Governance

Protection of Personal Information and Information Security

Protection of personal information

Handling of personal information and specified personal information, etc.

In October 2004, we established the Personal Information Protection Regulations for the handling of personal information, and, based on these regulations, we have established an internal system including the appointment of a Personal Information Supervisor to oversee the protection of personal information.
In March 2005, we published our Privacy Policy, which sets forth our basic policy on the handling of personal information, on our website and established a portal site for the protection of personal information on our intranet to actively raise awareness and educate our employees.
Furthermore, in April 2022, these policies and regulations were revised in accordance with the full enforcement of the revised Act on the Protection of Personal Information.

In addition, with the enforcement of the Act on the Use of Numbers to Identify a Specific Individual in Administrative Procedures, we established the Basic Policy on the Proper Handling of Specific Personal Information and Regulations on the Handling of Specific Personal Information in November 2015 in order to work, as an organization, to ensure the proper handling of personal numbers and specified personal information (hereinafter referred to as “specified personal information, etc.”). Based on these basic policies and regulations, we have established an internal system and have taken measures for the safe management of specified personal information, etc.

When we outsource the handling of personal information or specific personal information, etc. held by us to a third party, we thoroughly manage and supervise the outsourced party to ensure the safe management of personal information and specific personal information, etc. in accordance with relevant laws and regulations.
We will continue to review and improve our regulations regarding the handling of personal information and specified personal information, etc., as well as our internal system for implementing these regulations, to ensure that they continue to be effective and appropriate.

TOKYU CORPORATION

Information security

Approaches to the protection of information assets

In order to protect our customers’ personal information and other information assets, we strengthen our security measures from time to time, as described below.

  1. Formulation of policies and rules
    In order to protect all of our information assets, we have established security policies, internal rules, and other rules in accordance with laws, regulations, and other norms related to information security.
  2. Continual maintenance and improvement of security measures
    We strive to maintain and improve our information security measures by conducting risk assessments on an ongoing basis.
  3. System for information security incidents
    We have established a system that includes cooperation within the Company and with external organizations (including public organizations) to enable a prompt initial response and investigation in the event of an information security incident such as an information leak.
  4. Employee training
    We provide various types of information security education through e-learning (learning via the internal network) and other means to strengthen the security knowledge of our employees.
  5. Strengthening of system measures
    To prevent the leakage, falsification, and destruction of information assets, we are constantly enhancing our system measures, such as monitoring communications 24 hours a day, 365 days a year.
  6. Ensuring security for the entire group
    We share information on information security risks with Group companies, check the implementation status of measures at each company, and present improvement plans and support implementation as necessary.
TOKYU CORPORATION, TOKYU CORPORATION