Compliance with laws and regulations:
We comply with laws and regulations on information security and this policy.
Information management
We will establish a system for information security management with the manager of each organization as a supervisor and appropriately manage all information handled in operations depending on the importance and risk.
Technical measures
We take technical and environmental measures to prevent unauthorized access to information, loss, falsification, leakage, and disappearance of information and endeavor to protect information.
Awareness building
We provide education and training on information security to employees as necessary to ensure compliance with the laws and regulations, this policy, and relevant regulations. We strictly treat violators.
Contract management
When outsourcing operations, we disseminate this policy to contractors and conduct thorough information management including the contractors such as concluding an agreement including provisions for confidentiality.
Response to accidents
We will establish a system to prepare for any information security incident/accident, minimize damage, and make efforts to prevent recurrence of the incident/accident.
Maintenance and improvement
We accurately respond to changes in laws and regulations and social situations and continuously maintain and improve information security.