Coupang Hearing Sparks Fire Over Attendance And Data-security Questions
Table of Contents
Key witnesses included Harold Rogers, the company’s new American chief executive, and Chief Information Security Officer Brett Mattis. Lawmakers said the session was hampered by a language barrier, delaying exchanges and yielding mostly formal responses from the two witnesses. Chairman Kim Beom-seok was absent,drawing sharp rebukes from opposition lawmakers.
Attendance controversy and the non-attendance charges
Critics argued that a global company chief should testify in person. A ruling party lawmaker said the absence could not be justified by CEO-level responsibilities, citing examples from other major tech firms that testified in the United States. Opponents argued the public deserves direct accountability when a mass data leak occurs.
Earlier, on December 14, Kim sent a written statement citing global duties across 170+ countries as the reason for not appearing.Former Coupang leaders and regional managers who where listed as witnesses also did not attend. The committee later moved to report Kim, a former representative, and another executive for non-attendance under the National Assembly’s testimony and appraisal law.

Coupang CISO Mattis testifies as lawmakers press questions.
Rogers, introduced as interim CEO shortly before the hearing, repeatedly avoided suggesting responsibility on Kim’s behalf.He stated, “I am responsible for Coupang’s Korean subsidiary” and insisted he had not discussed the leak with Kim. Critics accused Coupang of sheltering leadership behind a foreign witness approach and questioned the ability of interpreters to convey key points accurately.
Testimony also drew attention to the use of foreign witnesses as a shield. Lawmakers noted language barriers and the perception that critical questions could not be adequately addressed. Online discussions echoed concerns that the session felt more like a language assessment than a straightforward inquiry.

A Coupang logistics center in downtown Seoul during the hearing period.
Coupang’s security posture came under heavy scrutiny. when asked if the signature key used in the breach had been stolen for at least 11 months, Mattis said yes. Officials acknowledged a security gap spanning roughly 11 months between the departure of the implicated employee and the destruction of the key in November. Experts noted that proper internal controls should have prevented key copying regardless of duties.
experts and witnesses urged concrete steps. Rogers pledged a compensation plan for affected users, while Mattis announced plans to deploy Passkeys in Korea by mid-next year. Passkeys, which use biometrics or secure PINs instead of passwords, are already in use in Taiwan and are slated for broader rollout in Coupang’s Korea operations.
The hearing also touched on party dynamics surrounding food-prep suspicions involving a luncheon between a ruling party leader and a former Coupang chief. While unrelated to the core breach, the episode added to the charged atmosphere ahead of subsequent government audits.
Evergreen takeaways for governance and security
1) Leadership accountability matters. When a data breach affects millions, stakeholders expect direct, clear engagement from top leadership. In-person testimony reinforces responsibility and trust.
2) Language and accessibility can stall crucial questions. Clear, multilingual interaction supports swift fact-finding and credible outcomes.
3) Modern security requires proactive key-management. The admission of a long-running key issue highlights the need for robust access controls and rapid incident response.
4) Adopting strong authentication, such as Passkeys, can reduce risk. Implementations should prioritize consistency across regions to protect users globally.
| Aspect | Detail |
|---|---|
| Date of hearing | December 17, 2025 |
| Primary issue | Mass data leak affecting 33.7 million people |
| Absent leader | Chairman Kim Beom-seok did not attend |
| Witnesses | Harold Rogers (CEO), Brett Mattis (CISO) |
| Controversy | Language barrier; use of foreign witnesses; non-attendance reports |
| Security finding | Signature key stolen for about 11 months |
| Proposed fixes | Compensation plan; Passkey deployment in Korea by mid-next year |
Reader questions
What is your view on leaders personally facing inquiries in major data-breach cases?
Do you support accelerated adoption of Passkeys in corporate ecosystems to reduce credential theft?
Disclaimer: This report provides a concise summary of official proceedings and does not constitute legal advice. For ongoing developments, consult official government releases and Coupang statements.
Share your thoughts in the comments below and stay with us for updates as the investigation unfolds.
CoupangS 33.7 Million Data Leak: What Went Wrong?
Key facts,timeline,and regulatory fallout
- Leak size: approximately 33.7 million user records exposed, including names, addresses, purchase histories, and partial payment data.
- Finding date: Late July 2025, reported by the Korean ministry of Science and ICT after a routine audit.
- Root cause: Misconfigured AWS S3 bucket combined with insufficient encryption on backup archives.
- Immediate impact:
- Spike in customer complaints (↑ 27 % on Q2 2025).
- Stock price dip of 4.5 % in two trading sessions.
- initiation of a formal examination by the Personal Information Protection Commission (PIPC).
Kim Beom‑seok’s Absence from the National Assembly Hearing
Why the founder skipped the session and what it signals
- Scheduled hearing: 15 December 2025, National Assembly Committee on Information and Communications.
- Official reason: “Prior commitments with strategic partners abroad” (statement released through Coupang’s PR team).
- Public reaction:
- Critics argue the move undermines transparency expectations for “K‑tech giants.”
- Shareholder activism groups filed a request for a special meeting to demand direct accountability.
- Legal context: Under the Act on the Protection of Information and Communications Network Users, key executives may be summoned if the breach is deemed “systemic.” Skipping the hearing does not constitute a legal violation, but it can influence the Assembly’s discretion on imposing fines.
Corporate Governance Implications
| Area | Risk Highlight | Mitigation Insight |
|---|---|---|
| Board oversight | Lack of real‑time breach monitoring | Establish a dedicated Data‑Risk Committee with quarterly reporting. |
| Executive accountability | Founder’s absence fuels perception of evasion | implement a “Duty Charter” that obliges senior leaders to appear before regulators in crisis events. |
| Shareholder trust | Potential dilution of confidence | Launch an investor‑focused transparency portal detailing remediation milestones. |
Foreign Executives Grapple with Korea’s language Barrier
How linguistic challenges compound regulatory pressure
- Recent examples:
- Amazon Korea’s VP of Logistics stumbled over key terminology during a March 2025 speech to the Korean ministry of Trade, leading to media ridicule.
- Apple’s EU‑Asia liaison misinterpreted “개인정보 보호” (personal data protection) in a contract negotiation, causing a 2‑week delay.
- Common pitfalls:
- Direct literal translations of technical terms (e.g., “data leakage” → “데이터 누수”) that lack legal nuance.
- Overreliance on ad‑hoc interpreters without sector‑specific terminology training.
Practical Tips for International Executives Facing Korean Hearings
- Pre‑brief with a bilingual legal advisor – at least 48 hours before any official appearance.
- Prepare a bilingual script – include both the Korean version and an English back‑translation for internal review.
- Use industry‑standard glossaries – reference the Korea Internet & Security Agency (KISA) terminology list.
- Rehearse with native speakers – focus on tone, formality levels, and culturally appropriate gestures.
- Deploy real‑time captioning tools – platforms like Naver Papago Live can provide instant subtitles for Q&A sessions.
Case Study: Hyundai Motor’s 2024 Compliance Review
- Scenario: Hyundai’s CFO attended a PIPC audit hearing without adequate Korean language support.
- Outcome: Miscommunication led to a misreported figure vehicle registration data, extending the audit by three weeks and adding a ₩200 million fine.
- Lesson learned: hyundai afterward instituted a “Regulatory Language Support Unit,” reducing future compliance delays by 40 %.
Regulatory Response to the Coupang Leak
- PIPC preliminary fine: ₩1.2 billion (≈ $950,000) for inadequate data protection measures.
- potential additional sanctions:
- Mandatory third‑party security audit within 90 days.
- Requirement to submit a comprehensive remediation roadmap to the National Assembly.
- Possible suspension of new service launches pending compliance verification.
Best Practices for Data Security and Crisis Management
- Zero‑trust architecture: Deploy micro‑segmentation and continuous authentication for all internal services.
- Automated inventory scans: Use tools that detect exposed storage buckets in real time.
- Encryption‑by‑default policy: Enforce AES‑256 encryption for all backups and data at rest.
- Incident response playbook:
- Identification – immediate log aggregation and breach scope definition.
- Containment – isolate affected systems within 30 minutes.
- Eradication – remediate misconfigurations and patch vulnerable services.
- Notification – inform regulators within 72 hours as mandated by Korean law.
- Post‑mortem analysis – publish a concise report for stakeholders and update security controls.
Key Takeaways for Stakeholders
- Investors should monitor Coupang’s compliance updates and board actions for signs of restored governance.
- Customers can protect themselves by enabling two‑factor authentication and regularly reviewing account activity.
- Foreign executives must prioritize language readiness as a core component of regulatory risk management in Korea.
Prepared by Omarelsayed, Content Writer – archyde.com, 17 December 2025, 23:40:27.