Basic Information Security Policy

Japan Food Lovers
Basic Information Security Policy

Established: Sep 19, 2024

In accordance with the Basic Management Policy, Japan Food Lovers (“we”) aim to ensure customer satisfaction and trust in our superior technologies, products and services. To this end, we believe that it is important to protect personal information, information entrusted by others and information held by us (hereinafter referred to as “Information Assets”). Based on this understanding, we regard information security as one of our important management strategies, and we strive to achieve customer satisfaction and trust, as well as to realize a sound information society.

  • Information Security System

    We will establish a system of responsibility for information security in each organization, formulate and implement the necessary rules and regulations, and make efforts to appropriately manage Information Assets.

  • Management of Information Assets

    In order to ensure the security of Information Assets, we will clarify how Information Assets are to be handled in accordance with their importance and the risks pertaining to them, and will appropriately manage Information Assets.

  • Education and Training

    We will continue to provide education and training on information security to all officers and employees, and strive to raise their awareness of information security and to ensure that all relevant rules and regulations are implemented. We will take strict measures, including disciplinary action, against those who violate these rules and regulations.

  • Provision of Reliable Products and Services

    We will give special consideration to the security of the information of customers who use our products and services, and strive to provide products and services that customers can feel are reliable to use.

  • Compliance with Laws and Regulations, and Continuous Improvement

    We will comply with laws and regulations related to information security, and strive to continuously improve and enhance our efforts to ensure information security.

  • Establishment of a System to deal with Incident and Response in the case of Incident

    We will establish a reporting and response system in order to minimize the impact caused in the event of any unauthorized access, and/or the loss, destruction, falsification, and leakage, related to the handling of Information Assets (collectively “Incident”). In the event of any Incident, we will investigate the cause and take measures to prevent a recurrence.