AIST REPORT 2012
37/66
Implementation of Conflict of Interest ManagementFair Operating PracticesInformation SecurityIf, in performing their duties, staff members of AIST are deemed to give precedence to their personal interests or external activities, regardless of whether or not it is true, people may doubt the integrity of researchers or suspect that there is a bias in research results, and research and industry-academia-government collaboration activities at AIST will be compromised. We have formulated regulations for the implementation of conflict of interest management and implemented the management in cases where staff had personal interests in companies participating in industry-academia-government collaboration activities.In FY2011, we implemented self-reporting of conflict of interest twice (the first half; August, the second half: February) on the staff. Reports were received from 3,168 staff members in the first half and from 3,150 staff members in the second half, and eight staff members who might have a conflict of interest were interviewed by an external conflict of interest counselor. The results of the interviews identified no conflict of interest issues. However, we called attention to conflict of interest from those with personal interests in the companies involved to prevent them from getting involved in a conflict of interest.Number of participants in information security training Group trainingWeb-based trainingCD-ROM-based trainingFace-to-face training in unitsTotal no. of participants1,033(22 sessions)24815511,3471,178(22 sessions)34437501,6091,857(22 sessions)4,432(Abolished in FY 2010)1126,401329(3 sessions)5,745ー856,159FY2008FY2009FY2010FY2011Conflict of Interest and Appropriate ProcurementFair Operating PracticesInformation security training is provided on an ongoing basis for all AIST network users to deepen their understanding of the information security policy and follow the policy properly with awareness and responsibility.● Information security trainingTo maintain and increase awareness of information security, we have made it mandatory for all AIST network users as well as new staff members to take information security training more than once a year. In FY2011, we worked to increase the percentage of those who take web-based training.● Implementation of self-checksBoth training and self-checks are important to ensure AIST’s information security. Self-checks of information security measures and personal information protection are implemented in an integrated manner. In FY2011, we set a self-check period and requested, via the information managers, all network users to conduct a self-check. As a result, the self-check rate dramatically increased from slightly less than 10% in the previous fiscal year to 93%. Thus, the self-check further increased awareness of information security, including handling of personal information.● Implementation of an information security auditAn information security audit of research units is performed to determine whether the information system is properly operated and maintained in accordance with the information security policy. In FY2011, we performed a security audit of 31 units and an audit of three units on improvements in the issues identified in the previous fiscal year, and strengthened information security at AIST as a whole based on a PDCA cycle. We will perform a security audit and a security check audit systematically from the coming fiscal year onward.Fair Operating Practices|35
元のページ