{"id":17934,"date":"2022-10-01T18:34:06","date_gmt":"2022-10-01T09:34:06","guid":{"rendered":"https:\/\/www.ejec.ej-hds.co.jp\/web\/?page_id=17934"},"modified":"2023-08-04T17:37:07","modified_gmt":"2023-08-04T08:37:07","slug":"security","status":"publish","type":"page","link":"https:\/\/www.ejec.ej-hds.co.jp\/en\/security\/","title":{"rendered":"INFORMATION SECURITY"},"content":{"rendered":"\t<div class=\"comInfoBox\" >\n\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">EJEC believes that fundamental and high level information security measures are essential to protect the precious information assets of clients and to fulfil the company\u2019s social responsibility based on the corporate philosophy of contributing to the creation of a genuinely affluent society with excellent technologies which are friendly to the global environment and ability for precise judgement. Based on this belief, EJEC has formulated and will abide by the \u201cInformation Security Policy\u201d which explicitly states the basic principles for information security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">1. Status of the Information Security Policy<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">This Information Security Policy is to set forth the basic principles for information security in accordance with a \u201csocially accountable company with a high level of professional ethics and compliance awareness\u201d as defined under the \u201cObjectives and Corporate Responsibilities\u201d of the Basic Business Management Policies of the E-J Group.<br>\r\nEJEC operates this Information Security Policy as the highest level policy of its information security measures.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">2. Establishment of an Information Security Management System<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">EJEC sets up a section responsible for information security as part of its Headquarters organization and appoints an information security manager.<br>\r\nWith such arrangements, EJEC develops a system which is capable of constantly understanding the company-wide security situation so that any necessary measures can be swiftly implemented.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">3. Development of Internal Rules for Information Security<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">EJEC develops internal rules based on the Information Security Policy explained here, setting out concrete procedures for the implementation of information security measures concerning confidential information control, important information control, personal information control, etc. and makes every staff member fully aware of these procedures.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">4. Realization of a System Corresponding to Information Security<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">Every effort is made to ensure and confirm the proper functioning of the information system in terms of both hardware and software and the appropriateness of data. In addition, necessary measures are employed for the in-house information system so that no leaking, falsification, loss or destruction, etc. of the information assets takes place.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">5. Responsibilities and Education of Staff Members<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">Every staff member using information assets of EJEC conducts the work with full awareness of the importance of information security and the legal and social responsibility involved in the handling of information assets.<br>\r\nFor this reason, education on security is conducted for all officers and staff members as well as loaned staff and temporary staff.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\n\t<div class=\"comInfoBox\" >\n\t\t\n\t\t\t\t\t<h3 class=\"headLine04 left\">6. Strengthening of the Control System at Outsourced Contractors<\/h3>\n\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 left\">When EJEC outsources any work, it thoroughly checks the suitability of the contractor in terms of information security. EJEC also checks the maintenance of an appropriate security level at outsourced contractors from time to time.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<p class=\"comText comText01 right\">June 1, 2009<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":71,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_locale":"en_US","_original_post":"https:\/\/www.ejec.ej-hds.co.jp\/web\/?page_id=17929","footnotes":""},"class_list":["post-17934","page","type-page","status-publish","hentry","en-US"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/pages\/17934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/comments?post=17934"}],"version-history":[{"count":7,"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/pages\/17934\/revisions"}],"predecessor-version":[{"id":33349,"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/pages\/17934\/revisions\/33349"}],"wp:attachment":[{"href":"https:\/\/www.ejec.ej-hds.co.jp\/wp-json\/wp\/v2\/media?parent=17934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}