Information security |
We use cookies to ensure that we give you the best experience on our website. If you continue, you agree with our policy statement.
- Home
- Information security
- Human Resource Management
- Human Resource Management
- Human Rights and Labor
- Human Rights and Labor
- Human Resource Development and Diversity & Inclusion
- Human Resource Development and Diversity & Inclusion
- Health Management
- Health Management
- Social Contribution Activities
- Social Contribution Activities
- Safety Policy
- Safety Policy
- Occupational Safety and Health System
- Occupational Safety and Health System
- Collaborative Safety / Safety 2.0
- Collaborative Safety / Safety 2.0
- Social Rule Formation / International Standardization
- Social Rule Formation / International Standardization
- Development of Human Resources to Support Safety
- Development of Human Resources to Support Safety
- Top Commitment
- Top Commitment
- The IDEC Group's Sustainability
- The IDEC Group's Sustainability
- Environment
- Environmental Policy
- Environmental Policy
- Climate Change Initiatives
- Climate Change Initiatives
- Environmental Management
- Environmental Management
- Circular Economy
- Circular Economy
- Initiatives for Nature
- Initiatives for Nature
- Environment
- Social
- Human Resource Management
- Human Resource Management
- Human Rights and Labor
- Human Rights and Labor
- Human Resource Development and Diversity & Inclusion
- Human Resource Development and Diversity & Inclusion
- Health Management
- Health Management
- Social Contribution Activities
- Social Contribution Activities
-
Social
- Human Resource Management
- Human Resource Management
- Human Rights and Labor
- Human Rights and Labor
- Human Resource Development and Diversity & Inclusion
- Human Resource Development and Diversity & Inclusion
- Health Management
- Health Management
- Social Contribution Activities
- Social Contribution Activities
- Governance
- Governance
- Safety
- Safety Policy
- Safety Policy
- Occupational Safety and Health System
- Occupational Safety and Health System
- Collaborative Safety / Safety 2.0
- Collaborative Safety / Safety 2.0
- Social Rule Formation / International Standardization
- Social Rule Formation / International Standardization
- Development of Human Resources to Support Safety
- Development of Human Resources to Support Safety
-
Safety
- Safety Policy
- Safety Policy
- Occupational Safety and Health System
- Occupational Safety and Health System
- Collaborative Safety / Safety 2.0
- Collaborative Safety / Safety 2.0
- Social Rule Formation / International Standardization
- Social Rule Formation / International Standardization
- Development of Human Resources to Support Safety
- Development of Human Resources to Support Safety
- Quality
- Quality
- Stakeholder Engagement
- Stakeholder Engagement
- Supply Chain Management
- Supply Chain Management
- ESG Data
- ESG Data
- CSV (Creating Shared Value)
- IDEC products that solve social issues
- IDEC products that solve social issues
- Customer success stories
- Customer success stories
- CSV (Creating Shared Value)
Basic approach
The IDEC Group regards information security-related risks as risks that directly affect management, and raise awareness among all employees. The IDEC Group will continue to work on information security measures through continuous improvement to protect its information assets from ever-changing threats and to secure the trust of our stakeholders.
Management system
The Information Security Subcommittee has been established within the IDEC Group's Risk Management Committee, with the chairperson appointed as the information security officer, to oversee information security management covering all applicable information assets and scope. To manage the progress of corrective measures based on an inventory and risk assessment of company-wide information assets, the subcommittee members are made up of those involved in practical operations from the relevant departments, and they work with department heads at IDEC headquarters and presidents of IDEC group companies to thoroughly communicate company-wide measures and promptly report and implement measures in the event of an accident.
Information security measures
As information technology evolves, cyber attacks become more sophisticated, and threats to information security are constantly changing. In order to reduce risk, it is important to continually assess the internal and external environment for information security and strengthen measures. In addition to technical measures, we also take organizational measures (rule development, education/awareness-raising/training, etc.) to ensure that all employees understand the importance of information security and take defensive action.
We have established a system so that the Information Security Subcommittee can collect information, report to the management, and promptly take command of company-wide measures in case of an incident based on the basic procedures, followed by abnormality detection through monitoring and reports from employees. We will take measures based on the impact on stakeholders, including customers and business partners, as well as within the IDEC Group.
Education and Training
It is important that each and every employee understands the importance of information security and takes defensive action.
We regularly provide information security education (e-Learning) for all employees, and also conduct training on targeted email attacks to raise awareness.
Information security e-Learning attendance in FY2025 (Japan) | |||
Period | Theme | Number of attendees | Training attendance rate |
(1)May | Session 5: Malware | 1,269 | 100% |
(2)July | Session 6: Physical Security | 1,254 | 100% |
(3)September | Session 7: Multi-factor authentication | 1,239 | 100% |
(4)November | Session 8: AI | 1,222 | 100% |
Protection of Private Information
The IDEC Group recognizes that it is its important social responsibility to properly protect and handle information that can identify specific individuals, such as the names, addresses, and email addresses of customers, suppliers, and business partners, and manages the information it obtains in accordance with its Privacy Policy.