Information Security Policy
1. Handling of various types of information
We will comply with the Act on the Protection of Personal Information and other information security laws, guidelines, and contractual security requirements, and will acquire, use, manage, and dispose of information appropriately.
2. Rigorous information security management
We will establish basic rules and management standards for information security and rigorously manage information security.
3. Rigorous training
We will rigorously train our employees to perform their duties with a high level of security awareness.
4. Dealing with emergencies
In the event of an information security incident, we will promptly investigate the cause and implement countermeasures to minimize damage and prevent recurrence.
5. Supervising partner companies
We require our partner companies to understand our information security requirements and take necessary measures to ensure information security.