IG Group Information Security Basic Policy
Environmental Policy
1.Basic Philosophy
Igarashi Electric Works Group Information Security Basic Policy
The Igarashi Electric Works Group lays down "Igarashi Electric Works Group Information Security Basic Policy" (the "Policy") to ensure information assets deposited by customers, business partners, all stakeholders or possessed by the Group regarding its business activities ("information assets") are important property of Group.
1. Basic Stance
(1) Legal Compliance
The Group complies with laws and regulations, governmental guidelines, contractual obligations, and other social norms regarding information security.
(2) Maintenance of stable financial and managerial base
The Group commits itself to maintaining a stable financial and managerial base with competitive strength and business continuity through proper management and protection of Information assets.
(3) Provision of sales products and services
The Group implements information security measures across its business activities, including product and service development, design, manufacturing, and marketing, to ensure the delivery of safe and reliable solutions to customers and society.
(4) Contribution to building secure cyberspace
The Group contributes to building a virtual space, where diverse services and communities are created, on the Internet that consists of information systems and information communication networks and distributes information ("Cyberspace") so as to ensure that users can be rest assured in securely enjoying the benefits of Cyberspace.
(5) Information security management
The Group develops a governance framework and implement appropriate measures to continuously promote and improve information security.
2. Information Security Efforts
(1) Clarification of Duties and Responsibility structure
The Group establishes a structured framework to define its roles and responsibilities in information security, ensuring the effective management and protection of information assets.
(2) Development of Information Security Regulations
The Groups establish information security regulations and develops specific management guidelines and procedures based on these regulations.
(3) Risk Management
①The Group identifies Information Assets to be protected and information security threats against them.
②The Group takes necessary measures to prevent/mitigate events that may damage the Information Assets.
③If an event occurs that damage the information assets, the Group will promptly take appropriate actions to contain the event, prevent the damage spreading, restore the Information Assets to their original state, and prevent recurrence of such events.
(4) Education and awareness building
The Group conducts educational and awareness programs for officers and employees to enhance their understanding of information security.
(5) Continuous Improvement
The Group implements an information security Plan-Do-Check-Act (PDCA) cycle to continuously review and its improve information security stature.
3. Inspection and Audit of Ongoing Efforts
The Group conducts regular inspections and audits, including internal audits, to assess compliance with the Policy and ensure its integration into the PDCA cycle, reporting the findings to the leadership responsible for risk management.
March 2025
Igarashi Electric Works Co., Ltd.
President Keiichi IGARASHI