Protection / Preservation of Corporate Assets and Information
Companies have many assets. In conducting our business, we use a broad range of such assets, including not only our own corporate assets, but also customers' information and many kinds of tangible and intangible assets entrusted to us via contracts with our business partners and associates. As companies face increasingly diverse threats including natural disasters, organized crime, terrorism, and cyberattacks, we must protect both our own property and the property rights of these third parties from such threats. In the course of our day-to-day work, it is becoming increasingly important to take care in dealing with the information and assets we handle and to take preventative measures to protect them from harm, and refrain inappropriate information disclosure.
1. Effective use of corporate assets
We actively and effectively use our corporate tangible and intangible assets, which are a key management resource, to deliver products and services that feature leading-edge, proprietary technologies.
2. Prohibition of improper use of corporate assets
We appropriately manage and use tangible and intangible corporate assets such as products, facilities, equipment, information and intellectual property. We neither use them for personal gain or any other improper purpose, nor act in any way that might damage or devalue them.
3. Prohibition of conflicts of interest
We do not act in ways that place our own personal gain or the gain of family, friends or acquaintances above the interests of the company. For example, we do not compete with the businesses of the company, involve ourselves in such competitive businesses or work in the interests of competitors.
4. Prohibition of insider trading
We do not act in ways designed to bring personal benefit such as trading in shares, bonds or other securities on the basis of non-publicly-available knowledge obtained in the course of our duties or obtained specially from business partners and others using our position as executives or employees (insider trading).
5. Protection of confidential information
We recognize that corporate confidential information is an important corporate asset, and manage it with rigorous care to maintain confidentiality.
6. Protection of others' intellectual property
We do not improperly acquire or utilize non-public information belonging to others. Nor do we infringe on others' intellectual property rights, such as copyrights or patent rights.
7. Protection of personal information
We recognize the sensitivity of personal information, and handle it appropriately and comply with the applicable laws and regulations regarding the gathering, recording, managing, using, disposing of such sensitive information.
8. Crisis management
We conduct systematic crisis management in preparation for emergency response to threats such as natural disasters, terrorism, and cyberattacks. If such events should occur, we will work to minimize the impact on related stakeholders, prioritizing the safety of our employees and local citizens.