Information security policy

We recognize that the risks associated with information security are a crucial issue of our management. Through the defined ‘Information Security Policy’ outlined here, we strive for the proper protection of ‘information’ and the secure management of information assets.

(1) Information Security Management System

We recognize the importance of addressing information security as a crucial concern and will establish an information security structure across the entire TOKAI group with the involvement of the management.

(2) Protection of Information Assets

To safeguard information assets from threats to confidentiality, safety, and availability, we implement appropriate measures. Furthermore, when outsourcing all or part of our operations, we thoroughly examine the eligibility of the outsourcing partner.

(3) Establishment and Maintenance of Internal Rules

We establish and continually update regulations and rules that are suitable for our practical operations, adapting them promptly and appropriately to changes in the environment.

(4) Compliance with Laws and Internal Rules

As a matter of course, we ensure compliance with relevant laws and diligently strive for the strict adherence to the regulations and rules established by our company. In the event of any violations, we will take appropriate measures and make every effort to ensure proper information management.

(5) Educational and Training

We conduct education and training on information security to enhance the awareness of officers and employees within our company.

(6) Incident Response

We strive to prevent information security incidents proactivity. In the event of an incident, we will respond promptly and in accordance with legal requirements, disclose information to stakeholders at the appropriate time, and implement measures to prevent recurrence.