Information Security Basic Policy
Revised: March 19, 2026
Sun Frontier Fudousan Co., Ltd.
Seiichi Saito, President and CEO
The Sun Frontier Fudousan Group (hereinafter referred to as the "Group") prioritizes the trust of our customers. To honor this trust, protect our information assets from all threats, and contribute to the continuous and stable operation of our business, we have established the following basic policy and shall implement safe and appropriate information security measures.
This policy applies to the entire Group (Sun Frontier Fudousan Co., Ltd. and its domestic and overseas subsidiaries and affiliates).
-
1. Management Responsibility
-
Under the leadership of management, the Group shall strive to systematically and continuously improve and enhance its security measures.
-
2. Establishment of Information Security Management System
-
The Group shall establish a management system to maintain and improve information security, and shall define and operate information security measures as formal internal regulations.
-
3. Education and Training
-
The Group shall comply with laws and regulations related to information security and conduct necessary educational and awareness activities for management and employees to ensure full recognition of the importance of information assets.
-
4. Compliance with Laws and Regulations
-
The Group shall remain constantly mindful of the protection of information assets and comply with all laws, regulations, and other rules regarding information security.
-
5. Protection of Information Assets
-
To ensure the protection of confidentiality, integrity, and availability of information assets, the Group shall establish a system for appropriate management and implement suitable organizational and technical measures.
-
6. Response to Information Security Incidents
-
In the event of an information security accident or violation, the Group shall respond promptly and strive to prevent the expansion of damage and recurrence.
-
7. Continuous Improvement
-
To ensure the appropriate protection of information assets, the Group shall periodically evaluate and review this policy, related regulations, and the management system, and strive for the continuous improvement and enhancement of information security.
