This site has limited support for your browser. We recommend switching to Edge, Chrome, Safari, or Firefox.

Cart 0

No more products available for purchase

Subtotal Free
Shipping, taxes, and discount codes are calculated at checkout

taffeta's approach to information security

taffetaの情報セキュリティーへの取組み

Here we introduce some of taffeta's efforts to strengthen information security.

Offices and factories

Security cameras <br>We monitor and manage entry and exit.

Electronic key lock <br>Access to the factory and office is via an electronic key lock, ensuring that only authorised staff can enter and exit, and this is also logged.

IT communication equipment

Anti-virus software <br>We have installed anti-virus software with constant monitoring function.

Business Wi-Fi equipment <br>We have installed Wi-Fi equipment with unauthorized access monitoring service.

Integrated Threat Management <br>We have implemented a comprehensive security system including antivirus, firewall, and web filtering.

Appropriate disposal of computers and other information devices
We dispose of HDDs and SSDs appropriately, for example by crushing them.

Documentation

Melting disposal <br>When disposing of documents containing customer information, all documents are melted down.

Important information documents <br>Kept in locked cabinets and safes.

Business Systems

Access Restrictions
In addition to ID and password, we have added two-step authentication and the ability to restrict access itself.
We control the access rights of staff depending on the importance of the data.

Data Protection <br>We do not manage data on local storage or USB memory sticks.

Control of installed software <br>Software is managed in a list and installation of software other than that permitted is prohibited.

Home page

JPRS certified <br>Communication between the browser and server is encrypted.
It proves that the legal existence of the website operator/organization has been verified.

Access Restriction <br>Administrators have the ability to restrict access itself rather than just ID and password.

Important Information <br>We have a system in place that does not retain any important information such as customer credit card information.

Email

Email data <br>We prevent email data from being saved on local storage, USB memory, etc.

Double check <br>This system allows the supervisor to instantly check the contents of the email before it is sent.

Email addresses <br>As a general rule, we do not issue email addresses to individual employees, and the system allows for centralized management of email information.

Employee training

Regular training <br>We regularly provide training on information security rules and how to use new systems and equipment.

Literacy education <br>We regularly provide information management literacy education.