PRINT

Font Size :
A
A
A

MENU

Close

Data Protection / Privacy Policy

Information Security Policy

Policy/Philosophy

Our Group considers the protection of the information assets of our Group and our customers and business partners as important issues of management and follows laws/regulations and company regulations, and at the same time we share the significance and responsibility of management of information assets with our employees and manage information assets in an appropriate manner based on the following policy.

1.Development of the information security structure

Our Group shall develop the information security management structure and work on appropriate management of information assets.

Information Security System

2.Information security measures

Our company group shall work on prevention of the occurrence of information security related incidents through by implementing multifaceted security measures, including organizational and Process and system measures.

Examples of security measures implemented

Measure Classification Details of Measures
Organization
  • Establishment of security incident response system
  • Conduct regular information security training
  • Conduct targeted e-mail attack training on a regular basis
  • Conduct periodic security incident response training
Process
  • Develop and update business rules for information security
  • System vulnerability management and response
  • Periodic risk assessments by vendors
  • Security event monitoring
  • Develop and update security incident response procedures
System
  • PC countermeasures (malware countermeasures, disk encryption, logging, etc.)
  • Internet countermeasures (firewalls, IPS※1, URL/content filtering, etc.)
  • E-mail countermeasures
    (spam mail countermeasures, targeted e-mail attack countermeasures, etc.)
Partner
  • Security vendor utilization (MSS※2, risk assessment, etc.)
  • Use of education and training support vendors
  • 1 IPS:Intrusion Prevention System
  • 2 MSS:Managed Security Service

3.Handing information security incidents

If an information security incident occurs, our Group shall use the countermeasures in an appropriate and prompt manner to minimize damage and we shall work on re-occurrence prevention measures.
If an information security incident occurs, we will establish a CSIRT (Computer Security Incident Response Team) to quickly and accurately disclose information to all stakeholders and strive to bring the incident under control as quickly as possible.

Security Incident Response System

  • 3 JPCERT/CC:Japan Computer Emergency Response Team Coordination Center
  • 4 IPA:Information-technology Promotion Agency, Japan

4.Education regarding information security

Our Group shall conduct educational/enlightenment activities regarding information security on a regular basis in order for employees to use and manage information assets in an appropriate manner.

5.Continuous improvement

Our Group shall continue improvement of information security management structure and countermeasures taking into account the environment surrounding management and social situation.

End of document

 

Smartphone version is here

We use cookies to help improve your experience on our website.
Clink on "Agree" to agree and proceed, or click on "Data Protection / Privacy Policy" for more information and settings of cookies.
By continuing to use our website, you are deemed to have consented to the use of cookies.