Information Security Basic Policy

Revised: March 19, 2026
Sun Frontier Fudousan Co., Ltd.
Seiichi Saito, President and CEO

The Sun Frontier Fudousan Group (hereinafter referred to as the "Group") prioritizes the trust of our customers. To honor this trust, protect our information assets from all threats, and contribute to the continuous and stable operation of our business, we have established the following basic policy and shall implement safe and appropriate information security measures.

This policy applies to the entire Group (Sun Frontier Fudousan Co., Ltd. and its domestic and overseas subsidiaries and affiliates).

1. Management Responsibility

Under the leadership of management, the Group shall strive to systematically and continuously improve and enhance its security measures.

2. Establishment of Information Security Management System

The Group shall establish a management system to maintain and improve information security, and shall define and operate information security measures as formal internal regulations.

3. Education and Training

The Group shall comply with laws and regulations related to information security and conduct necessary educational and awareness activities for management and employees to ensure full recognition of the importance of information assets.

4. Compliance with Laws and Regulations

The Group shall remain constantly mindful of the protection of information assets and comply with all laws, regulations, and other rules regarding information security.

5. Protection of Information Assets

To ensure the protection of confidentiality, integrity, and availability of information assets, the Group shall establish a system for appropriate management and implement suitable organizational and technical measures.

6. Response to Information Security Incidents

In the event of an information security accident or violation, the Group shall respond promptly and strive to prevent the expansion of damage and recurrence.

7. Continuous Improvement

To ensure the appropriate protection of information assets, the Group shall periodically evaluate and review this policy, related regulations, and the management system, and strive for the continuous improvement and enhancement of information security.