1. Home > 
  2. CSR Information > 
  3. Management Systems > 
  4. Information Security

Information Security

Akebono has established an Information Security Committee, as well as information security policies, guidelines and rules for the handling of information in order to implement appropriate measures protecting information assets appropriately. We clarify measures according to materiality and risk, in order to provide appropriate protection for data owned in-house or provided by customers or business partners from all kinds of threats, including negligence, accidents, natural disasters, and criminal acts. Under the Information Security Committee, the Company has also set up a working group, and established a system where an information security personnel or information system administrator in each section carries out their own checks against the information security risks to which their respective operations are vulnerable. Using a PDCA cycle to raise awareness of and adherence to the various regulations and guidelines through education and training, the Company is working to ensure information security. In the unlikely event that a violation does occur, such as with regard to the Company's rules of employment, it is strictly dealt with. The Company complies with all relevant laws and regulations and other social norms, and strives to achieve the continuous improvement of its management systems, including in response to changes in the environment.

Moreover, in recent years, in light of the increasing risk of information leakage due to global business expansion, growing dependence on IT and the increased liquidity of employment, the Company is further strengthening its information security. As part of these efforts, we implemented information security assessments by an external vendor for domestic Group companies in fiscal 2014 and for overseas Group companies in fiscal 2015.

In the future, at the same time as continuing to implement global education and awareness-raising activities, we will continue to regularly conduct information security assessments, and strengthen our countermeasures to cyber-attacks, which are becoming increasingly sophisticated.