Group Policy Group Policy

Basic Information Security Policy

  1. Compliance with laws and regulations: We comply with laws and regulations on information security and this policy.
  2. Information management We will establish a system for information security management with the manager of each organization as a supervisor and appropriately manage all information handled in operations depending on the importance and risk.
  3. Technical measures We take technical and environmental measures to prevent unauthorized access to information, loss, falsification, leakage, and disappearance of information and endeavor to protect information.
  4. Awareness building We provide education and training on information security to employees as necessary to ensure compliance with the laws and regulations, this policy, and relevant regulations. We strictly treat violators.
  5. Contract management When outsourcing operations, we disseminate this policy to contractors and conduct thorough information management including the contractors such as concluding an agreement including provisions for confidentiality.
  6. Response to accidents We will establish a system to prepare for any information security incident/accident, minimize damage, and make efforts to prevent recurrence of the incident/accident.
  7. Maintenance and improvement We accurately respond to changes in laws and regulations and social situations and continuously maintain and improve information security.