Here we introduce some of taffeta's efforts to strengthen information security.
Offices and factories
Security cameras <br>We monitor and manage entry and exit.
Electronic key lock <br>Access to the factory and office is via an electronic key lock, ensuring that only authorised staff can enter and exit, and this is also logged.
IT communication equipment
Anti-virus software <br>We have installed anti-virus software with constant monitoring function.
Business Wi-Fi equipment <br>We have installed Wi-Fi equipment with unauthorized access monitoring service.
Integrated Threat Management <br>We have implemented a comprehensive security system including antivirus, firewall, and web filtering.
Appropriate disposal of computers and other information devices
We dispose of HDDs and SSDs appropriately, for example by crushing them.
Documentation
Melting disposal <br>When disposing of documents containing customer information, all documents are melted down.
Important information documents <br>Kept in locked cabinets and safes.
Business Systems
Access Restrictions
In addition to ID and password, we have added two-step authentication and the ability to restrict access itself.
We control the access rights of staff depending on the importance of the data.
Data Protection <br>We do not manage data on local storage or USB memory sticks.
Control of installed software <br>Software is managed in a list and installation of software other than that permitted is prohibited.
Home page
JPRS certified <br>Communication between the browser and server is encrypted.
It proves that the legal existence of the website operator/organization has been verified.
Access Restriction <br>Administrators have the ability to restrict access itself rather than just ID and password.
Important Information <br>We have a system in place that does not retain any important information such as customer credit card information.

Email data <br>We prevent email data from being saved on local storage, USB memory, etc.
Double check <br>This system allows the supervisor to instantly check the contents of the email before it is sent.
Email addresses <br>As a general rule, we do not issue email addresses to individual employees, and the system allows for centralized management of email information.
Employee training
Regular training <br>We regularly provide training on information security rules and how to use new systems and equipment.
Literacy education <br>We regularly provide information management literacy education.