INFORMATION
SECURITY POLICY

We contribute to society with technologies which are the basis of space development concerning high-reliability components, and reliability assurance, and quality assurance.
In addition, we don't only adapt ourselves flexibly to the recent environmental changes of the industry, but also grow together with society by expanding these technologies cultivated in the space field to other fields.
The information we have is essential for our business, and most of it is an important asset of our customers. To gain our customers' trust by ensuring security of the information and utilizing it effectively to promote our business, and to be more reliable, we have established the following information security policy.

We all promote the following activities.

  • 1.Emphasis on information security

    We ensure to recognize that the importance of information security activities including ethical perspective through repetitive education and other means.

  • 2.Information Security Management System (ISMS)

    We build, maintain and improve our ISMS, a system that conforms to JIS Q 27001, requirements for information technology and security techniques, to laws and regulations, and to customer requirements.

  • 3.Risk treatment

    We monitor security trends, and assess risks properly to respond to changing risks associated with advancement of cybercrimes and evolution of IT infrastructure.

  • 4.Monitoring and action

    We monitor whether our ISMS activities are being operated more efficiently, effectively, and appropriately through the Information Security Committee, etc., and if we find opportunities to improve, we take appropriate action for them. In the case an incident occur, we will report it appropriately to our stakeholders and take immediate, proper and strict action.