Approach to Information Security
SECURITY
Approach to Information Security
We have obtained ISO/IEC 27001:2013 and JIS Q 27001:2014 certifications, which are information security management system (ISMS) standards.
We recognize the importance of information security in our business strategy of “efficiently incorporating the latest IT in the ICT industry, providing optimal solutions to our customers, and improving customer satisfaction,” and we are committed to protecting the information assets we own, manage, and operate from theft, alteration, destruction, leakage, and unauthorized access. In order to protect our information assets from theft, falsification, destruction, leakage, unauthorized access, etc., we understand our internal issues as well as the needs and expectations of our customers, and strive to prevent security incidents and accidents and take ongoing measures to ensure information security.

1. establishment of information security system
We shall organize a system of information security management system led by the executive officers, and shall make efforts to maintain and improve information security. In addition, we shall establish a system to periodically audit these efforts and strive for improvement.
2. maintenance of internal regulations concerning information security
We will establish internal rules based on the Information Security Policy, clearly state our policy on the handling of not only confidential and personal information but also information assets in general, and make it known internally and externally that we will take a strict attitude toward information leaks.
3. protection of information assets
We recognize the importance of all information assets in our possession from the perspective of confidentiality, integrity, and availability, and assess the risk of threats and vulnerabilities, and work to protect information assets appropriately under our information security system.
4. implementation of information security education and training
We will actively educate and continue to educate all directors and employees to improve their information security efforts and awareness.
5. response to security incidents and accidents
In the event of a security incident or accident, or any signs of such an incident or accident, we will work to ensure that prompt action and procedures are taken.
6. compliance with laws, regulations and norms
We strive to comply with all laws, regulations, other codes, and contractual requirements applicable to the information security that we undertake.
7. review and improvement
We will continuously review and improve this policy in accordance with changes in management policies, business activities, social changes, technological changes, and changes in laws and regulations.
Revised July 1, 2014
Technos Japan Inc.
President and Representative Director
Takashi Yoshioka
Handling of Personal Information
Please click here to learn more about our privacy policy.