Information Security

Information Security Management

In accordance with Japan’s Act on the Protection of Personal Information, we work to protect personal information, including that of our customers and partners. Our approach to information security management is codified in the Privacy Policy and in the Rules for Protecting Personal Information. At Prima Meat Packers, information security is managed by the Information Security Committee, and each department has its own information security manager. Additionally, we inspect our branches, plants, and gift centers to see whether they are handling information—especially personal information—appropriately. Since fiscal 2020, we have inspected 14 such locations each year. In this way, we identify and rectify issues and raise the level of information management. In fiscal 2024, we started using a hybrid approach, in which in-person inspections are combined with remote inspections.

Our information security management system (ISMS) is provided by Prima System Development Co., Ltd., an independent business that formed after we spun off our IT division. In November 2004, Prima System Development got its ISMS certified as compliant with the JIS standard (ISMS Certification Standard, Version 2.0), as part of the Company’ commitment to rigorous information security.

Defending against Cyberthreats

Cyberthreats have become an all-too-familiar menace to companies. Attackers around the world are growing more sophisticated and devious by the day. Accordingly, we are bolstering our cybersecurity infrastructure. The new infrastructure will consist of multiple systems, including internet connection monitoring, endpoint detection and response (checking for suspicious activity on devices), Secure Sockets Layer virtual private network (for protecting communications between mobile devices and networks), and an authentication system for controlling access. It will also consist of a high-security network.

Alongside this, we are improving cybersecurity training for employees, with an emphasis on context-aware cybersecurity—cybersecurity sensitive to time, place, and occasion. The purpose is to make employees ready to respond to cyberthreats at any time, understand the threats and responses specific to a particular place, and understand the right responses and reporting requirements for the occasion in question. It is also important to ensure that operating system software is updated and that data is saved; we are therefore putting in place procedures for such.