Basic Policy on Information Security
With the conviction that the protection of information assets (hereinafter referred to as "information security") is one of our key social responsibilities, Daifuku sets out the Basic Policy on Information Security with the aim of ensuring the maximum possible level of information security.
All directors, corporate officers, auditors, employees and other personnel authorized to handle Daifuku's information assets shall understand the objectives hereof and shall respect and abide by this Basic Policy. As used herein, "information assets" shall mean all information owned by Daifuku that is associated with our business as well as information systems for storing, controlling and distributing such information.
- Organization and Structure
An organization and structure essential to maintaining information security will be established to clarify the relevant responsibilities and authority.
- Classification and Control of Information Assets
Information assets owned by Daifuku will be classified according to the level of importance to ensure that they are under appropriate control.
- Training and Knowledge Improvement
Appropriate activities to improve training and knowledge will be offered to the authorized personnel to increase their awareness of the importance of information security.
- Physical Protection
The space and methods for storing information assets will be clarified to prevent unauthorized access, disturbance and damage to them.
- Technological Protection
For the purpose of properly protecting information assets from unauthorized access, appropriate measures will be introduced in terms of the methods for accessing information systems, restrictions on use, and network management.
The status of compliance with this Basic Policy will be checked to ensure the effectiveness hereof. In addition, the methods of operation including the handling of violations of the Basic Policy and the procedures for responding to unauthorized access and other emergencies will be stipulated.
- Assessment and Review
The Basic Policy and the methods of operation hereof will be assessed and reviewed on a regular basis in light of changes in social circumstances and advances in technologies.
Established: April 2005
Revised: April 2012
- Information Security Management Rules
- Information Asset Control Provisions
- Rules for Use of Information Infrastructure