Information Security Policy

  1. HOME
  2. Information Security Policy

Information Security Policy

Showa Shinku and its subsidiaries (hereinafter referred to as “Our Group”) recognize that proper management of information is an important management issue. Our Group has established and will comply with the “Information Security Policy” as an initiative of Our Group to various threats, such as theft and unauthorized access, and the risk of information leakage, to various information assets held, including information entrusted to us by customers.

1. Establishing an information security management system

Our Group will strive to protect and prevent the unauthorized use and leakage of business-related information, including design information, technical information, R&D information, customer information, and employee information, and will establish an information management system and implement appropriate management in order to gain the trust of society by complying with relevant laws and regulations and other norms related to information security.

2. Establishing internal regulations

Our Group will establish internal regulations related to information security and thoroughly disseminate clear policies and rules for the protection and appropriate management of information assets within the company.

3. Conducting audits

Our Group will audit, as necessary, the status of compliance with laws, regulations, internal regulations and rules, and other regulations related to information security to verify if these are functioning effectively.

4. Providing education

Our Group will provide ongoing education to all employees to ensure the appropriate management of information assets.

5. Implementing information security measures

Our Group will implement security measures from the viewpoint of organizational, physical, technical, and human safety control measures, and will take the necessary measures against risks related to information assets, such as unauthorized access, leakage, loss, destruction, and falsification.

6. Managing outsourcing parties

When outsourcing the handling of information to external parties, the Group will thoroughly screen the suitability of the outsourcing party and enter into appropriate contracts, and at the same time, make use of regular reports etc. to verify that the outsourcing party is properly maintaining security.

7. Business continuity management

Our Group will strive to minimize business interruptions caused by disasters, breakdowns, etc., thus ensuring business continuity.

8. Implementing continual improvement

Our Group will continually improve its information security management by regularly evaluating and reviewing the above initiatives.

END