Information Security

Information security

We are working to strengthen security and protect company information and client/customer information from threats such as information leaks and cyberattacks. Based on the premise that incidents and accidents are unavoidable, we are working to build an information management system and improve its operation.

Information security CIA diagram

Establishment of information security policy

We are working on the following education and awareness activities, and will continue to do so in the future. We have been making efforts to ensure that activities appropriate for the workplace can be implemented continuously through the appointment of managers.

  1. Training by job grade at the time of joining the company or at the time of promotion
  2. Security training for managers
  3. Training on responding to suspicious emails for all employees
  4. Awareness-raising activities through Confidentiality Management Reinforcement Month and the internal bulletin board
  5. Activities to raise the level of security incident countermeasures by suppliers

Information security policy

  1. We regard information security as an important management issue and, after establishing an information security management system, we will continue to engage in information security activities.
  2. We evaluate and analyze information security risks and implement appropriate human, organizational, technical, and physical security measures.
  3. We will continue to provide education and training on information security to further improve the information security level of all employees.
  4. When an information security incident occurs, we will promptly report it to all concerned parties, take initial measures to prevent further spread of damage, investigate the cause, and take appropriate recurrence prevention measures.
  5. We regularly inspect all information security initiatives, such as the management system, compliance with rules, and the effectiveness of measures, and carry out continuous correction and improvement activities

Establishment of vulnerability monitoring and incident response guidelines

As one of our corporate social responsibilities, we will thoroughly implement information security measures and protect our information assets. We will strengthen governance by assuming risks, formulating rules, and building systems for their management and operation. By doing so, we strive to ensure that the use of information does not impair the rights and interests of the information providers.

Security incident response team (SIRT) organization diagram