Information Security Policy

Our Approach to Information Security

For Customers Livelihood, along with the region, together with the earth, we will continue to grow and develop.

Based on this corporate philosophy, the TOKAI Group provides a wide range of products and services related to daily life through a one-stop, one-contract, one-call center approach. We strive to deepen our connections with customers and the broader community, society, and the environment, contributing to the enrichment of people's lives, the development of local communities, and the preservation of the Earth's environment. As a member of the group, our company also works in accordance with this corporate philosophy.

Due to the nature of our business, we handle a large amount of confidential information, including personal and corporate information of our customers, as well as technical information. We recognize that it is our important responsibility to protect this confidential information from information security threats and to use it safely and effectively in order to meet the trust of external stakeholders, including our customers.

With this understanding, we hereby establish the "Information Security Policy." Based on this policy, we will establish an information security management system and take measures to ensure the safe and effective handling of confidential information and information systems. In doing so, we will fulfill the responsibilities stated above.

Information Security Policy
  1. 1Protection of Information Assets

    To ensure the confidentiality, integrity, and availability of confidential information and information systems, we establish an information management system and implement appropriate organizational, personnel, physical, and technical measures.

  2. 2Compliance with Laws and Regulations

    We comply with laws and regulations related to information security, guidelines established by the government, and other standards.

  3. 3Inclusion of External Stakeholders in Information Security Efforts

    External stakeholders who utilize our confidential information, such as business partners, are included in our information security activities. We ensure their awareness and provide guidance on compliance requirements, as well as conduct appropriate supervision.

  4. 4Education and Training

    We provide education and training to all stakeholders involved in our business to enhance their information security literacy and enable them to effectively manage information assets.

  5. 5Continuous Improvement

    We strive for continuous improvement and enhancement of information security measures in response to changes in laws, social environment, and risks related to information security.