G: Information security

Challenge

Ensuring appropriate management and protection of information assets

Our policy

The evolution of IT poses multiple threats to system security, so we have to recognize that it could risk influencing our business management and take appropriate and timely measures. To earn the trust of our customers and society at large, we are developing information security across the Group that will protect our information assets from the threat of accidents, disasters and crime.

Information Security Policy

Responsible executive (as of April 2024)

Senior Corporate Officer and Vice President of the Digital Transformation Headquarters

Organizational responsibilities (as of April 2024)

We have established an information security promotion system under the management of our Global Information Systems Department.

Main resources for promoting activities

  • As of April 2024: LAN managers (14), LAN promoters (204)

Initiative

We have established a secure environment to protect Group information assets from security risks. To be ready for ever-evolving security issues, we need to conduct investigations into future risks and introduce new technologies. Damage caused by information leaks and external attacks can include leakage of business partners’ personal data, suspension of production lines and other severe impacts on business continuity. Therefore, we hold e-learning sessions for employees based on our Information Security Management Regulations to raise their awareness of information security.
We also hold practice drills for employees on targeted email attacks and conduct regular security checks. In 2023, we held three email practice drills for 3,669 employees. We conduct security-related education for those who mistakenly opened the emails in order to prevent reoccurrence. In fiscal 2022, approximately 11% of emails were opened by mistake, while in fiscal 2023 approximately 2% of emails were opened by mistake, indicating that our ongoing efforts are paying off. As part of our recent measures against malware, we have also developed email solutions with features such as suspicious link removal to reduce the risk of information leaks.