The OSAKI Group takes precautions to minimise risks.

Basic policy

The basic policy shows a commitment to the continuous and stable development of the business by identifying and evaluating risks in advance and taking countermeasures.
Risk management identifies, evaluates and minimises latent risks in daily work operations, and crisis management is used to minimise the effect of disruptive and unexpected events and get back on track.

Guidelines

The following action guidelines have been established in line with the basic policy.
1. The highest priority is on ensuring the quality and safety of products and services. To that end, we strive to eliminate and mitigate factors that adversely affect all stakeholders.
2. We are a committed supplier of products and services that are widely used throughout society. We provide a stable supply of products and services.
3. Officers and employees obey laws, rules and regulations in a spirit of compliance, and act ethically based on their best judgment.

Process

Risk management is performed according to the following procedure.
1. Risk identification
i. Identify actual or potential risks in the operations of each department.
ii. Compliance, quality, environment, product liability, export and control committees each identifies actual and potential risks.
2. Risk analysis and evaluation
i. Each department and committee evaluates the impact and possibility of occurrence of each identified risk and creates a risk map.
ii. A company-wide risk map is created based on the risk maps submitted by each department and committee.
3. Response to risk
i. Take measures to avoid, reduce and control evaluated risks.
ii. Establish an emergency response plan when risks become apparent.

Information security management

Recognizing the importance of information assets, the OSAKI Group considers it has a social obligation to protect information.
The energy management department has an information security management system (ISMS) to protect customer and corporate information assets from tampering, leakage and loss, and to quickly provide required information. If an information security incident does occur, the damage can be contained, recovery is quick and recurrence prevented. In 2017 the ISMS received ISO/IEC 27001 certification. The system ensures the confidentiality, integrity and availability of important information assets and their continued effectiveness.