Risk Management

Strengthening the risk management system The Gunze Group has established a Risk Management Committee to prevent risks in general and respond appropriately to unforeseen situations and contingencies.
With the goal of eliminating industrial accidents, misconduct, and all forms of harassment, we are identifying specific risks and working on measures to minimize them.

Goals and Achievements

Number of Risk Management Committee Meetings Held
FY2024 6
FY2023 4
FY2022 4

System The Risk Management Committee deliberates and reviews matters concerning risk prevention, responses to risks that have occurred, and measures to prevent recurrence, based on regulations governing risk management.
This committee consists of the Compliance Officer and department heads.

Sustainability promotion structure

Security Policy In FY2006 the Gunze Group established an IT Security Policy, and has since engaged in systematic efforts to understand the risk status of the entire Group based on its organizational structure, formulate basic policies, conduct regular diagnostics and monitoring, respond to incidents, and improve security awareness.

IT Security Policy Overview

Content
1. Basic Principles This policy outlines fundamental matters, including ensuring the appropriateness, effectiveness, and efficiency of operations through information security regarding the use and protection of all information assets, and that this policy applies to all officers and employees.
2. Organizational Structure Outlines the organizational structure headed by the President and the operational framework centered on the IT Officer, along with their respective responsibilities
3. Responsibilities of Officers and Employees Compliance requirements for maintaining and enhancing IT information security, and handling of information assets
4. Legal Compliance Compliance with relevant laws and regulations (Personal Information Protection Act, Unauthorized Access Prohibition Act, Copyright Act, etc.) and norms
5. Response to Incidents In the event of an incident, an incident response team commensurate with the impact level shall be established and activated. Additionally, the incident response policy shall include collaborating with relevant departments to ensure timely and appropriate external disclosure, as well as reporting to authorities in each country and region.
6. Response to Violations Disciplinary actions for violations by officers and employees of the provisions set forth in these regulations and related documents

System The Gunze Group has established an IT Security Committee, chaired by an IT officer appointed by management, as an organization to promote security countermeasure activities.
This Committee as part of our system to promote cybersecurity, keep track of security-related situations, formulate countermeasure standards, maintain a management system, and deliberate and decide on necessary measures.
In addition, we have established an IT Security Administration Office to implement and supervise the measures decided by the Committee, and instruct and follow up with security officers and personnel in charge of each department on the status of security measures.

Initiatives 1.Education and Awareness
As part of our education and awareness activities, we regularly distribute critical information security updates to employees.
We also conduct security training to assess understanding and review knowledge, working to enhance employees' information literacy.
We continuously provide education and training to employees on the proper management and utilization of information assets, striving to raise information security awareness throughout the entire organization.

2.Security Measures
We implement appropriate measures to prevent unauthorized access to systems, information leaks, tampering, loss/theft, destruction, and disruption of use, ensuring stable operation of information systems.
Specifically, we regularly review countermeasures against increasingly sophisticated server attacks. We also appropriately manage information systems and networks essential to business activities to ensure their continuous availability.
In the event of an information security incident, we collaborate with relevant departments and external agencies to prevent further damage, investigate the cause, and prevent recurrence.