苫小牧埠頭株式会社

×

Basic Policies for Information Security

Basic Policies for Information Security

Tomakomai Futo Co., Ltd.

Chapter I General Provisions

(Statement by the Management)

Article 1   The company strongly recognizes its mission to expand the prefecture’s economy and contribute to the stability of logistics infrastructure as an enterprise part of the Port of Tomakomai—a logistics hub in Hokkaido—and that confidential information it maintains, confidential information it receives from customers, and personal information should be protected. To ensure the confidentiality, integrity, and availability of information assets, the following basic policies have been established and the company will continue to pursue the reinforcement of information security.

(Target Persons)

Article 2   The company shall take thorough measures to ensure the observance of the Basic Policies for Information Security by executives, staff, temporary employees, part-time employees, and outsourcing contractors handling information assets (hereinafter referred to as “Members, etc.”).

(Observance of Applicable Laws and Regulations)

Article 3   The company shall comply with information security laws and regulations, various guidelines, and other social norms.

(Maintenance and implementation of Internal Rules)

Article 4   The company shall maintain and implement internal rules per these basic policies.

(Provision of Information Security Management Systems)

Article 5   The company shall appoint information security managers, provide management organization and management systems necessary for information security, and endeavor to define roles and responsibilities.

(Education of Employees, Etc.)

Article 6   The company shall endeavor to make its Members, etc. fully aware of these basic policies and shall continue to provide education on information security.

(Promotion of Information Security Measures)

Article 7   The company shall take countermeasures to prevent illegal intrusion, leakage, falsification, loss/theft, destruction, and obstruction of the use of information assets.

(Reinforcement of Management System for Outsourcing Contractors)

Article 8   When outsourcing, the company shall examine the eligibility of the outsourcing contractors with regards to information security and perform necessary supervision for contractors to comply with the basic policies for information security.

(Emergency Countermeasures)

Article 9   The company shall, in the unlikely event of a security incident, take prompt and appropriate countermeasures.

(Evaluation/Revision of Information Security Activities)

Article 10  The company shall regularly evaluate whether information security is properly maintained and managed, and work towards improvements where necessary.