(Personal Information Protection Policy)
- To ensure the proper handling of personal data, we have formulated this policy (Personal Information Protection Policy) regarding compliance with relevant laws, regulations, guidelines, etc., and a contact point for handling questions and complaints.
(Establishment of Rules for Handling Personal Data)
- We have formulated rules for handling personal data, including the handling method, responsible persons, and their responsibilities for each stage of the process, such as acquisition, use, storage, provision, deletion, and disposal.
(Organizational Security Control Measures)
- We have appointed an administrative manager for handling personal data, clarified the employees who handle personal data and the scope of personal data handled by those employees, and established a reporting and communication system to the administrative manager in the event of any violations or signs of violations of the Personal Information Protection Act or the Personal Information Protection Rules.
- We regularly conduct self-inspections of the handling of personal data, and audits are conducted by other departments and external parties.
(Human Security Control Measures)
- We provide regular training to employees on important points to note regarding the handling of personal data.
- We include matters related to maintaining the confidentiality of personal data in our employee guidelines.
(Physical Security Control Measures)
- We manage employee entry and exit to areas where personal data is handled, restrict the devices that employees can bring in, and take measures to prevent unauthorized access to personal data.
- We take measures to prevent the theft or loss of devices, electronic media, documents, etc. that handle personal data, and we take measures to prevent personal data from being easily identified when carrying such devices, electronic media, etc., including when moving within the workplace.
(Technical Security Control Measures)
- We implement access control to limit the scope of personnel and personal information databases, etc. that are handled.
- We have introduced mechanisms to protect information systems that handle personal data from unauthorized external access or malicious software.