Information Security

Objectives and Fundamental Policies on Information Security

By establishing security policies as fundamental rules for preventing information leakage, we aim to enhance the awareness of G-TEKT employees worldwide on thoroughly protecting our information assets, and to establish information security systems and structures capable of adapting to changes and trends over time.

Fundamental Policies

The fundamental policies for protecting the Company’s information assets shall be set as follows:

  • All actions shall be taken with the understanding of the risks of information leakage.
  • G-TEKT employees worldwide shall manage information and prevent information leakage under the same security policies regardless of the location or the technologies in use.
  • Cases of information leakage and other risk information shall be shared worldwide, reflected in the security policies and used to prevent the occurrence or recurrence of information leakage at G-TEKT.
  • The approach as set forth in the security policies shall be observed when establishing a new system or structure relating to information management or processing.
  • Changes in the social environment shall be addressed expeditiously and measures shall be taken in anticipation of future needs.
  • The security policies shall be reviewed and revised constantly.

Education on Information Security

Confidential information of our clients and our own company, personal information of our employees and various other information that must not be divulged to the outside world exist in vast amounts in the course of our business operations. Since it is believed that the leakage and other mismanagement of information are basically largely attributable to a decline in employee awareness on information security, we regularly educate our employees on information security in order to prevent information leakage. Regarding the method of education, we are conducting reading of the “Ten Commandments of Information Management”, which summarize the gist of the security policies.