Corporate Governance

We consider the most important element of corporate development is gaining trust from our stakeholders, which can be obtained by aiming for fair business management through transparency in corporate management and appropriate delegation of authority and raising compliance awareness. The healthy coordination between the board of directors and executive officers and strengthening of management oversight system by corporate auditors both work to provide Canon Tokki with excellent corporate governance.

Information Security Policy

  1. Information Security Initiatives
    We are committed to engaging all employees to provide good information security, based on our understanding that information security is one of the most important issues for both management and business operations.
  2. Compliance Programs
    We will ensure that our directors and employees are aware of the importance of protecting information assets and formulate, implement, maintain, and improve compliance programs for establishing and thoroughly applying information security management systems.
  3. Protection of Information Assets
    As a vacuum technology product manufacturer with OLED panel mass production equipment at its core, Canon Tokki implements security controls appropriate for each business situation to securely protect information assets from threats to their confidentiality, integrity, and availability.
  4. Compliance with Laws and Regulations
    Canon Tokki's compliance programs comply with and are in accordance with laws, regulations, standards, and other conventions related to information security, and Canon Tokki complies with these laws, regulations, standards, and other conventions.
  5. Education and Training
    We will work to raise the awareness of information security by our directors and employees, while conducting education and training programs regarding the company's information security compliance programs.
  6. Prevention of Security Incidents and Incident Response
    While working to prevent information security incidents, we will also implement appropriate countermeasures if an incident should occur, including prevention of recurrence.