Information security basic policy
Information security basic policy
A duty and a thought set an information security basic policy here, and it declares what it practices to protect the information assets which I took and our information assets from customer and business partner that we provide better products and service and contribute to social development.
1.Maintenance of the system in the company and the information security policy
We maintain a necessary regime for maintenance of the security and improvement, and we set necessary information security measures as an official rule in the company.
2.Responsibility in the leadership and continuous improvement
Our manager leads it so that the information assets of us and the customer are managed appropriately by the observance of this policy.
3.Laws and ordinances, the observance of the requirements in the contract
Our employee observes the security requirements in the contract with laws and ordinances, regulation, the model in conjunction with information assets to use by operation and the customer.
4.Approach of the employee
I am required for maintenance of the information security and improvement and learn knowledge, a technique, and our employee makes an approach to information security reliable.
5.Response to violation and accident
We maintain the system for correspondence to violation to be concerned with the contract with laws and ordinances, regulation, model about information security and the customer and an information security accident, and we reduce the influence of violation and the accident.
1.Maintenance of the system in the company and the information security policy
We maintain a necessary regime for maintenance of the security and improvement, and we set necessary information security measures as an official rule in the company.
2.Responsibility in the leadership and continuous improvement
Our manager leads it so that the information assets of us and the customer are managed appropriately by the observance of this policy.
3.Laws and ordinances, the observance of the requirements in the contract
Our employee observes the security requirements in the contract with laws and ordinances, regulation, the model in conjunction with information assets to use by operation and the customer.
4.Approach of the employee
I am required for maintenance of the information security and improvement and learn knowledge, a technique, and our employee makes an approach to information security reliable.
5.Response to violation and accident
We maintain the system for correspondence to violation to be concerned with the contract with laws and ordinances, regulation, model about information security and the customer and an information security accident, and we reduce the influence of violation and the accident.
June 30, 2022
Kasai laboratory
President Kasai spring
Kasai laboratory
President Kasai spring