Basic Information Security Policy
Japan Food Lovers
Basic Information Security Policy
Established: Sep 19, 2024
In accordance with the Basic Management Policy, Japan Food Lovers (“we”) aim to ensure customer satisfaction and trust in our superior technologies, products and services. To this end, we believe that it is important to protect personal information, information entrusted by others and information held by us (hereinafter referred to as “Information Assets”). Based on this understanding, we regard information security as one of our important management strategies, and we strive to achieve customer satisfaction and trust, as well as to realize a sound information society.
- Information Security System
We will establish a system of responsibility for information security in each organization, formulate and implement the necessary rules and regulations, and make efforts to appropriately manage Information Assets.
- Management of Information Assets
In order to ensure the security of Information Assets, we will clarify how Information Assets are to be handled in accordance with their importance and the risks pertaining to them, and will appropriately manage Information Assets.
- Education and Training
We will continue to provide education and training on information security to all officers and employees, and strive to raise their awareness of information security and to ensure that all relevant rules and regulations are implemented. We will take strict measures, including disciplinary action, against those who violate these rules and regulations.
- Provision of Reliable Products and Services
We will give special consideration to the security of the information of customers who use our products and services, and strive to provide products and services that customers can feel are reliable to use.
- Compliance with Laws and Regulations, and Continuous Improvement
We will comply with laws and regulations related to information security, and strive to continuously improve and enhance our efforts to ensure information security.
- Establishment of a System to deal with Incident and Response in the case of Incident
We will establish a reporting and response system in order to minimize the impact caused in the event of any unauthorized access, and/or the loss, destruction, falsification, and leakage, related to the handling of Information Assets (collectively “Incident”). In the event of any Incident, we will investigate the cause and take measures to prevent a recurrence.