Management Base

Information Security

Information Security > Information Security Policy

Basic Philosophy

As the importance of information security grows, it is necessary for all Group members, from management to the front line, to work together to improve the effectiveness of information security management and reduce security risks regarding the Group’s information assets.
Especially in the digital field, cyber-attacks, such as AI-based attacks, are becoming an ever-growing threat. We have been preparing a system to quickly respond to such threats by separating digital security from information security as IT security. We will also commit work to properly protect various types of confidential and personal information, including information entrusted to us by external parties.

Promotion System

Our group has established a promotion system for each area of IT security and confidential information/personal information management, and are working together to strengthen information security under the supervision of the CSR and Sustainability Committee (chaired by an external director).
Regarding IT security, we have established IT Security Committees (with regular meetings twice a year and extraordinary meetings as necessary) chaired by a corporate officer in charge of the Digital Transformation Dept. to monitor the status of IT security activities across the company and promote appropriate measures. In FY2024, the IT Security Committee met twice to report and discuss incidents, activities to strengthen IT security and ISMS activities. In addition, a global conference was held to work on maintaining and strengthening the security system throughout the Group.
Regarding the management of confidential information and personal information, we have established the Confidentiality Management Subcommittee (with regular meetings once a year and extraordinary meetings as necessary) under the Risk Management Committee. This subcommittee, with a corporate officer in charge of the Business Management Dept. as sub-chairman, promotes the reduction of risks related to the management of confidential information and personal information. In FY2024, the Confidentiality Management Subcommittee met once to report incidents and raise awareness of the risk of technical information leaks through people.
In addition, information security activities are led by department managers and department chiefs assigned to each department in the areas of IT security and confidential information/personal information management in each division.

Information Security Promotion System

Information Security Management System

In order to continuously respond to information security risks that threaten companies and organizations, we have set information security as a priority issue (materiality) and are building an information security management system equivalent to ISO 27001.
In recent years, the digital transformation of business operations has progressed, and the number of risk areas that require attention is expanding, such as the use of generative AI. Therefore, we are making continuous improvements by evaluating these new risks in the information security management system, and we conduct annual audits of IT security and IT systems at all bases and promptly correct any identified deficiencies.
At the request of some automobile manufacturers, we have also acquired TISAX certification, which is an audit standard for information security covering the automobile industry supply chain.

Responding to Information Security Incidents

We have established a Computer Security Incident Response Team (CSIRT).
When an incident occurs, the CSIRT promptly organizes and confirms the facts, determines the level of the incident, and then responds. We are also accumulating and sharing knowledge as a measure to prevent recurrence.
In addition to responding after an incident occurs, we also focus on proactive defense, striving to improve our security level and maturity from both pre- and post-incident perspectives.

Information Security Education and Awareness Raising

Raising employee awareness of information security is essential to prevent information security incidents, and education and awareness-raising are provided through various training and educational tools.

  • ・Education on Information Security Policy and rules
    Education on the Information Security Policy, the Information Security Management System (ISMS) and IT security-related rules is provided to employees of our company and domestic group companies, and their level of understanding is checked.
  • ・Information security awareness training
    Training is provided for employees every year, including directors, employees who continue to be employed and temporary employees of our company and domestic group companies, on the types of information security threats and damage, as well as countermeasures and preparedness against them. In FY2024, we provided that education four times.
  • ・CSIRT communication
    CSIRT publishes "CSIRT communication" every month to inform employees of the latest information on information security and to alert them.
    When it becomes necessary to call attention with a high degree of urgency, we are working to prevent incidents by issuing a bulletin version that describes specific precautions.

Confidentiality Management

The working group on confidentiality management annually inspects the company-wide status of confidentiality management based on the confidentiality management rules set by the company. Regarding the self-inspection results by each department, the secretariat of the confidentiality management subcommittee confirms its validity for the enhancement of the checking function. In FY2024, we revised the rules to review how confidential information is handled according to its level, and promoted thorough information management through education and awareness-raising activities for employees.
Furthermore, in addition to the rules on the in-house handling of confidential information, we have also established rules on the use of confidential information outside the company in order to prevent the leaking of such information, including rules on the use of portable computers and cloud services, and we monitor compliance with the rules.

Protection of Personal Information

As protection of personal information continues to be strengthened around the world, as seen in the General Data Protection Regulation (GDPR) in Europe and the Act on the Protection of Personal Information in Japan, each company in the Group has established its own regulations to thoroughly protect, manage, and handle the personal information of customers, employees, and others.

See the policy regarding the handling of personal information (Privacy Policy) below.

NGK SPARK PLUG CO., LTD.