Our company's business endeavors are centered on the capacitor business, and the information about our customers and internal information handled in the business process is highly confidential. We recognize that it is our mission to maintain the confidentiality of this information strictly to maintain the trust of our customers and investors and continue to develop our business.
To this end, we have introduced a separately established management system to protect the confidentiality and integrity of important information including that of our customers, and to prevent security incidents such as information leaks and alteration and all of us shall work in accordance with the following basic policy on information security.
Given the importance of the information handled by us, all officers and employees shall take information security measures and comply with laws, regulations, and internal rules related to information security.
In the event of any violation of this policy and related regulations, etc., disciplinary action will be taken in accordance with the established “Employment Regulations”.
To protect our information assets, we will clarify our information security management system and strive to prevent information security incidents from occurring. In the unlikely event of an incident, we will promptly investigate the cause of the incident, minimize the damage, and work to prevent a recurrence.
We shall establish and implement the “Basic Policy on Information Security” for the appropriate management of information assets. This policy shall be thoroughly communicated to all officers and employees.
We will build a system to identify vulnerabilities and threats to information assets in terms of confidentiality, integrity, and availability, and to assess any identified risks using appropriate standards.
We will make our employees aware of the serious social responsibility to handle information assets appropriately, and will continuously provide them with the education and training necessary to improve their awareness of information security.