Location: Home > About OKI > CSR > CSR in the OKI Group > Information Security > Strengthening of Information Security


CSR

CSR in the OKI Group Information Security

Strengthening of Information Security

System for Promoting Information Security

Based on the OKI Group Security Basic Policy, the OKI Group has established a system to ensure information security and works to properly manage and protect company and customer information. OKI's Information Planning Division reviews all activities related to information security, and each business unit or group company has a information security promotion team that is responsible for addressing the measures decided by OKI's Information Planning Division.

We have also established relevant rules and regulations for information security. We have examined customer information and data to be processed within the group, defined the types of information to be treated as confidential, and formulated regulations, administrative instructions and guidelines related to the processes of acquiring, generating and discarding such information.

System for Promoting Information Security

Regulations and Rules Related to Information Security

Three Perspectives of Information Security System

In the OKI Group we use the three perspectives shown in the diagram below to broadly promote information security measures for computers, networks and information systems.

Information Security Education

As part of its systems for information protection, the OKI group offers information security education to all employees who use the information infrastructures belonging to the group. Each and every individual is asked to thoroughly protect information assets received from customers as well as highly confidential information assets belonging to OKI. For this reason, we widely communicate basic regulations and rules, and company standards regarding the use of our information networks, desktop computers and mobile computers through group training sessions and e-learning programs.

In fiscal 2017, information security training was provided to all employees by e-learning in August. Closely related to this is personal information protection, for which we also provided training at the same time, and almost 100% of employees received this training.

Sharing and Remedying Issues with Suppliers

Aiming at an improved information security level across the supply chain, we at OKI continuously verify how information security measures are implemented at suppliers to whom we provide critical confidential information. Here, we ask our suppliers to carry out self-evaluations and to score themselves based on check lists prepared by us. In this way, suppliers and OKI are sharing issues and remedying any problem points found.

OKI-CSIRT for Prompt Response to Security Incidents

We have established an organization specializing in security incident response called OKI-CSIRT(*1), which collaborates with external organizations, such as the Nippon CSIRT Association, CSIRT in other companies and ministries/agencies, in order to enhance our preventive measures against threats to computer security in the group and improve our capacity to respond to them.

To further enhance the effectiveness of our responses when an incident occurs, in fiscal year 2017 we conducted drills that simulated cyber attacks and information leaks so we could check how our company-wide emergency communication system fared.

  • *1 : CSIRT

    Computer Security Incident Response Team

Enhanced Actions at Overseas Sites

The OKI Group has promoted information security measures at overseas sites, including such actions as laying down information security guidelines in each country and region, appointing security managers at each site, and adopting control tools.

In fiscal year 2017, we stepped up the targeted e-mail attack drills that we had so far implemented in Japan to include all e-mail users at our sites in Europe, the US, China, and Asia.

Acquisition of ISMS Certification

The OKI Group has acquired the ISMS(*2) certification for divisions involved in building and operating internal information systems, and for divisions engaged in general system design development, in order to improve the reliability of network solution construction and related services (5 companies, 7 divisions as of June 2018).

  • *2 : ISMS

    Information Security Management System

Top of this page