- The Company has developed and implemented an internal management plan to
ensure safe handling of personal information.
- With its dedicated team for protection of personal information, the Company
makes sure proper protection measures are implemented, its personnel comply
with protection policies and, when problems are identified, corrective measures are
taken.
2)Control and limits on access to personal information
- Installation and operation of access control tools
• The Company uses a breach blocking system to block any unauthorized access
and is doing its best to secure all possible technical equipment to ensure security
on its system.
- Minimized designation and training of personal information managers
• The Company minimizes designation of personnel in charge of handling personal
information and provides regular training with in-house and outside trainers.
• Handover of personal information management tasks is carried out in full
security and the Company clearly identifies accountability for security breach after
its employees join the Company or resign.
- Control access to personal information
• The Company controls the access to personal information by granting, changing
or terminating access authority to database handling personal information. The
Company also records the details of granting, changing or terminating access
authority and retains the records for 3 years at minimum.
3)Encoding personal information
- Users' personal information is protected by passwords, and files and transmitted
data is encoded or locked when stored and managed. Important data is protected
with additional security functions.
- The Company is using a security system that utilizes encoded algorithms to
transmit personal information on the network (SSL).
4)Storage of access records and measures to prevent record falsification
- The Company retains and manages the record of access to personal information
management system for at 6 months at minimum and uses security functions to
ensure access records are not falsified.
5)Installation and renewal of security programs
- In order to prevent leakage or damage of personal information data caused by
hackers or computer virus, the Company runs security programs and regularly
updates them and monitors their operation.
- The Company also runs a hacker blocking system and weakness analysis system