System to Protect Personal Data
We have provided an easy-to-understand explanation of how TBS Group protects Personal Data.
TBS Group has established a system led by the Chief Privacy Officer (CPO), who is the director in charge of legal affairs, and is implementing the following initiatives.
- Periodic education and training within the Group
- Periodic surveys within the Group, followed by guidance for improvements
- Supervision of contractors
- Restrictions on the devices and electronic media that can be brought in, and appropriate access control
- Restrictions on the individuals responsible for handling data and the scope of data they can access
TBS Group Security
TBS Group has established a security system centered around TBS CSIRT, an organization designated by the Chief Technology Officer (CTO). It collaborates with the Information System Departments of group companies, JNN-affiliated broadcasters, and external security organizations.
Message from Susumu Okuda, CTO, TBS Group
TBS Group minimizes security risks by preparing for the threat of cyber attacks, thus ensuring the quality and reliability of our content.
We strive to become a company trusted by all, and we will grow into a content group that continues to create content and services loved by people worldwide under the brand message “Moments in Motion”.
Security Measures You Can Take Now
The following are some measures you can take to protect your personal information.
To Protect Your Personal Information: Information Leakage Countermeasures You Can Take Today and Trusted Security Certifications
With the advancement of the Internet, convenient IT services are increasing. At the same time, there are increasing threats to our personal information. This article will introduce measures ordinary users can take to protect their personal information and what trusted security certifications are available.
Information Leakage Measures You Can Start Today
Set Strong Passwords
Passwords should ideally be strong and difficult to guess, combining uppercase and lowercase letters, numbers, and special characters.
Additionally, if the same password is reused across multiple services, a compromised password on one service may lead to unauthorized logins on other services.
Setting Up Two-Step Authentication
Two-step verification (2FA) is a method that uses an additional means of authentication (e.g., a code sent via SMS) in combination with a password. This provides an extra layer of protection even if the password is compromised.
Preventing Phishing Scams
Check the sender’s email address before clicking on any links in the body of an email you receive. Emails from unfamiliar email addresses or asking for personal information are likely unreliable.
Restrictions on the Use of Location Information
Location information is used in maps, weather, and other apps to provide useful information by determining the user’s position, etc. On the other hand, there is a risk of tracking our behavioral patterns and invading our privacy. Therefore, it is important to avoid providing location information to unnecessary apps and to limit its use to only when necessary.
Restrictions on the Use of Cookies and Ad Identifiers (Ad IDs)
Web browsers use cookies to store login information and visit history for website users, making it easier to access the website on subsequent visits. Mobile device apps use ad identifiers to display advertisements tailored to users’ interests.
While both technologies are convenient, if you have concerns about collecting and tracking your personal information, you can reset or restrict the use of cookies and ad identifiers in your browser or app settings.
Trusted Security Certifications (Example)
Information Security Management System (ISMS) certification
ISMS certification is an international certification indicating that an organization is appropriately managing information security.
Organizations with this certification can be expected to protect and manage personal information properly.
PCI DSS
PCI DSS is an international security standard for protecting credit card transaction information.
Organizations meeting this standard can be expected to protect consumers’ credit card information properly.
The Internet has helped enrich our life styles, but we must also consider safety. It is important to implement measures against information leakage and use services with trusted security certifications to use the Internet with a sense of security.