Each company in the Infocom Group implements systems to protect information assets from unauthorized access, leakage, and other various threats from internal and external sources, clearly identifying mandatory rules. These measures, defined in our Information Security Management Rules, are designed to prevent information security issues. In the event an information security issue arises, these measures work to minimize damages and restore operations as quickly as possible, limiting any loss of confidence by society in our organization.

Basic Policy

  1. The Infocom Group recognizes the importance of information security, conducting security management on a proper and ongoing basis.
  2. The Infocom Group prioritizes information security over the pursuit of convenience in our business operations.
  3. The Infocom Group considers all information to be owned by our corporate entities. We prohibit the private use of any corporate information.
  4. The Infocom Group strives to adopt the latest technologies related to information security. However, our decisions reflect a balance based on our assessments of risks involved.
  5. The Infocom Group requires individuals using group information assets to understand and comply with these rules to ensure high levels of information security.
  6. We require individuals using group information assets to report immediately to their superior in the event of an information security issue. Such issues must be resolved and measures implemented to prevent recurrence before any other business operations are allowed to continue.
  7. The Infocom Group complies consistently and conscientiously with all laws and regulations. We provide any training and education necessary to ensure compliance.

Structure

Protecting Personal Information

The Infocom Group places the utmost priority on managing and protecting the information of our customers, personal and otherwise. To this end, we maintain and strengthen information security literacy through an organization specializing in information security, while our audit department conducts operational audits. We have also undergo third-party audits to maintain Privacy Mark certification. These and other measures reflect our serious attitude toward information security management.

For more, see the Privacy Policy.