HOME > Information Security Policy

Information Security Policy

OPMAC Corporation (hereinafter referred to as “the Company”) has developed “Information Security Policy” applicable to all personnel who handle the Company’s information assets. This Policy is intended to protect those assets from threats such as incidents, disasters and crimes, and to continuously earn the trust of our clients and society. By complying with the basic policy outlined below and properly managing and operating our information assets, we are committed to maintaining information security.

 

1. Responsibility of Management

The Company is committed to the organizational and continuous improvement and enhancement of information security under the leadership of its management.

 

2. Employee Efforts

All employees of the Company shall acquire the necessary knowledge and skills required for information security and ensure our commitment to information security.

 

3. Compliance with Legal and Contractual Requirements

The Company shall comply with all applicable laws, regulations, standards and contractual obligations relating to information security, while also meeting the expectations of our clients.

 

4. Response to Violations and Incidents

In the event of any legal or contractual violation or security incident relating to information security, the Company shall promptly investigate the cause and take corrective actions to minimize the impact, while striving to prevent recurrence.

 

5. Development of Internal Systems

The Company shall clarify its responsibility framework for maintaining and improving information security and has established formal internal guidelines for information security measures. These guidelines apply to all personnel who may handle the Company’s information assets. The main compliance requirements are as follows:

     ( a ) Information security in the workplace

     ( b ) Information security in remote work

     ( c ) Information security training

     ( d ) Management of confidential information

     ( e ) Use of personal computers (PCs)

     ( f ) Use of networks

     ( g ) Use of email

     ( h ) Anti-virus measures

     ( i ) Monitoring standards

     ( j ) Response to security incidents

     ( k ) Response to non-compliance

PAGE TOP