top of page

Security Policy

The rapid spread and development of information technology has greatly contributed to bridging the gap between academia and companies regarding pharmaceuticals and medical device seeds, as well as speeding up the development of groundbreaking medical technology and pharmaceuticals, and has now become essential to the execution of business. It becomes. At our company, the services we provide are based on this information technology, and we are required to respond appropriately to increasing risks.
As an information security measure, our company has established an "Information Security Policy" to maintain confidentiality, integrity, and availability.

Behavioral guidelines

 

1.Promotion of information security measures

The president will clearly express his support and support for this basic policy and information security-related regulations, and will take the initiative in promoting information security measures.

2. Compliance with information security-related regulations

All employees will comply with established information security-related regulations.

3.Education/Training

We regularly provide education and training to all employees to raise awareness and the importance of information security.

4.Establishment of methods, systems, and procedures
We will develop risk assessment methods, systems, and procedures that allow us to quickly respond to changes in the environment surrounding information assets.

5.Continuous improvement and maintenance
We will maintain information security measures at an appropriate level by regularly reviewing this basic policy and related regulations and making continuous improvements.

6.Business Continuity Plans and Disaster Recovery Plans
Develop, maintain, and regularly train business continuity plans and disaster recovery plans.

7.Disciplinary Action/Legal Action
All employees will be required to comply with internal regulations and our company's information security-related regulations, and we will not engage in intentional acts that jeopardize the protection of our company's or our customers' information assets. If this occurs, we will clearly state that the employee will be subject to disciplinary/legal action according to the rules of employment.

(Established on December 31, 2019)

bottom of page