sustainability governance mechanisms and integrated theminto our daily operations and decision-making processes. These mechanisms haveenabled us to e?ectively mitigate ESG risks.
2625
Governance Level
Management
Board of Directors
Senior Management
ESG Task Force
Reviewing and approving the Company's ESG strategy and goals, to ensuretheir alignment with the Company's long-term objectives;Reviewing and approving the Company's ESG report and the disclosure ofmaterial ESG issues;eviewing and approving material ESG issues and associated major riskresponse plans, etc.
We've established an ESG-related internal controlsystem. On the environmental front, we haveestablished clear rules for energy management,waste treatment, and water resource utilization,with well-de?ned departmental responsibilitiesand processes for energy conservation, emissionsreduction, and environmental compliance. On thesocial front, the internal control system addressesemployee rights, supply chain management, andproduct quality and safety, supporting our opera-tional continuity and CSR objectives. On thegovernance front, we've put into place robustmechanisms for information disclosure, internalaudits, and compliance management.Directing and overseeing the implementation of the Company's ESG policyand strategy;Reviewing the Company's ESG report and the disclosure of material ESGissues;Evaluating material ESG issues and associated major risk response plans, etc.
Standardizing and normalizing ESG practices and ensuring compliance withapproval procedures;Preparing ESG-related reports, implementing management directives, collect-ing and organizing data from various platforms, departments and subsidiaries,and disclosing ESG information to the public;Following emerging ESG trends, interpreting relevant legal and regulatoryframeworks, aligning ESG practices with the Company's ESG strategy, manag-ing ESG risks and issues, and providing feedback and recommendations, etc.
Implementation
MechanismSpeci?c Actions
Internal ControlMechanisms
Management is responsible for regularly reviewingESG issues based on the ESG Task Force's propos-als and reporting the review results to the Board ofDirectors.Information ReportingMechanisms
Senior management's performance related to ESGinitiatives and key ESG indicators, including talentdevelopment, environmental management, datasecurity, occupational health, technologicalinnovation, and major incident management, hasbeen incorporated into our management perfor-mance appraisal system.Performance EvaluationMechanisms
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Environmental Commitment
RESPONSE TO CLIMATE CHANGEENVIRONMENTAL COMPLIANCEPOLLUTION CONTROL AND WASTE MANAGEMENTENERGY CONSERVATIONWATER CONSERVATIONCIRCULAR ECONOMYECOLOGICAL AND BIODIVERSITY CONSERVATION
Response to climate change
360 Security is committed to supporting China's Dual Carbon Goals and pursuing a path of green and low-carbondevelopment. We foster a strong sense of social responsibility and environmental awareness within our organization.We've established a climate governance system, with the Board of Directors as the highest authority and the ESGTask Force responsible for executing speci?c tasks. This system is designed to progressively integrate climate changeconsiderations into our corporate management.
3029
Climate governance
By combining the climate scenarios outlined in the Sixth Assessment Report (AR6) of the Intergovernmental Panel onClimate Change (IPCC) with an in-depth analysis of industry trends, 360 Security has identi?ed various ?nancial andnon-?nancial risks, as well as potential opportunities, under these scenarios. We have also developed correspondingresponse strategies to ensure that our operational strategies remain resilient and e?ective throughout the globalclimate transition.
Climate strategyClimate scenario analysis
Climate risks and opportunities
ScenarioScenario DescriptionReference
ProjectedTemperatureIncrease
Type
FinancialImpact
LevelofImpact
ImpactDuration
MitigationMeasuresClimate
Risks
Risk Description
The IPCC's SharedSocioeconomicPathways (SSPs)5-8.5
This scenario is typically characterized by high emissions,signi?cant developmental inequality, and strong depen-dence on fossil fuels. In this scenario, physical risks arerelatively high, while transition risks are relatively low. Ascountries fail to introduce or implement e?ective climatechange policies, energy demand and GHG emissionscontinue to rise, leading to sustained global surface warm-ing and more frequent extreme weather events.
More than 4°C abovepre-industrial levelsHighemissionsscenario
SSPs 1-2.6
This scenario envisions a sustainable socioeconomicfuture with low radiative forcing levels. It is often describedas a future pathway that harmonizes the green transitionand climate action. In this scenario, transition risks arerelatively high, while physical risks are relatively low. Thisscenario aims to achieve the Paris Agreement's long-termgoals of limiting global warming to well below 2°C by thecentury's end and even below 1.5°C.
Less than 2°C abovepre-industrial levelsLowemissionsscenario
Data center dis-ruptions maylead to directrevenue loss andincreased oper-ating costs.
Proactively track extremeweather alerts issued bymeteorological depart-ments and create re-sponse plans to safe-guard data center opera-tions from extremeweather eventsEstablish robust environ-mental risk emergencyplans, conduct annualrisk assessments and re-views, and carry out reg-ular emergency drills
Extreme weather eventscaused by climate change,such as heavy rain and ex-treme heat, may disrupt thedaily operations of data cen-ters and the Company, a?ect-ing business continuity andoperational safety.Physicalrisks
Acute risksMedium
Short-term
Rising tempera-tures may in-crease energyand water con-sumption forcooling purpos-es, leading to in-creased operat-ing costs.
Establish emergency re-sponse mechanisms forcooling systems and en-hance the e?ciency andresilience of data cen-ters' cooling systemsRegularly inspect mu-nicipal water supply sys-tems and maintain anadequate backup watersupply
In 2024, China's average tem-perature was 10.9°C, 1.01°Chigher than the historical av-erage (9.89°C), making it thewarmest year on record.Rising temperatures will leadto water shortages, strainingdata centers' cooling systemsand necessitating greaterwater conservation e?orts.
Chronic risksLow
Medium-
to long-term
360 Security mayalso be subject toquota regula-tions, and be re-quired to pur-chase emissionallowances or im-plement carbono?set projects tocompensate forexcessive emis-sions. This will di-rectly increaseoperating costs.
Promote the greentransformation of datacenters and energy-in-tensive business seg-ments (e.g., usingliquid cooling technol-ogy, purchasing greenelectricity)
As China advances towardsits carbon neutrality goal,some Chinese provinces andcities have begun includingInternet data centers andother similar businesses incarbon emissions tradingschemes. For example, Bei-jing mandates that Internetcompanies with annualcarbon emissions exceeding5,000 tons (such as VNETGroup and Baidu) participatein carbon trading.Transition
risks
Policy risks
Low
Medium-
to long-
term
Failure to meetstakeholders' ex-pectations maylead to increasedscrutiny, de-creased revenue,and a decline inbrand marketvalue, and mayincrease invest-ment and ?nanc-ing costs.
Establish a normalizedstakeholder commu-nication mechanismand improve the quali-ty of disclosure
360 Security is faced with in-creasing scrutiny from regula-tors, investors, ESG ratingagencies, the public, andother stakeholders concern-ing our climate-related per-formance. Failing to meettheir expectations could neg-atively impact our investmentand ?nancing opportunities,as well as our overall sustain-ability performance.
Medium
Medium-
to long-term
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
3231
360 Security is committed to proactively managing climate-related impacts, risks, and opportunities. We follow astructured cycle of identi?cation, assessment, response, monitoring, and reporting. This systematic and scienti?capproach enables us to e?ectively integrate climate considerations into our strategies and operations, allowing us toaddress challenges and capitalize on opportunities presented by climate change.
Management of Climate-Related Impacts, Risks, andOpportunitiesIf the Companyfails to adapt totechnologicalshifts, our existingtechnologiescould become ob-solete, driving upR&D costs and op-erating expenses.
Promote technologi-cal advancement byincreasing investmentin low-carbon technol-ogiesCollaborate with uni-versities and researchinstitutions to acceler-ate the developmentand adoption of newtechnologies
The industries the Compa-ny primarily operates in, AIand digital security, aretechnology-intensive andare expected to be impact-ed by China's advancementtowards its Dual CarbonGoals. This means we couldface increased pressure totransition to energy-e?-cient technologies.
Transitionrisks
Technological
risks
Market risks
Medium
Medium-to long-term
If we fail to reducethe carbon foot-print of our smarthardware prod-ucts e?ectively,consumers mayswitch to moreenvironmentallyfriendly alterna-tives. This will di-rectly a?ect ourrevenue.
Incorporate energyconservation and e?-ciency as critical con-siderations in productdesign and produc-tion, and explore theuse of renewable andrecyclable materials
Growing consumer environ-mental awareness is drivinga shift towards green con-sumption. Consumers are in-creasingly favoring low-car-bon and energy-e?cientproducts.
Medium
Medium-term
Transitionopportunities
Technologyopportunities
By providing solu-tions for thelow-carbon digi-tal transformationof the real econo-my, we anticipatesigni?cant growthin operating reve-nue while contrib-uting to a greenerfuture.
Provide low-carbondigital transformationsolutions for custom-ers
Incentivized by supportivepolicies, the AI industry ispoised for unprecedentedgrowth. 360 Security is posi-tioned to capitalize on thistrend by leveraging its AI ex-pertise to promote AI-cen-tered digital transforma-tion.
Medium
Medium-to long-term
The impact duration of di?erent risks and opportunities is classi?ed asNote
short-term
0~1year
medium-term
1~5years
long-term
over5years
Identifying RisksWe conduct climate sce-nario analysis usingSSP5-8.5 and SSP1-2.6pathways to understandthe potential implicationsfor our business. Thishelps us identify potentialclimate risks and opportu-nities under a range offuture scenarios. We alsoregularly evaluate our per-formance against our cli-mate goals.
Ranking RisksIdenti?ed climate risks arethen assessed and priori-tized based on their signif-icance.
Developing Response StrategiesRelevant departments de-velop targeted risk man-agement and responseplans and submit them tothe management forreview.MonitoringOur management regular-ly monitors key risk indica-tors and provides annualreports to the Board of Di-rectors on signi?cant cli-mate risks.
ReportingWe ensure transparentand regular disclosure ofour climate risks and op-portunities, as well as thee?orts we take to identifyand manage them.
Type
Financial
Impact
Level
ofImpact
ImpactDuration
MitigationMeasuresClimate
Risks
Risk Description
Type
Financial
Impact
Level
ofImpact
ImpactDuration
MitigationMeasuresClimateRisks
OpportunityDescription
Procedure for
managingclimate impacts,
risks, andopportunities
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Turning o? the lights, o?ce equipment, and air condi-tioning when the o?ce or meeting room is not in useWe optimize the operation of our air conditioning sys-tems through a science-based approach that involvesproactive operation planning and early warning systems.Our real-time temperature monitoring systems allow forprecise control of the air conditioning systems within ourbuildings. For example, during the spring months fromMarch to May, we leverage natural ventilation by openingwindows to maintain comfortable indoor temperaturesand minimize the use of our Variable Refrigerant Volume(VRV) air conditioners.We reduce elevator energy consumption by implement-ing skip-stop operations and encouraging employees touse the stairs for short trips (seven ?oors or fewer), espe-cially during peak hours.We promote green travel by prioritizing the use of newenergy vehicles for company a?airs and providingcharging stations.
Energyconservation
Waterconservation
3433
Annual GHG emissions
Emissions reduction measures
In alignment with China's Dual Carbon Goals and our corporate strategy, 360 Security is committed to peaking ourcarbon emissions before 2030 and achieving carbon neutrality before 2060.
Notes:
a. Direct emissions (Scope 1) include GHG emissions from the combustion of fuels such as gasoline, diesel, and natural gas. Indirect emissions (Scope
2) include GHG emissions from the consumption of purchased electricity and heating.
b. GHG emissions were calculated in accordance with the applicable regulations of each operating region for our various locations.c. The emissions from the consumption of purchased electricity were calculated using the national average emission factor provided by the Notice onthe Announcement of the Power Sector's CO2 Emission Factors for 2022, issued by the Ministry of Ecology and Environment in December 2024.d. The signi?cant increase in indirect emissions (Scope 2) compared to 2023 is attributed to a change in data reporting scope, speci?cally the inclusionof data from the Tianjin Entrepreneurship Platform.
To achieve our emissions reduction and energy conservation targets, we focus on strengthening energy manage-ment, promoting the green transformation of our data centers, actively adopting clean energy sources, and encour-aging employees to adopt green and low-carbon o?ce practices.
Climate performance indicators and targets
Indicator20232024
Direct emissions (Scope 1) (tCO
e)Indirect emissions (Scope 2) (tCO
e)Total emissions(tCO
e)Emissions intensity(tCO
e per million yuan in revenue)
454.15
7,252.927,707.07
0.85
274.02
11,490.6111,764.63
1.48
Employees are welcome to use their own water cupsWater-saving bubbler faucets are adoptedWater-saving signs are posted
Reducing theUse ofConsumables
Paperless o?ce is promoted“Green recycling stations” are set up for waste paperPurchase and use of o?ce supplies are rationalizedWe have developed Low-Value Consumables Manage-ment Measures to extend the service life of o?ce equip-ment and to increase routine maintenance.
Low-carbontransformationof data centers
To improve energy e?ciency and reduce carbon emissions, we implement strategies such as re-using natural cold sources across varying temperature levels (e.g., ?rst for higher-temperaturecooling and then for lower-temperature needs) and dynamically adjusting control strategies.In terms of data usage, the 360 DIGITECH Data Center adopts dynamic scaling technology for thebusiness servers, so as to redistribute the computing resources at the daily level, allowing moreresources to be used at the peak of business and less resources to be used at the valley of busi-ness, thus avoiding resource waste.We have phased out outdated, self-built server rooms, replacing legacy equipment with high-ef-?ciency, energy-saving alternatives. Older server rooms with high Power Usage E?ectiveness(PUE) value have been decommissioned in favor of leased Internet Data Centers (IDCs) with sig-ni?cantly lower PUE.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
3635
Environmental compliance
Committed to supporting China's Dual Carbon Goals, 360 Securitystrictly adheres to all relevant environmental laws and regula-tions, including the Environmental Protection Law of the People'sRepublic of China. We continuously enhance our environmentalmanagement practices, increase environmental publicity, educa-tion and sta? training, raise employees'awareness of environmen-tal protection and actively promote environmental stewardship.
Environmental management system
360 Security is committed to ensuring a safe and environmentally responsible operation, evidenced by our strictcompliance with all relevant laws and regulations, including the Emergency Response Law of the People's Republic ofChina and the Measures for Environmental Emergency Response Management. We maintain comprehensive emer-gency response plans, which clearly outline responsibilities and procedures across all organizational levels. Thispreparedness enables us to e?ectively manage and minimize the impact of any environmental incident. In addition,we conduct regular environmental risk assessments and investigations to minimize potential environmental damage.
During the 2024 Fire Safety Awareness Month, 360 Security conducted a comprehensive ?re safety emergency drill acrossmultiple departments to enhance employee safety awareness and reinforce critical ?re emergency response skills. Thisdrill included training on ?re prevention, initial ?re suppression, and evacuation procedures, providing employees withpractical experience in emergency response and further strengthening their safety preparedness. Approximately 40employees participated in this drill.
Environmental risk assessment and response
In 2024
our total investment in environmentalprotection initiatives was 1.1058million RMB
Fire safety emergency drillCase
Pollution control and wastemanagement360 Security operates in non-traditional, low-pollution industries, and our primaryenvironmental impact stems from wastewater, waste gas, and solid waste. Werigorously apply the 3R principles (Reduce, Reuse, and Recycle) to minimize wastegeneration and ensure full compliance with all applicable waste treatment anddischarge regulations.Type of WasteSource(s)Control and Treatment Measures
The kitchen fumes are treated by UV photo-oxidation equipment and electro-static ?lters. In order to realize the accurate management and control of thekitchen fumes, we reserve an online monitoring interface for the fumeexhaust ?ue, so as to e?ectively monitor and control the fume exhaust inreal-time in the future.Return air ?lters in fresh air handling units have been upgraded to ensure?ltration e?ciency and indoor air quality.Waste gas
Kitchen fumes
Kitchen wastewater is pre-treated through a sedimentation tank to removelarge particles of pollutants and suspended matters, then introduced into anoil-water isolation device to separate the oil in the wastewater, and thendischarged to the outdoor grease separation tank, which is cleaned up oncea month.The domestic sewage of the building is discharged to the municipal sewagetreatment plant for secondary utilization.Wastewater
Domestic sewage
We ensure that all kinds of solid wastes meet the national disposal standards.The rate of harmless treatment reaches 100%, and there are no incidents ofenvironmental pollution or damage.According to the Regulations of Beijing Municipality on the Management ofDomestic Waste, the Company carries out garbage classi?cation in its opera-tion sites in Beijing. It uses four types of garbage bins with clear signs toensure that garbage classi?cation reaches the standard while strengtheningthe employees' awareness of garbage sorting.Hazardous waste generated by our operations is minimal, mainly comprisingwatch and microphone batteries. We use a system of classi?ed waste bins forcentralized collection, and then transfer the materials to licensed hazardouswaste treatment ?rms for environmentally responsible disposal.
Solid waste
Mostlynon-hazardous waste,with a small portionof hazardous waste
Indicator20232024Hazardous WasteNon-hazardous Waste
0.05 tons
180 tons
0.02 tons
178 tons
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
3837
Energy conservation
360 Security is committed to full compliance with all relevant energy regulations,including the Energy Law of the People's Republic of China and the Energy Conser-vation Law of the People's Republic of China. To that end, we continuously re?neour energy management structure and policies and enhance the monitoring andevaluation of energy consumption, leading to signi?cant reductions in our overallenergy consumption.
Speci?c MeasuresOutcomes
EnergyManagementWe have installed remotely controlled indepen-dent fresh air systems and smart air conditioningsystems.
With real-time monitoring, seasonal tempera-ture settings, and scienti?c management of op-erating hours, these systems have helped usreduce energy consumption by approximately250,000 kWh per year.We have upgraded the traditional lighting controlsystems to smart lighting control systems, and re-placed public area lighting in our Beijing o?cebuilding with energy-e?cient lighting.
These new systems save, on average, 11.47 kW/hcompared to older models. As a result, ourpower consumption decreased by 260,800 kWhthroughout 2024.We have installed solar panels on the roof of ourBeijing o?ce building and integrated them intoour power supply system.
We have used distributed solar power to replacea portion of traditional energy sources.The Company is committed to building an ener-gy-saving and e?cient low-carbon data center.The Company has taken measures such as wasteheat recycling, dynamic energy regulation, e?-cient cold source room, and sustainable sitedesign in accordance with low-impact develop-ment (LID) principles to reduce the energy con-sumption due to data room operations.
The Power Usage E?ectiveness (PUE) index ofdata centers in Beijing and Zhengzhou is lowerthan 1.5, reaching the national average.
Smart building management system (BMS)Solar panels
Indicator20232024
Diesel consumptionGasoline consumptionNatural gas consumptionPower consumptionThermal energy consumptionTotal energy consumptionTotal energy intensity
0.43 tons
6.69 tons
200,000 standard cubic meters12,623.97 MWh
520.52 GJ
1,845.72 tons of coal equivalent (TCE)
0.20 TCE per million yuan of revenue
0.35 tons
7.29 tons
115,822 standard cubic meters21,297.92 MWh
546.54 GJ
2,802.21 tons of coal equivalent (TCE)
0.35 TCE per million yuan of revenue
In 2024, we have implemented targeted equipment upgrades to further reduce energy consumption, focusing on replac-ing outdated, high-energy devices. Speci?cally, we upgraded fume puri?ers from5 kWh and 1 kWh units to more e?cient
3.9 kWh and 0.65 kWh models, respectively. We also upgraded air conditioning units in elevator cars with models from
1 kWh to 0.8 kWh. These upgrades resulted in a measurable reduction in our total energy consumption, contributing
signi?cantly to our energy conservation and emissions reduction targets.
Upgrading to energy-e?cient equipmentCase
We are actively promoting energy digitalization to improve our energy management system. This involves creating anenvironment/energy management platform that automatically measures, collects, and monitors energy data in real-timefrom our energy-intensive equipment.
Promoting energy digitalizationCase
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Note: The substantial increase in electricity consumption and overall energy consumption compared to 2023 is attributed to a change in data reportingscope, speci?cally the inclusion of data from the Tianjin Entrepreneurship Platform.
4039
IndicatorUnit(s)2024Volume of recycled materialskilogram1,000
Outcomes of circular economy
Indicator20232024
Total water consumptionWater intensity
80,852 tons
8.93 tons per million yuan of revenue
120,793 tons
15.20 tons per million yuan of revenue
In 2024, we implemented several water conservation measures, includ-ing renovating pantry and restroom sinks with energy-saving, multi-func-tional bubbler faucets.We also increased the frequency and expanded the scope of inspectionsfor aging equipment and replaced15 restroom foot-operated valve sys-tems (including 159 spare parts) to prevent water waste.
Water conservation measuresCase
Water conservationCommitted to responsible water management, 360 Security strictly adheres to theWater Law of the People's Republic of China, the National Water Conservation ActionPlan, and other relevant laws and regulations. Through broad-reaching waterconservation awareness programs and the implementation of various conservationmeasures, we have e?ectively controlled our total water consumption and signi?-cantly reduced our water consumption intensity in the past year.
our reported equipment failure ratedecreased compared to the previous year
33% approximately
during the reporting period
Our data centers have adopted low-impact technical measures such as “sponge city” construction, roof greening, rain-water recycling facilities, and permeable pavement to control runo? pollution, alleviate waterlogging, rationally utilizerainwater resources, and improve the water environment, so that the annual total runo? control rate in the site reaches70%, and the annual runo? pollution control rate reaches 50%.
“Sponge city” constructionCase
Circular economy360 Security is committed to the principles of the circular economy and adheres toall relevant regulations, including the Circular Economy Promotion Law, GreenPackaging Evaluation Measures and Criteria, and the Guidelines for Acceleratingthe Establishment of a Green Production and Consumption Legal and PolicyFramework. Our future e?orts on this front will focus on maximizing resourceutilization, minimizing waste, and becoming a resource-e?cient and environmen-tally responsible organization.We're committed to circular economy principles, embedding them into ourproduct design and daily operations. This commitment manifests in several ways:
we prioritize recyclable materials and modular designs to extend product lifecy-cles; we recycle end-of-life electronics and o?ce equipment, and prolong theservice life of our servers through upgrades and refurbishments; to minimizee-waste, we make decommissioned computers and electronics to our employeesfor purchase; we also actively reuse functional replaced items, such as lights andbatteries, in less demanding applications, and diligently recycle o?ce paper andpackaging materials.
Ecological and biodiversity conservationAs 360 Security expands, we are committed to integrating ecological conservationinto our business growth strategy. We leverage digital technology to monitordynamic changes in natural resources, promote sustainable resource use, andsafeguard ecological integrity and stability. Furthermore, we actively use onlineplatforms to raise public awareness of ecological and biodiversity conservation andengage communities in protecting our planet’s ecological well-being.Beyond species diversity, our biodiversity e?orts also prioritize the protection andsustainable use of genetic resources. To minimize our products’ environmentalfootprint, we conduct comprehensive life cycle assessments of our products’environmental impact and drive the development of more environmentallysustainable products.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Note: The substantial increase in water consumption compared to 2023 is attributed to a change in data reporting scope, speci?cally the inclusion ofdata from the Tianjin Entrepreneurship Platform.
Note: The data presented herein includes the quantities of recycled cardboard and reused printing paper.
Social Commitment
EMPLOYEESSAFETY AND QUALITY OF PRODUCTS AND SERVICESDATA SECURITY AND CUSTOMER PRIVACYINNOVATION AS A GROWTH DRIVERETHICS IN SCIENCE AND TECHNOLOGYMUTUALLY BENEFICIAL PARTNERSHIPSRURAL REVITALIZATIONSOCIAL CONTRIBUTION
Employees
4443
Recruitment
360 Security is committed to full compliance with the Labor Law of the People's Republic of China, the Labor ContractLaw of the People's Republic of China, the Prohibition of Child Labor, and other laws and regulations related to laborand employment. We continuously improve our human resources management system to ensure equal employmentopportunities for all. We strictly prohibit the use of child labor and forced labor, and maintain a zero-tolerance policytowards discrimination based on gender, age, nationality, ethnicity, or any other characteristics.
Recruitment compliance
Employee remuneration and bene?ts
Following the remuneration principle of being “fair internally and competitive externally,” 360 Security establishesits remuneration philosophy is based on a three-dimensional model that considers position value, KPI, andlong-term incentives. We use a scienti?c job evaluation system to ensure internal equity, determining salary struc-tures and ranges based on position value and career development opportunities. Individual remuneration is thendetermined based on factors such as performance, contributions, skills, and experience.We conduct annual salary reviews, dynamically adjusting remuneration based on company performance, marketconditions, individual performance, and cost of living. Employees have access to established feedback channels,including discussions with supervisors and a formal appeal process, to address any concerns regarding performanceevaluations or remuneration.To attract and retain top talents and align their interests with the Company's long-term sustainable growth, we havedeveloped a medium- to long-term incentive plan for our core management team. This plan directly links their remu-neration to the achievement of the Company's strategic goals and performance targets.
Remuneration system
360 Security provides all employees with laborcontracts with full social insurance coverage (?vesocial insurances and one housing fund) in accordancewith relevant laws and regulations. In addition to theselegally mandated bene?ts, we o?er supplementarybene?ts designed to attract and retain top talents andfurther enhance employee satisfaction.
Welfare system
360 Security is committed to fair and standardized hiring practices. We continuous-ly optimize our employee recruitment process, upholding the principles of fairness,impartiality, and openness. To attract a diverse pool of talents, we utilize a varietyof recruitment channels, including online platforms, campus recruitment, on-siteevents, headhunting, university partnerships, and internal referrals. By broadeningour talent acquisition e?orts, we secure the interdisciplinary talents crucial for ourbusiness development and long-term growth.
Talent recruitment
Diversity and inclusiveness are crucial factors in building a company's talent pool. 360 Security is committed to creat-ing a diverse and inclusive workplace that transcends gender, age, nationality, and race, providing every individualwith equal development opportunities and ample room for professional growth.Workplace diversity
covered by labor contractsno incidents of child labor, forced labor, or discrimination
During the reporting period
100%
we employee social insurance coverage maintainedDuring the reporting period
100%
Campus/Public Recruitment Posters
During the reporting period
31%
69%MaleFemale
Aged 30 or belowAged 31?40Aged 41 or above
R&D personnelSales personnelManagement
Employees with a vocational collegediploma or lowerEmployees with a bachelor's degreeEmployees with a master's degreeEmployees with a doctoral degree
Number of employees 5,975, including 9 foreign employeesPercentage of employees with disabilities 1.02%, percentage of employees from ethnic minority groups 5.40%
Percentage of female managers 19.30%
By genderBy age group
By educationbackground
By position
Annual Total IncomeComposition for Employees
Base Salary
Variable Pay underIncentive Plans
Long-term Incentives
Other Company-Provided Bene?tsand Allowances
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
57.15%
13.32%
29.53%
8.74%
57.64%
19.05%
0.44%
13.01%
67.50%
33.62%
Workplace democracy
We are dedicated to fostering a democratic workplace. In accordance with the Trade Union Law of the People'sRepublic of China and the Workplace Democracy Regulations, we have established a participative managementsystem. This system, which includes employee representative assemblies, employee meetings, suggestion boxes,and satisfaction surveys, guarantees employees' rights to information, participation, expression, and oversight. Byempowering our employees, we cultivate a harmonious corporate culture and improve our overall e?ectiveness.
Open communication
We are committed to fostering a fair and transparent workplace where all employees have equal opportunities. Toensure every voice is heard, we encourage open and proactive communication throughout the organization. We haveestablished multiple channels for reporting and resolving workplace concerns, including email. If an employee is dissat-is?ed with the resolution provided by their functional department, they may request a review by emailing the CEO.
Employee appeal
To ensure prompt, lawful, and appropriate handling of labor disputes, 360 Security has formulated a Labor DisputeMediation Policy in alignment with the Regulations of the People's Republic of China on the Handling of LaborDisputes Involving Companies and the Rules and Procedures for Labor Dispute Mediation Committees in Companies.We have also formed a dedicated labor dispute mediation committee to proactively prevent labor disputes andresolve them at their earliest stages.
Labor disputes
We actively solicit employee feedback through satisfaction surveys, utilizing questionnaires, interviews, and othermethods to gain valuable insights into their needs and concerns. These insights inform our management strategies,allowing us to address concerns promptly and improve overall employee satisfaction, fostering mutual growth for theCompany and its employees.
we conducted a compa-ny-wide employee satisfac-tion survey, which yieldedan average satisfaction
Employee satisfaction
The Company provides all employees with sup-plementary commercial insurance coverage, in-cluding personal accident insurance, critical ill-ness insurance, supplementary medical insur-ance covering outpatient, emergency, and inpa-tient services, supplementary insurance for preg-nancy leave, and medical insurance for children'soutpatient, emergency, and inpatient services.
4645
Commercial Insurance
The Company provides freeannual health checkups forall employees to ensuretheir well-being.
Health Checkup
Our employee cafeteriaso?er a diverse range of cui-sines, catering to the variedtastes and dietary needs ofour workforce.
Subsidized Meals
Soliciting Employee Input on Corporate BylawsEmployee Satisfaction Surveys on IT, HR, and Administrative Support
9.71score (out of 10)
The employee turnoverrate was
Change from Previous Year
5.2% decrease
2.4
percentagepoints
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
During the reporting period
Employee care and support360 Security recognizes the importance of employee well-be-ing and is dedicated to creating a supportive workplace. In2024, the Company further promoted the construction of the“sta? home”. In the process of employee service, it under-stood the pressure of employees in life and work, cared forspecial groups, especially enhanced the psychological carefor female employees, and truly realized “timely responseand assistance to the needs of employees”.
4847
360 Security's Super AI Programmers' Day
provide support forover employees withspecial needs 500persons
invested
299,000RMB
In order to strengthen team communication, enhance employees’ feelings, and promoteorganizational coordination, the Company provides a uni?ed standard team building fee foreach team, with which the teams can plan and organize activities that are conducive to teamcohesion. The budget is calculated based on the team’s headcount at the end of each month.Employees who are newly married, have a child, are hospitalized, or their immediate familymembers have passed away can apply for and receive the Company’s caring gift money.Every year, the Company prepares special surprises for employees for the Dragon Boat Festival,the Mid-Autumn Festival and the Spring Festival.The Company regularly organizes a variety of engaging employee activities.Every year, the Company awards specially customized commemorative gifts to colleagues whomeet the seniority standards. Currently, the Seniority Award is divided into ?ve-year andten-year awards, which is a recognition of and encouragement for the hard work of veteranemployees who have performed their duties for a long time.
Team-buildingFeeCaring GiftHoliday CareEmployeeActivitySeniorityAward
Employee training and development
The Company attaches great importance to the development and cultivation of talents, constantly improves theinternal training mechanism, and provides employees with di?erent types, forms and levels of training according tothe requirements of professional development to help employees grow and promote enterprise development.
Employee training
We are committed to developingstrong management capabilitiesthrough our continuously opti-mized Star Up Certi?cation and ad-vanced courses. These programsprovide a robust assessment frame-work that informs promotion deci-sions. In 2024, we delivered 68 cus-tomized training sessions, includ-ing 13 tailored workshops, to sup-port our strategic priorities andtackle operational challenges.
Leadership
We are committed to continuousimprovement and fostering a cul-ture of knowledge sharing throughinitiatives like Tech Talk. These ef-forts, combined with customizedprograms such as the ProfessionalSkills Development Bootcamp andthe Part-time Lecturer Certi?cationProgram, have e?ectively strength-ened the professional skills of ourteams.
Professionalism
Beyond our monthly new employ-ee onboarding, we comprehen-sively train employees in AI foro?ce productivity and innovationthrough initiatives like our month-ly Planet Gas Station sessions andAGENT competitions.
General Ability
Performance in 2024
Investment inemployee training
1.8million RMB
General sta? training
participation rate100%
Senior managementtraining participation rate
96%
Middle managementtraining participation rate100%
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
During the reporting period
360 Security is committed to standardizing position and rank management and creating clear career progressionpaths for our employees. We have established a dual-track career development system. This system o?ers bothvertical and horizontal opportunities, tailored to business needs, role requirements, and employee skill levels, ensur-ing employees can pursue diverse career paths that match their skills.
Career development
We encourage all employees to pursuecareer development within the manage-ment (M) or specialist (S) track.All promotions are based on performance.Promotions for the management also con-sider leadership skills, development poten-tial, and alignment with our core values. Thisensures a high-quality management team.Promotions for specialists also emphasizetechnical expertise and alignment with ourcore values.
To maximize the potential of our employees,we have created ?exible career pathwaysthat allow movement between our manage-ment and specialist tracks, as well as acrossdi?erent technical specializations (e.g., tran-sitioning from server-side to front-end webdevelopment).
Ver
tic
al
C
areer
Developm
ent
H
orizontal
Career
Developme
n
t
TechnologySafetyProductDesignMarketingSupply chainFunction
?rst-level sequences
The company has 7 Tier-1 sequences, 40 Tier-2 sequences and 137 Tier-3 sequences. Inaccordance with career development channels, the company conducts annual promotioncycles comprising one management promotion and one professional promotion.
Occupational health and safety
At 360 Security, we prioritize the health and well-being of our employees. In full compliance with the OccupationalDisease Prevention and Control Law of the People’s Republic of China and other relevant laws and regulations, wemaintain rigorous occupational health standards and continuously strive to improve our occupational healthprograms.To support employee health, we operate an on-site health management o?ce where employees can receive freehealth advice and medications from quali?ed health advisors.
Occupational health management
Performance in 2024
Health checkupparticipation rate
100%
Work-related injuryinsurance enrollment rate100%
Number of newoccupational disease cases
Number of employees whodied in work-related accidents
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
5251
Safety and quality ofproducts and services
360 Security maintains a robust incident management systemto ensure compliance with relevant laws and regulations,including the Emergency Response Law of the People's Repub-lic of China and the Measures for Environmental EmergencyResponse Management. This system is underpinned by internalpolicies such as the Emergency Plan for Production Accidents,Crisis Handling Mechanism for Abnormal Visitors, and Ware-house Safety Management System. These policies clearly de?neincident types and outline a three-level response protocol forthe appropriate handling of emergencies. In addition to reactivemeasures, we also conduct regular hazard assessments tominimize safety risks.
Workplace safety
Safety hazard resolution rate
During the reporting period
100%
there were no major safety or quality incidents related to ourproducts or services.
During the reporting period
Structure of The Safe Production Emergency Management Team
Leadership group of emergency organization system
Contact andCommunications team
Support teamRescue team
Medical team
Emergency o?ce
Product quality management
360 Security is committed to providing comprehen-sive service guarantees throughout the entire prod-uct life cycle.
Quality service assurance measures
We implement a comprehensiveuser engagement mechanismduring these stages. This mecha-nism leverages internal producttesting, user testing, and AI-driv-en trial runs to gain deep insightsinto user needs to form our strat-egies to optimize the user experi-ence and accelerate product iter-ation and upgrades.
Product Developmentand Post-launch Stages
We actively monitor user feed-back and promptly address newissues and trends as they arise.
Product Growthand Maturity Stages
We maintain a closed-loop man-agement system for issues a?ect-ing user experience. This systemincludes a standardized issue res-olution process that categorizesissues by priority and type. Issuesdesignated as P0 are resolvedwithin 24 hours.
ProductFull Life Cycle
We have signi?cantly simpli?ed the IVR menu for our customer service hotline, extended service hours, and launchedseveral new self-service features, such as self-service invoicing and additional membership bene?ts.
In 2024, we conducted hundreds of training sessionsfor employees, covering business knowledge, serviceskills, and other areas, and over 2,000 employeesparticipated in training.In 2024, we conducted36 service skills evaluations, includ-
ing onboarding certi?cation tests for new employees andin-service quali?cation exams for incumbent employees.In 2024, we upgraded the knowledge base system andupgraded more than1,200 knowledge points.
Quality improvement measuresService process optimization
Service capability enhancementTraining
Evaluation
Knowledge base improvement
Service Skills Training
360 Digital Security has received ISO9001 certi?ca-tion for its quality management system. In Decem-ber 2024, 360 Security obtained ISO/IEC 42001 cer-ti?cation for its AI management system. We areproud to be the ?rst cybersecurity company inChina to receive this certi?cation, a signi?cantachievement that validates the international qual-ity and rigor of our AI management capabilities.
Quality management system certi?cation
360 Yifangyun Has Also Obtained ISO9001Certi?cation for Its Quality Management System.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
5453
We have maintained a robust quality assurance system and integrated quality control measures throughout theproduct development procedure. Through internal and external testing prior to launch, we proactively identify andresolve potential issues, guaranteeing the stable and reliable performance of our new products.In 2024, we engaged 3,488 users in 21 external and internal tests. Their invaluable feedback on key products like NanoAI Search and AI O?ce led to the identi?cation and resolution of 2,491 issues, helping us signi?cantly enhance thequality and reliability of our new products.
Product and service risk assessment mechanism
Customer services and rights
At 360 Security, we recognize that marketing is more than just product promotion;it's a key channel for communicating our brand values. We strictly adhere to all rel-evant laws and regulations, including the Advertising Law of the People's Republicof China, and are committed to responsible marketing practices. This commit-ment means ensuring integrity, transparency, and sustainable development areintegral to all our marketing activities. We prioritize delivering accurate product in-formation, preventing any form of misleading advertisements, and protecting con-sumer privacy through strict adherence to data protection regulations.
Responsible marketing
Customer relationship management
To continuously improve our responsible marketing practices, we have established a cross-departmental collabora-tion mechanism involving our customer relations, marketing, legal, and public a?airs departments. Through regularseminars, internal product reviews, industry best practice sharing, and in-depth study of relevant laws and regula-tions, we continuously strengthen our responsible marketing system and enhance its e?ectiveness.
Responsible marketing training
We are committed to providing industry-leading user service and continuously enhancing the user experience. Wehave established a comprehensive customer service framework through the development and optimization of inter-nal policies and standards such as the User Service White Paper, the User Experience White Paper, and the CustomerRelationship Management White Paper. During the reporting period, we have revised the User Service ManagementStandard White Paper.
Customer services system
Our dedicated customer service team of over 500 professionals provides comprehensive support across a wide rangeof business areas, including software technical support, hardware pre-sales & after-sales consultancy, game services,and advertising sales. During the reporting period, we opened two additional customer service centers, one in Shiji-azhuang and the other in Jinzhou, to improve overall support e?ciency and enhance the service experience for ourmembers.
Customer service organizational system
360 Security places a high value on communication and engagement with our users. We foster direct dialogue withusers through regular online and o?ine events, including product seminars, user beta tests, and customer apprecia-tion events. These activities enable us to gather valuable user feedback, better understand their needs, and consis-tently reinforce our brand values.
Measures to enhance user experienceCustomer engagement
We provide multiple channels for users to submit marketing-related complaints, including feedback and complaintportals on our platforms, online customer service, hotlines, and designated email addresses. Timely responses aredelivered to all complaints and reports we receive.
Complaint channels for marketing issues
In October 2024, we hosted the 360 Security User Appreciation Day, which featured a rock-climbing event. This eventserved as a platform for us to express our gratitude to our valued customers and embodied 360 Security’s entrepreneur-ial perseverance. During the event, Mr. Zhou Hongyi presented the Quality Guardian Award, Voice of Wisdom Award,Dedication Award, and Word-of-mouth Communication Award to user representatives, and participated in rock climbingactivities alongside them.
User Appreciation DayCase
In 2024
external and internal
engaged users tests 3,488
identi?cation and resolution issues
2,491
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
5655
In November 2024, 360 Security successfully hosted theWCI Championship International 2024. The event o?ereda thrilling competitive experience for World of Tanksplayers and enthusiasts worldwide and fostered a strongsense of community among core players. The three-dayo?ine competition provided a unique opportunity forplayers to connect and share their passion for the game. Italso served as a valuable forum for our Wargaming teamto gather direct feedback and suggestions from our mostdedicated users, informing our ongoing e?orts tooptimize the gaming experience and continuouslyimprove our products.
WCI Championship International 2024Case
We embrace AI as new quality productive forces and widely apply 360 Smart Brain across various scenarios, includingmulti-modal user voice analysis, AI-powered customer service, and AI-driven quality inspection. This signi?cantly im-proves customer service e?ciency and user experience.In addition, we systematically optimized user interaction platforms, upgrading 209 functions across 12 platforms, in-cluding our user feedback backend, Voice of Customer (VoC) platform, hotline and online customer service systems,help center, and 360 Communities. These upgrades expedite user interaction, improve response times, and reducecustomer waiting time.
Users service system optimization
Guided by our “user experience ?rst” principle, 360 Security’s product user experience sharing meetings directlyengage users as product experience o?cers. This facilitates direct communication between users and product managers,allowing us to gain deeper insights into user needs and transform user feedback into actionable product optimizationstrategies.In 2024, we organized two o?ine and four online user experience sharing meetings, themed “AI-Driven Empowermentand Smarter Experience,” and 240 users participated in these activities. These events provided a valuable platform forour AI product teams to engage directly with users, discuss AI product innovation strategies, explore future technologicaltrends, and gather essential user experience data to inform ongoing product development initiatives and further explora-tion of the potential of AI.
AI product user experience sharing meetingsCase
In 2024, we enhanced our online customer service system by addingAI-powered service recap and quality inspection features. Theseimprovements resulted in higher service e?ciency and quality, leadingto a customer service satisfaction rate of 97%.
Online customer service system optimizationCase
Customer complaint response mechanismsWe consider user feedback essential for product and service improvement and have established a robust user com-plaint handling mechanism. To ensure timely and e?ective resolution of complaints, we meticulously verify all userfeedback and have developed clear escalation procedures based on complaint type. These procedures de?ne re-sponse timeframes, responsible parties, and resolution pathways for di?erent complaint levels, ensuring prompt andappropriate handling by the relevant personnel.To further standardize the user complaint handling process, we have implemented a User Complaint Reporting andHandling Policy. In 2024, we reviewed and revised this policy to further emphasize process standardization and oper-ability, strengthen user privacy protection, and include mechanisms for tracking and providing feedback on com-plaint resolution. These enhancements aim to ensure continuous improvement in user satisfaction. Customer complaint handling measures
Our customer service team is required to provide users with an initial solution within 24 hoursafter receiving a complaint and ensure prompt and e?ective handling of all complaints.User complaints are categorized into three levels based on complexity and impact, with tieredmanagement assigned to oversee resolution. Di?erent levels correspond to di?erent responsetimes and solutions. This structured approach ensures that resources are allocated appropriate-ly and that all complaints receive timely and e?ective handling.
To continuously improve product and service quality and proactively reduce user complaints,our business divisions regularly analyze user complaint data to identify recurring issues anddevelop targeted optimization plans.
RapidResponseTieredHandling
ContinuousImprovement
P0 Level P1 Level P2 Level
Supervised by the VicePresident/GeneralManager of the corre-sponding division, witha target of 100% reso-lution within 24 hours
Supervised by the Busi-ness General Manager,with a 100% resolutiontarget
Supervised by the Busi-ness Product Manager,with a >85% resolutiontarget
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
AI
To protect users' legitimate rights and interests, we have established a comprehensive complaint handling processto ensure the prompt and e?ective resolution of user complaints.Customer complaint handling process
To ensure user voices are heard and responded to promptly, we have established a variety of user feedback channels:
User feedback channels
Customer service hotlineOnline serviceEmail support
Product TeamCustomer Service/OperationsManagers/VPs
Understanding customerquestions and needs
360 Securityrelated inquires
Reaching
agreementswith users
Closing the loop
Escalating the caseto Managers/VPs
Providing andoptimizing solutions
Reaching clear
conclusions and
conductingreviews as needed
Is it resolved?NoYes
Severe problems:
problems causingmassive propertylosses, iniuries, alarge number ofcomplaints, etc.
Unable to reachagreements;users making a
complaintagainst theservice sta?;users requiringan escalationEscalating thecase to CustomerService OperationsManager
Complaint HandlingCustomerservice
Product Feed BackAfter-sales
ForumSocial Media
Face to FaceCommunity
Regulatory reporting channelsMinistry of Industry and InformationTechnology Complaint PlatformBlack Cat Complaint Platform
E-commerce pre-purchaseand post-purchase supportAfter-sales supportIn-app feedbackFeedback from uninstallsurveys
Feedback on WeiboFeedback on REDnoteVideo feedback
User chat group on WeChatUser chat group on QQUser experience feedbacksessionsUser interviews
360 user community
Multiple Customer
Service Channels
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Non-360 Securityrelated inquires
Online customer service:
For inquiries, please contact us at 400-669-3600 andenter the extension numbers 0 and 2. Users will re-ceive an SMS noti?cation directing them to our onlinecustomer service portal at http://urlqh.cn/mXDLS
Addressing inquiries andfeedback about productstied to memberships, suchas 360 Wenku and 360Clean Master
Ensuring 85% of calls areanswered in 30 seconds.Instant processing.
handling customer feed-back on computers, mobilesoftware, search engines,360kuai, and other prod-ucts of 360 Security
Response timeScope of CustomerServices
Channels
Timeframe and OtherRequirementsTechnical support forsoftware products:
Member services:
Providing after-sales sup-port for 360 Security'ssmart hardware products.Customer service forhardware products:
Providing support and gath-ering feedback on game prod-ucts from users logged in with360 Security accounts.Game Customer Service:
Responsible for handlingfeedback related to 360 Dian-jing, marketing, promotionsand advertising
Advertising SalesCustomer Service:
Hotline: 400-669-3600
Hotline: 400-682-2360
Email: kefu@360.cnOnline customer service:
For inquiries, please contact us at 400-669-3600 andenter the extension number 0. Users will receive anSMS noti?cation directing them to our onlinecustomer service portal at https://urlqh.cn/o0hJ9
Online customer service:
Visit https://mall.360.cn and click on the “OnlineCustomer Service” button located on the rightside of the pageMobile Game/Web Game Hotline: 400-669-3600, Ext. 2Hotline for games developed by Wargaming:
0536-356-5177/5277Online customer service for Mobile Game/WebGame: Visit https://gm.game.360.cnOnline customer service for games developedby Wargaming: Visit https://kf.wg.360.cn/?utm_-source=global-nav&utm_medi-um=link&utm_campaign=wot-portal and clickon the inquiry button located on the right side ofthe pageEmail for Mobile Game/Web Game:
m-kefu@360.cnEmail for games developed by Wargaming:
pcgame_kefu@360.cn
Hotline: 400-693-3600
Email: kefu@360.cn
Email: yingjiankefu@360.cn
Hotline:
Online Customer Service:
Within 1 working day.Email Response:
Complaints are processedin accordance with the timelimits speci?ed by corre-sponding complaint plat-forms.
Complaint Handling:
Maintaining a satisfactionrate of over 95%.Satisfaction:
received including those submitted to 12345, 12321, regulatory authorities, and ts.isc.org.cn.
Hotline: 400-036-0360Online customer service: visit https://e.360.cn/static/zhihui/ and click on the inquiry button located on theright side of the pageEmail: sskf@360.cn
Complaints-handling performance in the reporting period
Number of customer complaints
4,415例
Average response time Within24hours
Average resolution time
Within48hours
Average satisfaction rating
(Domestic customers)
Over97%
Average satisfaction rating
(Overseas customers) Over97%
(primarily related to smart hardware products)
Response rate
100%
Resolution rate
Over97%
Customer satisfaction surveys
At 360 Security, user satisfaction is a key driver of our prod-uct development. To better understand user needs, we'vere?ned our survey methodology by adopting scenar-io-based surveys and conducting targeted research withkey user groups, including o?ce workers, new mothers,students, and international users.
In 2024
Feedback from Users
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
we conducted55 user surveys across our coreproducts, engaging 160,000 users. These surveysyielded encouraging results, with major productsachieving an average satisfaction rating of 8 orhigher out of 10.
Product knowledge dissemination
We maintain a strong social media presence across major platforms like Weixin (WeChat), Douyin (TikTok),Xiaohongshu (RedNote), and Bilibili, with o?cial accounts such as 360 Customer Service and 360 Fan Club.Our diversi?ed content strategy provides product tutorials, brand stories, and user activity updates, enhanc-ing the user experience and keeping our users informed.
On our forum, 360 Communities, we regularly publish product updates and tutorials to ensure timely infor-mation dissemination. We also actively engage users in product development by hosting testing programsfor new products, fostering a positive and collaborative user ecosystem.
Product Tutorials on 360 Communities
Information security management
Data security is a top priority at 360 Security. We are committed to full compliance with all applicable laws and regu-lations, including the Cybersecurity Law of the People's Republic of China, the Personal Information Protection Lawof the People's Republic of China, Telecommunication and Internet User Data Protection Rules, and the relevant re-quirements of the Ministry of Industry and Information Technology. To that end, we continuously develop and opti-mize our user personal information protection and data security management systems. We maintain a comprehen-sive, top-down internal management system for information security and privacy. This system is continuously main-tained and improved, and its robustness is validated by our achievement of ISO 27001 and ISO 27701 certi?cations.
We maintain a four-tier data security system comprising the Data Security Committee, relevant departments, dataauditing bodies, and departments responsible for implementation. To address data privacy issues related to ourmobile products, we’ve also established a dedicated app task force. In addition, our data security department anddata platform department manage and maintain the data generated across our business operations.
Information security system building
Data SecurityManagementPolicy (V3.0)
360 SecurityUser PrivacyProtectionWhite Paper
PersonalInformationProtectionPolicy
Data SecurityTraining Policy
DataClassi?cationPolicyInformationSecurity RiskManagementStandard
Data SecurityManagementManual
Guidelines forCompliancewith PersonalInformationLawsand Regulations
Guidelines forPersonalInformationCompliance inDevelopmentand Design
Data SecurityManagementManual
Internal Data Security Policies
Data Security Committee
Data Audit Agency
PrivacyDepartment
Legal Center
Information
Security
DataPlatforms
InternalAudit andSupervisionCenter
Marketing andCommunications
CenterEcological andStrategicCooperation
Center
Execution Department (Business Department)
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Data security and customer protection
To e?ectively manage information security risks, we conduct regular risk assessments based on the Information Se-curity Risk Management Standard, employing both management and technical approaches. The results of these as-sessments inform our risk mitigation e?orts, and we continuously improve our security measures to maintain identi-?ed risks within acceptable thresholds.
Information security risk assessment
To ensure e?ective response to security incidents, we have es-tablished a Cybersecurity Incident Response Plan and a SecurityIncident Response Manual. These resources enhance our emer-gency response mechanisms for cybersecurity incidents. We alsoconduct regular cybersecurity emergency drills to continuouslystrengthen our emergency response capabilities and minimizethe impact of potential incidents.
Data security incident response mechanism
Data security incident handling
Risk Identi?cation
At 360 Security, we continuously enhance our data security risk monitoring capabilities bydeploying internal monitoring systems focused on data security. These systems allow us toproactively identify critical data assets, dynamically monitor data distribution and ?ow,intelligently analyze and identify security risks during data handling, and implement tailoredresponse strategies based on risk levels. We also ensure timely reporting of all data securityincidents.
Any instance where 360 Security's user data or internal data is disclosed to external parties withoutauthorization carries the risk of data leakage.Intentional or unintentional damage or deletion of data within 360 Security's systems that disruptsbusiness operations.Data leakage incidents resulting from attacks launched by external groups or individuals targeting360 Security's network
Risk Monitoring
We classify data assets based on their risk levels, implementing corresponding risk monitor-ing measures.This approach, combined with the integration of national and industry data security threatintelligence, allows us to continuously improve our data security risk monitoring capabili-ties.
Risk Assessment
and Response
Each business division is responsible for conducting data security risk assessments tailoredto its speci?c data risks. These assessments fall into two categories: self-assessments andexternal assessments. Self-assessments, initiated internally by business divisions, aredesigned to identify system vulnerabilities, strengthen security management, and mitigaterisks to assessed data assets. Self-assessments are conducted in accordance with theInformation Security Risk Management Standard. External assessments are regular,sample-based reviews commissioned by business divisions and conducted by the datasecurity committee or external service providers. In addition to the scope of self-assess-ments, external assessments also cover areas such as data security measures, data controlsthroughout the data life cycle, emergency response protocols, and data integrity, availabili-ty, and con?dentiality.
Type ofIncident
Emergency Response ProcedureContainmentReview
Upon discovery of a data breach, thedata security emergency responsetask force is immediately noti?ed.The task force promptly coordinatestechnical personnel to investigate theissue and prevent further data leak-age.
This includes inspecting systemlogs, databases, and applica-tions to identify the source ofthe leakage. A?ected systemsare isolated from external net-works to prevent further com-promise, and evidence is pre-served. Law enforcement willbe involved when necessary.
The task force thenworks with technical per-sonnel to analyze systemlogs, determine the rootcause of the leakage,and compile a detailedincident summary.Data leakage
Upon discovery of large-scale datatampering with our core databases,the data security emergency re-sponse task force is immediately noti-?ed. The task force works with data-base administrators and operationpersonnel to verify the extent of thetampering. Simultaneously, they acti-vate the emergency response proce-dure, which involves suspending rele-vant services and notifying relevantpersonnel.
After data is restored usingbackups and services are re-started, the task force then in-vestigates the cause of thetampering. If an external attackis suspected, the task force an-alyzes logs and other data toidentify the source. Law en-forcement will be involvedwhen necessary.
Following the incident, athorough review is con-ducted to analyze thespeci?c causes of thetampering. Based on theanalysis results, en-hanced security mea-sures are adopted forour core databases.Data tampering
In the event of a data loss incident,the data security emergency re-sponse task force is immediately noti-?ed. The task force promptly workswith relevant departments to investi-gate the issue and assess the scope ofthe data loss, and evaluate its poten-tial impact on the business.
The task force then works withtechnical personnel to resolvethe issue and restore data andservices using the latest e?ec-tive backups.
Following the incidentresolution, the task forceanalyzes the speci?ccauses of the data lossand identi?es areas forimprovement.Data loss
we recorded no data security incidents.
During the reporting period
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCE
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Types of Data Security Incidents:
We conduct annual cybersecurity emergency drills and provide company-wide cybersecurity awareness training toimprove employee security awareness and strengthen our overall cybersecurity defenses.Security-conscious culture
Emergency Response DrillsWe regularly conduct red teamvs. blue team exercises to simu-late real-world cyberattacks.These internal exercises are de-signed to assess our attack anddefense capabilities, evaluateemergency response proce-dures, and improve our overallincident response capabilities.They help us strengthen ourmonitoring and protection sys-tems, enhance our securityemergency response readiness,and identify potential securityvulnerabilities.
Cybersecurity Week 2024 was a key initiative in our e?orts to ensure compliance with China's cybersecurity laws andregulations. Themed “Revisiting the Journey to the West: A Safe Digital Journey,” the event creatively combinedtraditional cultural elements with modern cybersecurity challenges in four key areas. During the event, we also engagedemployees through interactive ?ash mob activities designed to raise cybersecurity awareness.
Cybersecurity Week PromotionCase
Data Security Training for The Technical Middle O?ce
Customer privacy protectionData protection is central to our customer rights protection e?orts. We have established a comprehensive customerprivacy protection system, which integrates robust mechanisms, technical safeguards, and rigorous compliance test-ing. During the reporting period, we recorded no customer privacy breaches.
On January 1, 2024, the Regulations on the Protection of Minors in Cyberspace came into e?ect. As China's ?rst com-prehensive legislation of its kind, it has ushered in a new era of child protection in cyberspace with a more compre-hensive legal framework, higher standards, and stricter enforcement.In response, 360 Security has formulated a Children's Privacy Protection Policy, which goes above and beyond exist-ing privacy standards. This policy standardizes the collection, use, storage, and processing of children's personal in-formation and provides clear mechanisms for parents and children to access, correct, delete, and protect the infor-mation, ensuring comprehensive protection of minors' rights.
Privacy protection measures
Protection of minors
Mechanisms &Technical Safeguards
We have implemented an app life cycle management system with de?ned procedures,approval work?ows, and technical control measures. Its functions include compliancereview, record-keeping, data traceability, and information management throughout theentire app life cycle.
Compliance Testing
Our mobile security team has independently developed a compliance testing engine toproactively identify compliance risks within Android applications. This engine's robusttesting capabilities cover a wide range of critical areas, including application access permis-sions, violation behavior, third-party SDKs, and overseas domain name access, ensuringalignment with industry standards and regulatory mandates. It addresses the 30 scenariosin the six major risk categories outlined in the Ministry of Industry and Information Technolo-gy's Document No. 164, and meets the standards of key regulatory bodies such as theMinistry of Public Security and the Ministry of Industry and Information Technology.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Innovation as a growth driver
Innovation capability building
Technological innovation is the core driver of our business growth. We leverage ouraccumulated expertise to integrate commercial and social values, with a strategicfocus on AI and security.
We are committed to enhancing our technological research and development capabilities through strategic invest-ments in R&D, optimized talent development programs, and the cultivation of highly skilled research teams.
To foster a dynamic culture of innovation and help our R&D per-sonnel continuously develop their expertise, we promote learn-ing and knowledge sharing through Tech Talk webinars. Duringthe reporting period, we hosted38 Tech Talk webinars, cover-ing64 topics in areas such as web front-end development,server-side development, algorithms, security research, testing,big data, and AI applications, reaching over5,000 technologyprofessionals.
Sharing of technological innovation results
We are committed to empowering our employees to drive innovation through a robust incentive system that blendstangible and intangible rewards, including special bonuses to recognize and reward projects, teams, and individualsachieving outstanding results in technological innovation and product development. In addition, we organize inno-vation competitions focused on skills and applications to further enhance employee engagement and recognition.
Innovation incentives
We actively collaborate with universities and research institutions to drive technological innovation and promote thehealthy development of our industry. We have established partnerships with nearly 300 colleges and universities na-tionwide, and spearheaded the creation of ?ve university alliances: the National Data Security Industry-UniversityCollaboration Community, the National Arti?cial Intelligence and Security Industry-University Collaboration Commu-nity, the Beijing Next Generation Information Technology Industry-University Collaboration Community, the NationalDigital Security Industry-University Collaboration Community, and the Hebei Digital Security and Arti?cial Intelli-gence Industry-University Collaboration Community. These platforms have nearly500 member organizations, in-
clude government entities, enterprises, and academic institutions.In response to national initiatives promoting the commercialization of patents and innovation, we've partnered withuniversities and other companies to o?er royalty-free access to13 patented technologies in smart and safe travel.This initiative aims to foster technological inclusiveness, support national patent commercialization goals, and accel-erate the deployment of innovative transportation solutions that enhance safety for all.
Collaboration with universities and research institutions
researchteamsBy the end of the reporting period
researchinstitutions 8
state-leve engineeringlaboratories 4
core expert
team Over2,000
signed collaborationagreements experts tens of thousands
IndicatorFY2024FY2023Number of R&D employeesR&D personnel as a percentage of our workforce (%)R&D spending (Unit: 100 million RMB)R&D spending as a percentage of our revenue (%)
3,332
55.63
31.04
34.28
3,444
57.64
32.02
40.29
During the reporting period, we hosted a technical skills competition whereemployees were invited to share innovative technological solutions toworkplace challenges. This competition aimed to encourage employees tosimplify tasks and boost e?ciency through systematic improvement ofdata, information, processes, and tools.
Technical skills competitionCase
During the reporting period, to promote cross-departmental collaboration,identify promising talent, and foster a culture of innovation, we organizedan intelligent AGENT development competition. Through this event, we so-licited innovative ideas from across the company, focusing on process au-tomation, information integration, content generation, and service optimi-zation. The competition shortlisted over 60 innovative projects spanning 11business lines, serving as a platform for promoting skills development,identifying viable AI applications, and driving the adoption of AI within theCompany to boost e?ciency.
Intelligent AGENT development competitionCase
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
In August 2024, 360 AI Security Lab, in collaboration with the College of Cyberspace Security of the University of Scienceand Technology of China, hosted a forum on the reshaping of cybersecurity through large AI models on the sidelines ofISC.AI 2024. The event served as a platform for dialogue between the industry, universities, and research institutions,focusing on the risks, threats, and mitigation strategies related to large AI models and security management. Participantsexplored cutting-edge applications of AI and large models in security operations, with the shared goal of fostering ahealthy and secure AI ecosystem.
Case
We believe that robust industry cooperation and information exchanges are critical for driving business developmentand technological innovation. Committed to sharing our best practices and insights into industry trends, we have ac-tively organized and participated in key domestic and international innovation forums and technical conferences.
360 Security has actively participated in the development and revision of numerous industry standards, driving thedevelopment of the industry and the improvement of product quality.
Industry communication
In December 2024, recognizing the security challenges presented by large AI models, including malicious manipulation,failure in content compliance, algorithmic vulnerabilities, and privacy breaches, 360 Security joined forces with 16 leadingChinese companies in large AI models as well as industry peers, research institutions, and end-users to launch the LargeAI Model Security Alliance in Beijing. This alliance aims to build a collaborative and open ecosystem dedicated to ensuringthe security of large AI models and driving their widespread and safe adoption across industries.The launch event featured a roundtable discussion, themed“Securing Digital Frontiers, Building a Safer Future Together.”Prominent AI security experts and entrepreneurs, including thefounder of Intoken and representatives from the Institute ofInformation Engineering of the Chinese Academy of Sciences, theSecurity Governance Department of CAICT's Arti?cial IntelligenceResearch Institute, and the LLM Safety Alignment Center of PekingUniversity (Lingang Campus), participated in the roundtable.
Case
On February 24, 2025, 360 Security and Peking University o?cially released their jointly developed Tiny-R1-32B-Preview, amid-sized inference model. Notably, this model achieves performance comparable to DeepSeek-R1-671B with only 5% ofDeepSeek-R1-671B’s parameters.
Case
In February 2024, 360 Security was selected by CAICT as a key contributor to the development of the ?rst part of Technolo-gy and Application Requirements for AI-Powered Software Engineering: Code-Specialized Large AI Models. Following this,360 Security was again chosen as a key contributor for the second part in March. These appointments highlight 360 Securi-ty's signi?cant role in shaping standards for large AI models used in software engineering.
Case
In 2024, we aligned our operations with China's national AI develop-ment strategy and actively supported the country's relevant strate-gic goals. Zhou Hongyi, the founder of 360 Security, was appointedthe ?rst chair of the World Internet Conference's SpecializedCommittee on Arti?cial Intelligence. In this capacity, Mr. Zhou hasled global e?orts to advance AI standards, establish an internationalAI governance system, and promote collaborative innovationacross the ecosystem. He has collaborated with internationalexperts to tackle key issues in areas such as AI technology R&D,ethical guidelines, and security governance. His contributions havebeen pivotal in jointly shaping global AI standards, facilitatingextensive consultations on governance frameworks, and fostering athriving industrial ecosystem. Through these contributions,valuable Chinese perspectives are integrated into an emergingglobal AI ecosystem that is open, secure, and innovation-driven.
Case
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Technological innovation resultsR&D Innovation Honors
AI
SmartHardware
Internet
DigitalSecurity
360 Smart Brain360 Nano AI SearchAI Assistant
360 AI O?ce
360 Security Large Model
Smart security hardware products(smart cameras, video doorbells,dashboard cameras, AI-enhancedkids' smartwatches, etc.)
Segment
Innovation
Results
In 2024, 360 Security Large AI Model was recognized byIDC for its capabilities in security operations. Speci?cally,it was featured in IDC Technology Assessment 2024:
Chinese Security Large AI Model Tests (Security Opera-tions) and Innovative Security Solutions 2024: Large AIModel-Based Security Vendor Recommendations andInsights (Security Operations).
Featured in CAICT's Panorama of Digital SecurityTechnology
360 Security Large Model was awarded the ?rst batch ofthe Cybersecurity Capability Certi?cate for Security-fo-cused Large AI Models.
360 Security was featured in IDC's Current Status andTechnology Trends of China's Cybersecurity SoftwareMarket Driven by Generative AI, 2024, IDC TechnologyAssessment: Chinese Attack Surface Management (ASM)Vendors, and IDC TechScape: Roadmap for TechnologyDevelopment in China's Cybersecurity Software Industry.
Featured in 2024 Panorama of China's Digital SecurityIndustry
Featured in Digital World Consulting's LLM-PoweredDigital Security 2024: AI Security360 Security Large Model received the Large AI ModelSecurity Assessment Certi?cate and the Large AI ModelSecurity Testing Certi?cate from the China SoftwareTesting Center.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
IP protection
For 360 Security, a technology company driven by innovation, intellectual property is a core strategic asset. We arecommitted to safeguarding this asset through a continuously improving intellectual property protection system. Oure?orts include the ongoing re?nement of our intellectual property policies and the standardization of creation, use,protection, and management procedures. A key initiative in this regard is the establishment of a patent review com-mittee.
IP system building
Internal Policies and Regulations
Designated Management Body
Intellectual Property Management Measures, Patent Application Management Measures, Patent Classi?ca-tion Management Measures, Patent Writing and Response Operating Procedures, Open-Source SoftwareLegal Compliance Guidelines, etc.To further strengthen IP governance, 360 Security played a key role in the development of T/CIPS 010-2024Guidelines for Pre-Application Evaluation of Patent Drafts. This standard of the China Intellectual PropertySociety (CIPS) aims to foster scienti?c, standardized, and systematic patent reviews before the patent appli-cation process.
360 Security has established the Patent Review Committee, chaired by Dr. Pan Jianfeng, Vice President andChief Scientist. The committee comprises technology experts from diverse ?elds, nominated by the Compa-ny's specialized committees.
During the reporting period
we revised the Trademark Management Policy, and established theGuidelines for AIGC-related Intellectual Property Compliance.
360 Security Large Model is featured in Market Authorita-tive List: Next Generation IT Innovations Products andBest Practices Cases in Digital Innovation.
Featured in CSReview's Top Ten Cybersecurity Innova-tion Trends in China for 2024
Featured in Gartner's Hype Cycle for Security in China,2024360 Security Large Model won the Golden Hat Award forLarge AI Model Innovation of the Year.360 Security Large Model is featured in Find IntelligentTechnology Innovation Application' Excellent Cases at2024 World Intelligence Expo.
360 Security's Large Language Model was recognized asan “Outstanding Innovation Achievement” at the 2024China International Digital Economy Expo.
360 Security Large Model is featured in Pan'an' AI andDigital Security Applications Excellent Cases.
360 Security Large Model was recognized as one of theTop Ten Best Examples of Innovation-driven Develop-ment in China’s Internet Sector (2024) and one of theMost Innovative AI Applications of the Year.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Scienti?c ethicsThe rapid advancement of AI large language models not only presents signi?cantopportunities for industrial innovation but also raises new ethical governance chal-lenges. As an AI technology developer, we are committed to the principle of usingtechnology for good. To this end, we have established a comprehensive AI ethicsframework, combining technological innovation with robust institutional standardsto ensure that our developments consistently contribute to human well-being.All of our AI R&D and application activities are conducted in full compliance with rel-evant Chinese laws and regulations, including the Law on Science and TechnologyProgress, the Guiding Opinions on Strengthening the Governance of Science andTechnology Ethics, and the Science and Technology Ethical Review Measures (TrialImplementation). Throughout the reporting period, we recorded no violations ofethics standards related to science and technology.To empower our employees to navigate these complex ethical considerations, weconducted targeted training activities during the reporting period. These sessionspromoted in-depth discussions regarding ethical considerations at each key stage,including data engineering, model training, and user application.
IP protection measures
Protecting OurOwn IP Assets
We employ a comprehensive approach to managing our intellectual property, ensuring therobust protection of our innovations. This approach includes online application for evalua-tion and standardized application and evaluation processes. Through a strategic pre-evalu-ation process considering technical, commercial, and legal factors, we identify innovationswith strong IP potential and implement a hierarchical protection system. This approache?ectively strengthens and enriches our IP portfolio.
RespectingOthers' IP Rights
We are committed to fully respecting the intellectual property rights of others and fosteringa strong intellectual property awareness among our employees through establishedsystems and processes. To proactively mitigate the risk of infringing on the intellectualproperty of others in our business and R&D activities, we have implemented an intellectualproperty risk warning and control mechanism. This integrates governance checkpoints intokey stages of our product life cycle, from project initiation and market launch to productretirement.In the event of an infringement claim, we follow a pre-established process to ensure promptand e?ective resolution. Our speci?c handling guidelines, tailored to various products andintellectual property types, enable us to verify the legitimacy and relevance of IP rightsbefore we use them. This ensures that we are respecting the rights of IP holders. We takeswift actions to address potential intellectual property infringement notices. This includesnotifying o?enders, taking down or disabling access to infringing content, or blockingo?enders. We keep rights holders informed throughout the process, providing timelyupdates on the outcome of each case.
AI-related IntellectualProperty Compliance
Recognizing the unique intellectual property challenges presented by AI products. We cham-pion compliance by proactively examining emerging compliance challenges, closely trackingindustry trends, and formulating risk lists and compliance guidelines in accordance with ap-plicable laws and regulations. we have developed the Guidelines for AIGC-related IntellectualProperty Compliance. These guidelines cover all aspects including training data compliance,generated content compliance, and related requirements.
IP Awareness
To cultivate an IP-conscious culture, we provide IP training to all employees. During the re-porting period, we achieved 100% employee participation in IP training, with total traininghours surpassing 100 hours.
we strategically expanded our IP portfolio, focusing on core products and key technologies.During the reporting period
submitted domestic and international patent applications
over500
successfully obtained new patent grants
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Mutually bene?cial partnershipsSupplier managementWe maintain a robust supplier management system, guided by the Supplier Management Measures of the CentralizedProcurement Department. This framework standardizes the processes of supplier development, access, mainte-nance, project participation, performance evaluation, rewards and penalties. It has set up and maintained a supplierresource database to improve the quality and e?ciency of procurement.
Supply chain securityTo strengthen supply chain security and incident response, we have formulated the 360 Group Supply Chain SecurityManagement System. Our supply chain security management process primarily consists of six steps: risk identi?ca-tion, risk analysis, risk evaluation, risk disposal, risk supervision and inspection, and risk communication and docu-mentation.
Registered Supplier Candidates: Supplier candi-dates who have submitted basic informationthrough our SRM System and are awaiting review.Eligible Supplier Candidates: Supplier candidateswhose credentials and supporting documentationare complete and meet our requirements, andwho have been assigned to a relevant commodityor service category.Backup Suppliers: Suppliers who have successful-ly completed our vetting process, including creditchecks, interviews/inspections (where applicable),material-speci?c certi?cation (where applicable),and backup supplier assessments.
Asset Identi?cation:
We identify critical assets within our supply chain that are essential to our business operations. Disruptions to theseassets could negatively impact the quality or delivery of our products and services.Threat Identi?cation:
Threat Sources: Environmental factors, supply chain attacks, and human errors.Threat Types: Malicious tampering, counterfeiting, supply disruptions, information leaks, unauthorized operations,etc.
Vulnerability Identi?cation:
We identify vulnerabilities across all supply chain stages, including product and service design, development, produc-tion, integration, warehousing, delivery, operation, maintenance, and disposal, where threats can be exploited.Existing Security Measure Identi?cation:
We evaluate existing and planned security measures within the supply chain to verify their e?ectiveness.
Collaborative Partners: Suppliers who have en-tered into procurement deals with 360 Security andwhose project status is classi?ed as either “in co-operation” or “cooperation completed.”Suspended Suppliers: Suppliers who have demon-strated performance issues and have not shownsu?cient improvement. These suppliers are tem-porarily suspended from participating in new proj-ects but may be reinstated upon successful reme-diation.Blacklisted Suppliers: Suppliers found to have en-gaged in fraudulent activities or other serious mis-conduct during collaboration. These suppliers arepermanently banned from future engagement with360 Security.
Suppliers Classi?cation
Supplier registration is completed through supplier information entry, supplier access review and supplier re-serve evaluation.On-site inspection of key suppliers in conducted according to the Supplier Inspection Form to fully under-stand the comprehensive strength of suppliers.Suppliers are required to sign the Letter of Commitment for Honest Cooperation and Letter of Con?dentialityCommitment, and strictly abide by the Company's anti-fraud management regulations.
Suppliers Inspection and Access
A comprehensive assessment of suppliers' price, quality, service, response and quali?cation is conducted ona quarterly basis, and the annual level of suppliers is comprehensively evaluated once every year.The Company initiates corrective actions or interviews with suppliers whose performance evaluation resultsare unsatisfactory, and tracks their recti?cation.
Suppliers Examination and Evaluation
Any violation of discipline can be reported to the Company through the reporting channel.Non-compliant suppliers will be penalized by freezing and blacklisting.Suppliers Supervision and Elimination
Risk Identi?cation
This involves possibility analysis, consequence analysis, and risk estimation.
Possibility Analysis:
Determining the probability of damage to the supply chain itself (e.g., supply disruptions, IP theft) and to products,services, systems, and components within the supply chain (e.g., malicious code injection, component damagecaused by lightning strikes).Consequence Analysis:
Evaluating the potential impact of supply chain security incidents, considering asset criticality, characteristics of thethreat source, identi?ed vulnerabilities, and the organization's sensitivity to these incidents, as informed by existingor planned security measures.Risk Estimation:
Assigning values to the likelihood and potential consequences of identi?ed risks, based on the outcomes of thepossibility and consequence analyses.
Risk Analysis
We compare our risk estimation results to pre-de?ned risk rating criteria to create a prioritized list of risks. The conse-quence and possibility analysis outcomes are used in the risk evaluation.
Risk Evaluation
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Supply chain collaborationTo support the green transition and sustainable development of our entire supply chain, 360 Security collaborateswith suppliers and partners, providing technical expertise and facilitating resource sharing to drive progress together.
Equal treatment of small and medium-sized enterprises (SMEs)
We o?er equitable payment terms to all businesses, including SMEs. We do not di?erentiate payment terms based onbusiness size and strictly adhere to the principle of timely payment as outlined in our agreements. As of the end of thereporting period, we had no overdue accounts payable to SMEs.
We develop disposal plans for identi?ed risks, selecting strategies aligned with our needs and capabilities.Our strategies include:
Risk Mitigation: Implementing controls to reduce the likelihood and negative impact of risks, ensuring residual risk
is acceptable.Risk Avoidance: Choosing not to engage in or exiting risk-prone scenarios by abandoning certain businesses or
assets, altering environments, or canceling risk-related activities.
Risk Transfer: Transferring all or part of the risk, along with its associated losses or bene?ts, to other partiesthrough mechanisms like insurance or partnerships.Risk Retention: Accepting the potential losses or bene?ts of certain risks when they align with our security strate-gy, without implementing any control measures. If risk reduction is chosen, appropriate supply chain security riskcontrol measures should be implemented to ensure residual risk is acceptable.
Risk Disposal
We conduct risk supervision and inspection to ensure risks remain within acceptable thresholds. Threats, vulnerabili-ties, likelihoods, and impacts of supply chain risks can shift with changes in our business. This dynamic nature ofsupply chain risks necessitates ongoing monitoring of risk management activities, regular control measure reviews,and timely adjustments to scope boundaries.
Risk Supervision and Inspection
We document risks and achieve consensus on risk management strategies with stakeholders by exchanging andsharing relevant risk information.
Risk Communication and Documentation
360 Security and CAICT have spearheaded the development of the Cybersecurity Abnormal Behavior Detection Measuresfor the Internet of Vehicles (Standard No. GB/T 45181-2024). This standard has been recently published. It represents asigni?cant advancement in the security of connected cars. This standard is expected to enhance cybersecurity forautomotive companies and promote industry-wide standardization, contributing to the safer development of intelligentconnected vehicles.To further strengthen automotive cybersecurity, we have established strategic partnerships with numerous automotivecompanies. Together, we are collaborating on automotive security operations, security situational awareness, securitycompliance solutions, Internet of Vehicles security testing, and advanced driving safety features, with the shared goal ofdelivering safer connected cars to consumers.
Case
360 Security has partnered with industry peers, research institutions, and end-users to launch the Large AI Model SecurityAlliance in Beijing. This alliance aims to build a collaborative and open ecosystem dedicated to ensuring the security oflarge AI models and driving their widespread and safe adoption across industries.Our founder, Zhou Hongyi, has articulated three core objectives for the alliance: (i) to encourage open collaboration andcontinuous participation of large AI model developers; (ii) to facilitate the sharing of technologies and best practices todevelop practical solutions for securing these models; and (iii) to provide a platform for the alliance to advocate forresponsible AI development, promote public understanding, and manage expectations regarding the inherent limitationsof large AI models while prioritizing overall safety.
Case
the 360 Digital Security Ecosystem had grown to include partners
By the end of the reporting period
Over6,000
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Rural revitalization360 Security actively contributes to China's rural revitalization strategy throughinitiatives focused on industry, education, ecology, and culture in regions likeYunnan and Inner Mongolia. We drive development through industry-based povertyalleviation, educational training, and other programs designed to strengthen theagricultural sector, improve the rural environment, and foster thriving rural commu-nities. These e?orts demonstrate our commitment to corporate social responsibility.
Reinforcing our commitment to supporting educa-tion, we donated to the Dongrun Charity Foundation,focusing on three key areas:
Dongrun Qihang Scholarship: provide growth incen-tives for rural students.Dongrun Yishi Award: strengthen the rural teachingsta? and ensuring their ongoing support.Dongrun Stardust Art: promot balanced access toaesthetic education resources in rural areas, empow-ering rural education revitalization.Non-Directional Education Funds: non-directionalpublic welfare funds to address emerging needswithin the rural education system.
360 Security's RuralRevitalization InitiativesDongrun Charity Foundation'sEducation Assistance Project
To build upon previous poverty alleviation achieve-ments and facilitate e?ective rural revitalization, wedonated to Baiyin Chagan Town, Qahar Youyi RearBanner, Ulanqab City. This funding targets villagecollective economic development, livelihood securi-ty for vulnerable populations, and improvements toessential services for farmers and herders. Bystrengthening grassroots organizations and ruralgovernance capabilities, we are reinforcing e?orts toprevent poverty and demonstrate our commitmentto “prospering villages through industry and bene-?ting farmers through livelihoods.”
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Inner Mongolia TargetedAssistance Project
Social contribution
Corporate social responsibility
At 360 Security, social responsibility is integral to our corporate development strategy. Guided by the principle ofserving the national interest and strengthening China's foundation for growth, we actively partner in key nationalstrategic initiatives. Our market-driven approach leverages industrial empowerment, resource collaboration, andtechnological innovation to advance coordinated regional development, technology-driven innovation, and ruralrevitalization, thereby contributing to the realization of China's strategic goals.
Community co-development360 Security values building harmonious relationships with local communities, and have established e?ectivecommunication and exchange mechanisms with local communities. We pay close attention to the needs of communi-ty stakeholders and actively participate in community activities.
MSMEs are crucial to China's economy, but they are still in the early stages of digital transformation, making themsusceptible to increasingly sophisticated cybersecurity threats. Recognizing that their digital maturity directlyin?uences national digitalization and security, 360 Security empowers MSMEs with 360 Security Cloud, our SaaSsolution. As a demonstration project for cybersecurity technology applications, selected by the Ministry of Industryand Information Technology. To date, the company has served numerous small and medium-sized enterprises(SMEs), educational institutions, government entities, and specialized functional organizations.
Supporting the digital transformation of micro-, small-, and medium-sizedenterprises (MSMEs)
360 Security recognizes that ful?lling our tax obligations is essential to our role as a responsible corporate citizen. Weadhere strictly to the Law of the People's Republic of China on Enterprise Income Tax and operate with integrity in alltax-related matters. Our comprehensive tax management system ensures timely and accurate payment of all taxesand fees, directly supporting the country's ?nancial well-being, vital public services, and a fairer distribution ofresources across society.
Ful?llment of tax obligations
FY
863,719
thousand yuanthousand yuanthousand yuan
FY
573,527
FY
522,544
Amounts of various taxes paid in the Company's
?nancial statements over the past three years
We published Digital Security Starts with You and Me, an illustrated textbook on digital security, and partnered with theBeijing Municipal O?ce for the Fight Against Pornography and Illegal Publications, the Publicity Department of the CPCChaoyang District Committee, the Cyberspace Administration of China, and other organizations to conduct school-basedawareness campaigns.
Case
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Social welfareAt 360 Security, we integrate social welfare into our core development strategy, guided by the principle of social enter-prise. Our comprehensive public welfare system supports vulnerable groups and provides emergency disaster relief.driving sustainable socioeconomic development, while ensuring the company's healthy growth and deliveringreturns to investors.
Responding to the national call for a stronger life rescue system, we has actively participated in the Tianjin HeartbeatProgram. In 2024, it donated to the Tianjin Binhai New Area Red Cross, speci?cally to purchase automated externalde?brillators (AEDs) for police o?cers in the Binhai New Area. This provides critical support for building a life-savingnetwork, increases access to emergency rescue equipment in public spaces, and advances the Healthy China initiative,ultimately strengthening social welfare.
Tianjin Heartbeat ProgramCase
We partnered with the China Organ Transplant Development Foundation to create Xiao Shi, China’s ?rst AI digitalhuman dedicated to organ transplant population. By leveraging arti?cial intelligence, we aim to raise awareness aboutorgan donation and encourage participation in this life-saving cause.
Case
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Governance
CORPORATE GOVERNANCE SYSTEMCOMPENSATION MANAGEMENTINTERNAL CONTROLTAX MANAGEMENTCOMPLIANCE MANAGEMENTRISK MANAGEMENTPARTY BUILDING LEADERSHIPANTI-BRIBERY AND ANTI-CORRUPTION POLICIESFIGHT AGAINST UNFAIR COMPETITION
Corporate governance system
9089
Governance structure
360 Security is committed to operating with the highest standards of corporate governance. We adhere to all relevantlaws, regulations, and standards, including the Company Law of the People's Republic of China, the Securities Law ofthe People's Republic of China, the Guidelines for Corporate Governance of Listed Companies, and the Rules Govern-ing the Listing of Stocks on Shanghai Stock Exchange. Our governance framework is built upon a clear structure,comprising Annual General Meetings, the Board of Directors, the Board of Supervisors, and the management team.With clearly de?ned roles and responsibilities, this structure fosters collaboration and ensures e?ective checks andbalances and robust compliance throughout our operations.
Three Governance Bodies: Shareholder's General Meetings, theBoard of Directors, and the Board of Supervisors
In accordance with our Articles of Association, we consistently strengthen the operation of our three key bodies—theShareholder's General Meeting, the Board of Directors, and the Board of Supervisors. We ensure their independence,checks and balances, and collaborative function, promoting informed, democratic, and standardized decision-mak-ing that prioritizes the interests of both the Company and its shareholders. During the reporting period,the numberof proposals not passed by the resolutions of the three meetings (shareholder's general meeting, board of directors,and board of supervisors) was zero.
Organizational ChartNomination andRemuneration Committee
Board of Directors
Shareholders'
General Meeting
Board Secretary
Strategy CommitteeAudit Committee
Board ofSupervisors
As the Company's primary governing body, the Annual General Meetingsof shareholders hold the authority to determine business policies andinvestment strategies. We strictly comply with the Company Law and ourArticles of Association, meticulously regulating the meeting deliberationprocess. We conduct regular annual and extraordinary shareholder'smeetings, guaranteeing shareholder's rights to information, participation,and voting.
Shareholder's General Meetings
Number of shareholder'smeetings heldDuring the reporting period
Proposals reviewed byshareholders' meetings
Elected by and accountable to the shareholder's meeting, the Board of Directors serves as the Company's corestrategic and operational decision-making body. It establishes operational and developmental strategies. The Boardoperates through three specialized committees: the Audit Committee, the Nomination and Remuneration Commit-tee, and the Strategy Committee. Each committee adheres to its de?ned responsibilities, conducts thoroughresearch and deliberation, and provides critical support for informed Board decisions.
We strictly adhere to regulations such as the Guidelines for the Reform of the Independent Director System of ListedCompanies, the Measures for the Management of Independent Directors of Listed Companies, and internal policiessuch as the Operational Framework for Independent Directors of 360 Security Technology Inc. We clarify and updaterequirements for independent director meeting attendance and annual report performance standards, ensuringe?ective duty performance and maintaining the Company's stable development.
We are committed to building a diverse and highly quali?ed Board, attracting talents from security technology,?nance, law, and other relevant ?elds. We prioritize academic excellence in Board member selection, with 100% ofour directors holding master's degrees or higher. We also foster an inclusive corporate culture, actively encouragingfemale participation in governance. Our female director contributes unique perspectives and strong communicationskills, enhancing the Board's dynamism and decision-making.
Board of Directors
Comprising shareholder and employee representatives, the Board ofSupervisors is a crucial component of our oversight system. Weuphold the principles of independence, objectivity, and fairness inful?lling our supervisory duties. The Board of Supervisors conductscomprehensive oversight of directors' and senior managementPro-posals reviewed by the Board of Supervisorss performance, ensuringlegal and compliant operations throughout the Company.
Board of Supervisors
Meetings held by theBoard of DirectorsDuring the reporting period
Proposals reviewed bythe Board of Directors 36
Meetings held by theAudit Committee 8
Proposals reviewed bythe Audit Committee
21Meetings held by the Nomination
and Remuneration Committee
Proposals reviewed by the Nomination
and Remuneration Committee
Meetings held by theStrategy Committee
Proposals reviewed bythe Strategy Committee
Independence
of the Boardof Directors
Proportion of independent directors
60%
Number of independent directorsAs of December 31, 2024
BoardDiversity
ProfessionalbackgroundsSecurity technology, ?nance,law, accounting, etc.
During the reporting period,Number of female directors
Education, percentage of Board members
with a master's degree or above
100%
Board of Supervisors
meetings held
During the reporting period
Proposals reviewed bythe Board of Supervisors
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Disclosure of information
We ensure timely information disclosure in accordance with relevantlaws and regulations and internal policies such as the InformationDisclosure Policy and the Policy on Suspension and Exemption ofInformation Disclosure. The Chairman holds primary responsibility forimplementing the information disclosure a?airs management system,with the Board Secretary coordinating speci?c activities. The Board ofSupervisors oversees this process, conducting regular and ad hocreviews, and promptly urges the Board of Directors to handle majorde?ciencies identi?ed.Furthermore, we prioritize the standardization of insider informationmanagement, strictly controlling the registration and management ofinsiders and internal information users. This upholds the principles offairness and transparency in information disclosure and e?ectivelysafeguards the legitimate rights and interests of our investors.Investor relations360 Security is committed to protecting our investors and creatingvalue for them. We are guided by the principles of compliance,equality, proactive engagement, and integrity in all our interac-tions. We actively cultivate diverse communication platforms toencourage shareholder engagement, strengthen our relationshipswith both current and potential investors, and deepen their under-standing of the Company. This approach cultivates a stable andhigh-quality investor base, enhancing corporate governancee?ectiveness and ultimately driving enterprise value.
9291
Security published regular reportsDuring the reporting period
Security published interim reports
Performance in investor relations management
Investor receptions
received Over120
Number ofperformance brie?ngs
Number of inquiries answeredon sns.sseinfo.com
Remuneration managementTo ensure full compliance with the relevant provisions of the Company Law and ourArticles of Association, we have established a fair, reasonable, and performance-drivenremuneration and bene?ts system that aligns with the realities of our business and indus-try benchmarks. Furthermore, we integrate KPIs related to speci?c ESG issues, such astalent development, data security, occupational health, and technological innovation, intoour management performance evaluation framework. The Nomination and RemunerationCommittee of the Board of Directors reviews the remuneration of directors and seniormanagement, while the Board of Supervisors reviews the remuneration of supervisors.
CommunicationChannelsPerformancebrie?ngs
StrategymeetingsReverseroadshows
e interactiveplatform:
sns.sseinfo.com
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Internal controlInternal control objectives and measuresWe have established a robust internal control framework aligned with the Basic Standards for Enterprise InternalControl and related guidelines. This framework includes internal control and routine oversight mechanisms such as theInternal Audit Policy. We regularly evaluate the e?ectiveness of these controls and promptly address any de?ciencies.
Compliance system building
InternalControlMeasuresInternalControlTargets
Segregation of duties
Budgetary controls
Accounting controls
Authorization controls
Operational analysis andperformance appraisalInformationsecurity controls
To ensure compliance with allapplicable laws, regulations,and rules
To ensure the safety of com-pany assetsTo ensure that disclosed in-formation is true, accurate,complete, and accessible toall investorsTo enhance operational e?-ciency and e?ectiveness
To support the implementa-tion of our development strat-egies
9493
Tax management360 Security strictly adheres to relevant tax laws, regulations, and policies in all taxtreatments. With 'compliance adherence' as the basic principle, we have estab-lished an e?ective tax risk identi?cation, assessment, and response mechanism.This enables us to promptly detect and appropriately address potential tax risks,ensuring the Company's tax security and building a strong foundation for long-term,stable development.
Internal auditThe internal audit department reports directly to the Audit Committeeof the Board of Directors. This organizational structure and reportingmechanism ensure the department's independence and authority,e?ectively mitigating interference from other departments. Thisguarantees the objectivity and fairness of our audits, enabling accurateassessments of potential risks within our business activities andmanagement processes.
Number of projects audited in 2024During the reporting period
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Compliance managementCompliance system building360 Security has consistently viewed compliance management as essential for its survival and development. We haveestablished clear compliance objectives supported by11 internal policies, including the Contractual Dispute andRisk Management Measures, the Business Seal Management Policy, and the Management Training Measures of theLegal and Compliance Department. These systematic and standardized management practices e?ectively mitigatevarious compliance risks, ensuring sustained long-term value for our shareholders, customers, and society.Compliance training
In November 2024, we conducted contract review process trainingfor relevant personnel in the business division of WoTrus.Contract review process training
An instructional video on seal use and management was launchedon our intranet in November 2024, enabling employees to accessrelevant information at any time.Seal use and management training
We actively promote compliance awareness through various initiatives, fostering a strong compliance culture andencouraging employees to proactively learn and apply compliance knowledge in their daily work.
Risk control
360 Security has established robust risk control principles. We align our risk controlpractices with national policies and regulations and embed them within ourinternal management protocols. We proactively identify and thoroughly assesspotential operational and managerial risks. Utilizing a dynamic source controlmechanism, we continuously monitor high-risk areas and strive to eliminatehazards at their source. Annually, each business department submits a compre-hensive compliance report, detailing risk analyses and proposing targeted mitiga-tion and compliance optimization strategies. These reports provide valuableinsights for addressing similar risks across the Company. To e?ectively managerisk, we have clearly de?ned risk thresholds, developed detailed risk control guide-lines, and standardized our business operations. These measures collectivelyenhance our overall risk prevention and control capabilities.
Interviewing stakeholdersReviewing past litigations, customer complaints, andadministrative penaltiesAssessing risks and disputes relating to product compli-ance and contractual performanceAnalyzing laws, regulations, and government policiesimpacting our core business activities and developingcorporate bylaws to ensure compliance with allrelevant legal and regulatory requirementsRisks associated with other operational activities
Risk Identi?cation Measures
Process monitoring and auditingRoutine inspections and follow-up checksPolicy development and implementationRisk awareness training and managementEstablishing complaint and reporting mechanisms
Risk Monitoring Measures
Frequency of risk occurrencePotential losses
Risk Assessment
Enhancing systems and addressing vulnerabilitiesOptimizing the management process and enhancingbusiness oversightEstablishing clear individual accountability and improv-ing reward and punishment mechanism
Risk Handling
Our Party Committee is committed to delivering e?ective Party buildingeducation through various means.
9695
360 Security is committed to strengthening its Party Committee by actively recruiting talents from across its 23business lines, including digital security, Internet, commercialization, and smart life. In 2024, our Party Committeehas more than1,200 Party members.
Party building leadership
Party members team building
360 Security's Party Committee fosters a robust and continuous learning environment for its members by integratingideological education with practical community outreach. This is achieved through a variety of engagement meth-ods, including in-person events, video meetings, designated contact points, and local Party branches.
Party building education and activities
In 2024, our Party Committee received the following awards and honors
The title of “Key PartyBuilding Organization inBeijing (Internet Sector)”
The title of “Outstanding Contributorto CPC Beijing Municipal Committee's“E-Reading Promotion Campaign”
Our AI Vanguard projectreceived the title of “InnovativePartyBuilding Project.”
Strong support from the Company's leadership
The Company's Party Committee and leadership prioritizethe implementation of our Party building education planand actively ful?ll the primary responsibility and providesolid guarantees for the e?ective implementation oflearning activities.Supportive learning environmentWe utilize internal platforms to keep employees informedof their learning progress and results, encouraging activeparticipation of all Party members, cadres, and employ-ees.
Enhanced oversight and inspectionRegular oversight from the Company's Party Committeeand leadership ensures consistent progress and timelyachievement of learning objectives.
Rigorous assessment
Party building education activities are integrated intoannual performance evaluations of all Party members,cadres, and employees. Those who perform excellently intheir studies will be commended and rewarded, whilethose who do poorly will be criticized.
In 2024, under the guidance of the CPC's party building requirementsand disciplinary inspection guidelines for the new era, and commit-ted to upholding the highest ethical standards and strengthening itsgovernance, the Party Committee of 360 Security launched aninternal education program focused on maintaining discipline withinthe Party via our intranet in accordance with the directives from thesuperior Party Committee. This campaign targeted the management,key personnel, Party members, and the general workforce. All levelsof Party organizations were directed to give importance to thisprogram.
Case
Following the Third Plenary Session of the 20th CPCCentral Committee, Party members and cadres wereengaged in diverse learning activities. Our PartyCommittee promptly communicated the session'sspirit to the senior management, outlined plans forParty building education of employees, and distribut-ed All-in-One Visual Guide to the Decisions of the ThirdPlenary Session of the 20th CPC Central Committee toall Party members.
Report of 360 Security's Party Committee on the Learning and Implementationof the Spirit of the Third Plenary Session of the 20th CPC Central Committee
In 2024, guided by Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, the Company's PartyCommittee thoroughly studied the spirit of the Third Plenary Session of the 20th CPC Central Committee and GeneralSecretary Xi Jinping's important thought on boosting China's strength in cyberspace. To this end, we organizedvarious joint study activities for the Party Committee and senior management, including 12 study sessions, twothemed workshops, and one reading club event. We also conducted seven study sessions at our grassroots Partyorganizations, encouraging Party members to translate theoretical knowledge into real-world action.
Party building education
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
Case
9897
On November 19, 2024360 Security held its ?rst Party Member Representative Conference.360Security elected a new Party Committee. The new committee reviewedand approved the work report titled “Working Hard for the Grand Planand Forging Ahead to Start a New Chapter: Striving to Build a GloballyLeading AI and Security Technology Company.”360 Security's Party Committee collaborat-ed with the Commission for DisciplineInspection of Chaoyang District to organizea Party building event, themed“Building aCulture of Integrity”
360 Security's Party Committee partneredwith the China National EnvironmentalMonitoring Centre (CNEMC) to hold a PartyDay event, themed“Green Mission, PartyFlag Lead”
360 Security's Party Committee jointlyconducted a learning session on Partydiscipline with the People's Procuratorate.
On April 15, 2024, 360 Security's PartyCommittee in collaboration with theChaoyang District Urban ManagementCommand Center, held a Party Day event,which featured an AI and digital securityexhibition.
Party building activitiesBy actively engaging Party members in diverse activities, our Party Committee has e?ectively created a supportiveenvironment and strengthened the cohesion and operational e?ectiveness of our Party organizations.
Anti-bribery and anti-corruption policies
Policies promoting ethical business practices
We have established a robust ethical framework, comprising policies such as the Internal Audit Policy, the KeyPersonnel Management Policy, the Malpractice Prevention Policy, Gift Acceptance Policy, the Whistleblower Protec-tion and Reward Policy, and the Supplier Blacklisting Policy. These cover employee conduct, supplier management,and internal audits, providing clear guidelines. By rigorously enforcing these policies and maintaining ongoingoversight, we have established a strong foundation for the Company's sustainable development. In 2024, we furtherstrengthened our ethical standards by revising the Malpractice Prevention Policy and other policies.
360 Security upholds strong ethical governance standards. We have continuouslyreinforced our corporate governance framework, improved internal controls, andoptimized supplier management. Through targeted e?orts to combat bribery,corruption, and malpractice, we foster a business environment built on compli-ance, transparency, and integrity.
Strengthen internal integrity control and management
We are committed to preventing and combating malpractice through robust internal controls. We have establishedan independent ethics committee to oversee the investigation of potential violations. All departments are requiredto report suspected malpractice to the Committee via email at jubaoxin@360.cn. Violations of our MalpracticePrevention Policy may result in disciplinary action, ranging from verbal or written warnings to public censure ortermination, depending on the severity of the o?ense.To reinforce ethical conduct and prevent abuse of power, all employees have signed a Code of Integrity Commit-ment, achieving a 100% signing rate. In 2024, as part of our e?ort to further reinforce our Code of Integrity Commit-ment,to enhance the standards for employee conduct and integrity.
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
10099
jubaoxin@360.cn
WeChat o?cial account “360Ethics Committee”
By appointment only, at desig-nated locationsEthics Committee, Building B of360 Security, No. 6 JiuxianqiaoRoad, Chaoyang District, Beijing
Guarantee external honest cooperationWe also promote ethical conduct throughout our supply chain by entering into Business Integrity Agreements withour partners. These agreements establish a shared code of business integrity, helping to prevent commercial briberyand foster a healthy, collaborative ecosystem.In accordance with our Supplier Blacklisting Policy, any supplier found to engage in malpractice will be blacklisted.We will not collaborate with blacklisted suppliers unless a speci?c exception is approved through a de?ned process.Protection of whistleblowersTo foster a fair and transparent business environment, we encourage employees and partners to report suspectedmalpractices and guarantee robust whistleblower protection. Our ethics committee prioritizes con?dentialitythroughout the investigation process, adhering to strict protocols for report handling. Whistleblower identities andsubmitted materials are treated with the utmost con?dentiality, and any breach of this con?dentiality will result insevere consequences, including potential legal action and prosecution for criminal o?enses. Furthermore, the ethicscommittee maintains a special protection list for individuals who submit reports under their own name. Theseindividuals receive specialized support, protection, and rewards.
ReportingChannels
EmailOther online reporting channels
MailIn-person
Ethics training and ethical awareness
To reinforce our commitment to ethical conduct, we o?er extensive ethicstraining sessions to all employees. In the reporting period, we held 15in-person ethics training sessions for new and regional employees, and over610 employees participated. For employees in sensitive positions andleadership roles, we partnered with the Beijing Public Security Bureau'sEconomic Investigation Corps to deliver three specialized ethics trainingsessions, and over720 employees participated.
Ethics training
We maintain a comprehensive ethical awareness program that leveragesmultiple channels such as email campaigns, visually engaging graphics,digital displays, posters, and informative videos to communicate the impor-tance of integrity to our employees. We also emphasize our integrity princi-ples and standards in our interactions with partners through messaging onour platforms and email communications.
To further amplify our commitment,on International Anti-CorruptionDay 2024, we hosted an online quizto actively engage employees andreinforce ethical principles.
Ethical awareness
Number of employees participating inanti-bribery and anti-corruption trainingDuring the reporting period
1,339
Number of managers participating inanti-bribery and anti-corruption training
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
102101
We prioritize preventative measures to avoid any abuse of market dominance. Business personnel are required toreport any potential language that could be construed as acknowledging market dominance to the Legal andCompliance Department. For product lines where we hold a competitive advantage, we proactively prevent anyexclusionary or self-preferential behaviors, and all related actions are subject to prior review by the Legal andCompliance Department.
Prevention of abuse of market dominance
To further reinforce our commitment, anti-monopoly compliance is now a key component of departmental andemployee performance assessments. By linking compliance requirements to incentives, we enhance awareness andfoster a stronger sense of responsibility for anti-monopoly compliance throughout the organization.
Integration of anti-monopoly compliance into performance assessment
We ensure employee awareness and adherence to our anti-monopoly compliance policy through various means,including broad internal communication via our intranet, company-wide announcements, and email updates. Allemployees are required to complete online anti-monopoly training. Furthermore, specialized training is provided foremployees in key departments and roles to promote a deeper understanding of our compliance framework, improveenforcement, and strengthen the Company's anti-monopoly compliance. In 2024, our legal and compliance depart-ment provided online and o?ine anti-monopoly training sessions to various business divisions, including Internetand gaming, to improve their compliance and legal risk awareness and decrease unfair competition risks.
Anti-monopoly promotion and training
After establishing our anti-monopoly compliance framework, our legal and compliance department conducted acomprehensive review of past transactions to identify potential non-compliance. We engaged external anti-monopo-ly experts to further analyze these transactions, categorize them by risk level and provide targeted compliancerecommendations. We have since implemented these recommendations in line with our operational needs.For all planned investments, acquisitions, and mergers, we conduct a pre-transaction analysis to assess reportingobligations during the negotiation phase. If ?ling obligations are identi?ed, we engage independent anti-monopolyexperts to evaluate risks. The results of these assessments will directly inform our approval decisions.
Pre-analysis of Concentration of Business Operators
Fight against unfair competition360 Security is ?rmly committed to contributing to a healthy and competitivemarket. We strictly adhere to the Anti-Unfair Competition Law, the Anti-MonopolyLaw, and all other relevant laws and regulations of the People's Republic of China.We integrate fair competition principles into every facet of our operations, main-taining a zero-tolerance policy toward any behavior that undermines market integ-rity. We actively combat unfair competition and monopolistic practices, contribut-ing to an orderly market environment and supporting long-term sustainability ofthe industry.
Anti-monopoly compliance frameworkWe developed and updated the Anti-monopoly Compliance Manual in July 2021 and August 2022, respectively. Thiscomprehensive manual covers critical areas, including recent legislative and enforcement developments, marketconcentration analysis, prohibited monopoly agreements, abuse of market dominance, and practical complianceguidelines.Anti-monopoly practices
In alignment with our compliance framework, the legal and compliance department rigorously reviews all agree-ments for potential risks related to prohibited monopoly agreements. All standardized, joint procurement/sales, andlong-term exclusive agreements are subject to mandatory prior review.In situations involving competitors, personnel are required to adhere to the established risk handling processoutlined in the Anti-monopoly Compliance Manual.
Risk control for potential monopoly agreements
ABOUT 360SECURITY
MATERIALITYASSESSMENT
ESG GOVERNANCEFRAMEWORK
ENVIRONMENTALCOMMITMENT
SOCIALCOMMITMENTGOVERNANCEEnvironmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
IndicatorUnit2024 Data
Environmental performance
Direct emissions (Scope 1)tCO
e 274.02Indirect emissions (Scope 2)tCO
e 11,490.61Total emissionstCO
e 11,764.63Emissions intensitytCO
e per million yuan in revenue1.48The total environmental protection investmentmillion RMB 1.1058Hazardous wasteTon 0.02Non-hazardous wasteTon 178Diesel consumptionTon0.35Gasoline consumptionTon7.29Natural gas consumptionstandard cubic meters115,822Power consumptionMWh21,297.92Thermal energy consumptionGJ546.54Total energy consumptionTCE 2,802.21Total energy intensityTCE per million yuan of revenue0.35Total water consumptionTon120,793Water intensityTon per million yuan of revenue15.20Volume of recycled materialskilogram1,000
Social performanceNumber of employeesPerson5,975
IndicatorUnit2024 Data
Social performanceMale%69Female%31Aged 30 or below%29.53Aged 31–40%57.15Aged 41 or above%13.32Employees with a vocational college diploma or lower%13.01Employees with a bachelor's degree%67.50Employees with a master's degree%19.05Employees with a doctoral degree%0.44R&D personnel%57.64Sales personnel%33.62Management%8.74Percentage of female managers%19.30Percentage of employees with disabilities%1.02Percentage of employees from ethnic minority groups%5.40The employee turnover rate% 5.20employee satisfaction satisfactionscore 9.71Financial support for disadvantaged demographicsThousand RMB 299Investment in employee trainingmillion RMB1.8General sta? training participation rate%100
Performance Table
103104
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
All data in the report are rounded results, and any individual discrepancies are due to the e?ects of rounding di?erences.
IndicatorUnit2024 Data
Social performanceSenior management training participation rate%96Middle management training participation rate%100Health checkup participation rate%100Work-related injury insurance enrollment rate%100Number of new occupational disease casesPerson0Number of employees who died in work-related accidentsPerson0Average satisfaction rating (Domestic customers)% Over 97Average satisfaction rating (Overseas customers)% Over 97R&D spending (Unit: 100 million yuan)100 million RMB32.02R&D spending as a percentage of our revenue (%)%40.29
Governance performance
Number of shareholders' meetings heldTime 2Proposals reviewed by shareholders' meetingsCase 15Meetings held by the Board of DirectorsTime9Proposals reviewed by the Board of DirectorsCase36Board of Supervisors meetings heldTime5Proposals reviewed by the Board of SupervisorsCase20Proposals failed to passTime0Number of projects audited in 2024Time 12Number of employees participating in anti-bribery and anti-corruption trainingPerson1,339Number of managers participating in anti-bribery and anti-corruption trainingPerson 728
105106
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.
ContentsThe GuidelinesGRI
REPORT PREFACEArticle 62-2/2-3Message from the Chairman/2-6/2-22
About 360 SecurityCorporate pro?le/2-1Corporate culture//Business segments/2-1/2-62024 highlights//Rewards and honors//
Materiality AssessmentDouble materiality assessmentArticle 5、Article 533-1Due Diligence and Stakeholder EngagementArticle 523-1/2-14/2-23/2-29Materiality assessment resultsArticle 5、Article 533-1/3-2/3-3
ESG Governance FrameworkSustainability governance frameworkArticles 11 to 122-9Sustainability governance mechanismsArticle 122-11/2-12/2-13/2-18ESG capability improvementArticle 122-17
Environmental CommitmentResponse to climate changeArticles 21 to 28
2-4/2-23/2-24/201-2/305-1/305-
2/305-4Environmental complianceArticle 332-23/2-24Pollution control and waste managementArticles 30 to 31
2-4/2-23/2-24/303-2/306-1/306-
2/306-3Energy use or Energy managementArticle 35
2-4/2-23/2-24/302-1/302-3/302-
4/302-5
Report Index
ContentsThe GuidelinesGRI
Environmental CommitmentWater conservationArticle 362-4/2-23/2-24/303-5Circular economyArticle 372-23/2-24/301-1/301-2Ecological and biodiversity conservationArticle 32304-3
Social Commitment
EmployeesArticles 49 to 50
2-7/2-23/2-24/201-1/201-3/401-1/401-2/403-1/403-2/403-3/403-5/403-9/404-
1/404-2/405-1/406-1Safety and quality of products and servicesArticle 47
2-23/2-24/2-25/2-26/416-1/416-2/417-
1/417-2/417-3Data security and customer privacyArticle 482-23/2-24/418-1Innovation As a Growth DriverArticles 41 to 422-4/2-23/2-24Ethics in Science and TechnologyArticle 432-23/2-24Mutually Bene?cial PartnershipsArticles 45 to 462-23/2-24/2-25/308-2/414-1Rural revitalizationArticle 39201-1/203-1/203-2Social contributionArticle 40
2-4/2-23/2-24/201-1/203-1/203-2/413-
1/413-2/415-1GovernanceCorporate governance systemArticle 122-9/2-13/2-16/2-23/2-24/2-29Compensation management/2-19/2-20/2-23/2-24Internal controlArticle 122-23/2-24Tax management/207-1/207-2Compliance management/2-23/2-24Risk managementArticle 12/Party-building Initiatives//Anti-bribery and anti-corruption policiesArticle 552-23/2-24/2-26/205-2Fight against unfair competitionArticle 562-23/2-24Performance TableArticle 6/Report IndexArticle 57/
Environmental, Social and Governance (ESG) Report 2024 of 360 Security Technology Inc.