SK-Electronics CO.,LTD.

Menu

About SKE

Information security Policy

SK-Electronics Co., Ltd. (the Company) recognizes the importance of managing the risk of information leakage, and makes every effort to protect its information assets in accordance with the policies outlined below.

1. Information security

In order to maintain and strengthen relationships with customers and improve social standing and technological competitiveness, the Company strives to protect its information assets and establish a solid information security management system.

2. Information security management system

A Chief Information Security Officer (CISO) has been appointed by the president in order to maintain an accurate understanding of the status of information security and to manage information assets.

3. In-house regulations

The Company has set forth clear policies concerning the handling of its information assets within its in-house regulations established in accordance with its Information Security Policies, and complies with the same.

4. Information security training

The Risk Management Committee of the Company organizes training concerning information security for its directors and employees in order to maintain and improve their awareness of information security.

5. Internal audits

The Company performs internal audits in accordance with its Internal Audit Regulations in order to monitor and ensure that its Information Security Policies and in-house regulations are enforced properly.

6. Compliance, etc. with applicable laws and regulations

While complying with applicable laws and regulations concerning information security, the Company will make ongoing efforts to improve and upgrade the measures taken to protect personal assets, in accordance with changes in lines of business and operating environments.

Masanori Ishida
President

Page Top