1. HOME
  2. Sustainability
  3. Governance
  4. Information security

Sustainability - Governance

Information security

Disclosure policy

Basic guidelines

We will provide all stakeholders, including shareholders and investors, Community, with information regarding our management strategy, business performance, financial status, etc. promptly, accurately, and fairly. We aim to gain trust and fair and appropriate evaluation.

Information disclosure standards

Our company will promptly disclose information based on transparency, fairness, and continuity in accordance with various laws and regulations such as the Financial Instruments and Exchange Act and the timely disclosure rules established by the Tokyo Stock Exchange. Even if the information does not fall under various laws and regulations or timely disclosure rules, we will promptly disclose information that is considered to have an impact on investment decisions in a timely and appropriate manner depending on its importance and urgency.

Method of information disclosure

Information that falls under the material facts stipulated by the Timely Disclosure Regulations will be disclosed using the Timely Disclosure Information Transmission System (TDnet) provided by the Tokyo Stock Exchange in accordance with the regulations. Additionally, information disclosed on TDnet will be promptly posted on our website. Please note that posting of this information on the homepage may be delayed from the publication time on TDnet due to system reasons.

Quiet period

In order to prevent the leakage of financial results information and ensure fairness, the Company maintains a quiet period from the day after each quarterly financial results date until the day the quarterly financial results are announced. During this period, we will refrain from responding to any comments or questions regarding our financial results or business outlook. However, even during this period, if it appears that the results are expected to significantly deviate from the forecast, we will make an appropriate disclosure in accordance with the timely disclosure rules.

Privacy policy

Our company recognizes that it is important to protect the personal information that we obtain and use in the course of our business, and we believe that it is our social responsibility and responsibility.

1.About acquiring personal information

When we acquire personal information from Customer, we will clearly state the purpose of use and only acquire it to the extent necessary to achieve that purpose.

2.Use of personal information

Personal information collected by our company will be used only within the scope of the purpose of use specified to Customer, and will not be used beyond that scope.

3. Regarding provision of personal information to third parties

In principle, our company will not disclose personal information provided by Customer to third parties, unless required by law or with the Customer's consent. However, in exceptional cases where it is unavoidable for business reasons, we may provide Customer personal information to a Customer party without obtaining your consent. In this case, we will stop providing personal information to third parties if requested by Customer.

4.About proper management of personal information

In order to appropriately manage acquired personal information, our company takes organizational, human, physical, and technical safety control measures and works to prevent and correct the leakage, loss, or damage of personal information.

5.Respect for rights

If Customer requests disclosure, correction, addition or deletion of personal data held by our company, or suspension of use or erasure, we will respond promptly to the extent reasonably and necessary. I'll have it. Please note that fees may be charged for various procedures depending on the content.

6.Complaints and consultations

When our company receives a complaint or consultation regarding the handling of personal information, we will promptly investigate the facts, etc., and respond in good faith within a reasonable period of time.

7. Compliance with laws, national guidelines and other norms

Our company will protect personal information by complying with laws and regulations regarding the handling of personal information, guidelines established by the government, and other norms.

8. Continuous improvement of personal information

Our company has appointed a personal information management officer and will continue to implement and maintain a personal information protection system based on changes in social conditions and the environment. We also conduct regular audits, review, and make improvements.

Thoughts on information security

We will promote appropriate management of information assets such as personal information and confidential information, which are important management assets, and the establishment of systems to prepare for incidents such as information leaks and accidents.

Legal compliance and confidentiality

We will comply with information security-related laws and contractual obligations. In addition, personal information and business partner information obtained in the course of work will be strictly managed and kept confidential, and will not be disclosed to a third party without the consent of the person or a justifiable reason such as in accordance with laws and regulations.

Information security management system

(1) In order to appropriately manage information assets, we will establish rules regarding information management, and establish and implement organizational and technical systems.

(2) We will develop a system to protect information assets, prevent the spread of damage, and ensure business continuity in the event that an incident regarding information assets occurs. Additionally, in the event of an incident, in addition to taking early actions such as preserving information assets, we will investigate the cause, promptly take measures to prevent recurrence, and ensure that everyone is thoroughly informed.

(3) If a vulnerability is discovered in the management of information assets or a situation arises where information assets are exposed to a threat, we will immediately take corrective measures.

(4) When outsourcing work related to information assets to a third party, we will select an appropriate outsourcing company and thoroughly manage the outsourcing company to prevent information leaks from the outsourcing company.

Information security risk management

Recognizing that information leaks, accidents, etc. regarding information assets are a risk that could damage our company's trust and damage our corporate value, we will prevent this from happening and take timely and appropriate responses in the event that an incident occurs. By preparing a system in advance, we can prevent the risk from expanding.
In addition, if an incident occurs, we will implement group-wide risk management, including information security risks, by collaborating with the Risk Management Committee.

It is known to all

We strive to prevent information security risks by ensuring that all executives and employees of our group are fully aware of our approach to information security, and by conducting training, etc.