Skip to main content

Information Security

Information Security Policy


We regard all of our own information assets as one of our management resources. Through the proper protection
and effective use of our information assets, we pursue healthy maintenance and development of our business.

Action Guidelines

  • We establish rules that clearly define the system and responsibilities for the protection and management of all the information assets including the information we keep for our customers, the know-how and intellectual
    properties owned by our group, and personal information.
  • We comply with laws, ordinances, and regulations regarding information security.
  • We educate all executives and employees who handle information assets about the importance of information security, and about specific items to be observed.
  • We continuously update the information infrastructure for the maintenance and improvement of the confidentiality, integrity, and availability of all the information assets.
  • We promote measures to prevent accidents in order to address the risks of information leakage associated with the continuous advancement and sophistication of information technology. Should an accident occur, we will strive to minimize the damage and take preventive measures against recurrence.

Basic Philosophy

As the importance of information security grows, it is necessary for all Group members, from management to the front line, to work together to improve the effectiveness of information security management and reduce security risks regarding the Group’s information assets.

Especially in the digital field, cyber-attacks, such as AI-based attacks, are becoming an ever-growing threat. We have been preparing a system to quickly respond to such threats by separating digital security from information security as IT security. We will also commit work to properly protect various types of confidential and personal information, including information entrusted to us by external parties.