Information Security Program
FUJIFILM Holdings America Corporation and its subsidiaries (Fujifilm) maintain an information security program containing administrative, technical and physical safeguards to protect and manage the security, confidentiality, and integrity of customer and corporate information and the systems on which such data resides.
Fujifilm's information security program is designed and based on the International Organization for Standardization 27001 specification for information management security systems.
Fujifilm takes the security of data it retains seriously. We are committed to safeguarding it and protecting against unauthorized access to, or use of, our information assets and any other anticipated threats or hazards to the security and integrity of such assets.
If you have any questions, or comments regarding our information security program, or access to your data, please contact us at:
In addition to maintaining our information security program, Fujifilm seeks to increase awareness of various cyber-security and fraud threats, such as attempted malware intrusions and wire phishing and financial scams, within its own businesses and with its business partners. By remaining vigilant, together we can help prevent these threats. Below please find some general safeguards recommended to reduce cyber-security and fraud threats.
With regards to cybersecurity threats, security experts universally recommend that you do not reply to, open suspect attachments to, or click on links or call phone numbers provided in suspicious messages. The FBI has made additional information available here: https://www.ic3.gov/media/2016/160614.aspx
With regards to wire phishing and financial scams:
- Implement procedures for dual approval and sign offs for outbound wire transfers.
- Educate employees or other workers who handle wire transfers to inspect the full domain name following the "@" symbol in the sender’s email address to assure that it perfectly matches the known and expected company domain (e.g., @fujifilm.com).
- Be wary of sudden changes in business practices. For example, if a current business contact suddenly asks to be contacted via a different email address or for payment to be sent to a different account or via a different method. Always verify via other channels that you are still communicating with your legitimate business contact.
- Follow-up with a phone call to your business contact to confirm the validity of any changes to payment instructions, especially wire transfer instructions and in particular if the beneficiary is anyone other than a Fujifilm company. If payment or the beneficiary is for an individual, consider the change suspicious and you should confirm the change with your business contact.
- When using phone verification as part of two-factor authentication, use known familiar numbers, not the details provided in the email requests.
- Check the body of the email and consider whether the message is written in your business contact’s style. Look for anomalies, such as odd misspellings, poor English, awkward phrases or an unusual tone.
- Monitor financial activity closely.
Together we can protect against these security threats.
Copyright © 2018 FUJIFILM North America Corporation. All rights reserved.