Investor relationsGovernanceBusiness continuity activities

Risk management

Comprehensive measures for disasters and other events

Our risk management system is based on the Risk Management Committee's cross-functional oversight of Company-wide risks (those with the potential to affect or harm physical, economic, or creditworthiness aspects) and examination of countermeasures. A Business Continuity Plan was created on April 1, 2010 and is updated annually.

Each department creates rules and guidelines and publishes manuals to raise awareness of its relevant risks related to compliance, responses to antisocial forces, the environment, disasters, quality, information security, credit management, investment & financing, and export management. When an unexpected situation occurs, an Emergency Management Headquarters is immediately established to implement countermeasures in accordance with our Emergency Management Protocol.

In addition to the above, the Board of Directors promptly appoints directors to be responsible for responding to risks that have newly arisen and establishes systems for responding appropriately.
We also conduct annual disaster prevention drills in preparation for emergencies. Our main sites conduct fire drills and large-scale disaster-response drills envisioning various situations, such as an earthquake or tsunami. Our disaster preparation also includes stockpiles of emergency supplies at all sites.

Information security policy

We are a manufacturer specializing in surface modification coatings that is both a solutions provider company responding promptly and suitably to customer needs and an R&D-driven company constantly developing and delivering high-quality, high-performance coatings.
Ensuring information security is therefore of utmost importance, and we accordingly implement the following measures:

  1. Maintain management rules regarding information security
  2. Provide information security training to officers and employees
  3. Conduct safety management for contractors handling confidential information
  4. Confirm compliance status through self-monitoring and internal audits
  5. Regularly review the information security management system