❶ | We will take necessary measures to minimize the damage caused by threats to information assets (malfunction, disaster, mishandling, unauthorized use, destruction, theft, leakage, etc.). |
❷ | We will endeavor to manage information security by establishing and operating rules regarding security measures for information systems. |
❸ | We will establish a system risk management system by clarifying the person in charge of system management and the person in charge of internal audit. |
❹ | The Company imposes obligations on all officers and employees to comply with the rules regarding information security, and sets penalties for violating the rules. In addition, we will thoroughly disseminate safety measures by conducting training. |
❺ | When outsourcing operations, we will select a person who has the ability to properly and reliably carry out the outsourced operations, conclude a contract that obliges us to meet security requirements, and manage the outsourcee such as supervising the implementation status of safety measures. to hold. |
❻ | The Company and all officers and employees will comply with and comply with the laws and regulations related to information assets used in the performance of their duties. |