Approach to Information Security

SECURITY

Approach to Information Security

We have obtained ISO/IEC 27001:2013 and JIS Q 27001:2014 certifications, which are information security management system (ISMS) standards.
We recognize the importance of information security in our business strategy of “efficiently incorporating the latest IT in the ICT industry, providing optimal solutions to our customers, and improving customer satisfaction,” and we are committed to protecting the information assets we own, manage, and operate from theft, alteration, destruction, leakage, and unauthorized access. In order to protect our information assets from theft, falsification, destruction, leakage, unauthorized access, etc., we understand our internal issues as well as the needs and expectations of our customers, and strive to prevent security incidents and accidents and take ongoing measures to ensure information security.

Information system solution services that provide a series of services ranging from information system consulting to planning, development, and maintenance
Information system solution services that provide a series of services ranging from information system consulting to planning, development, and maintenance
1. establishment of information security system

We shall organize a system of information security management system led by the executive officers, and shall make efforts to maintain and improve information security. In addition, we shall establish a system to periodically audit these efforts and strive for improvement.

2. maintenance of internal regulations concerning information security

We will establish internal rules based on the Information Security Policy, clearly state our policy on the handling of not only confidential and personal information but also information assets in general, and make it known internally and externally that we will take a strict attitude toward information leaks.

3. protection of information assets

We recognize the importance of all information assets in our possession from the perspective of confidentiality, integrity, and availability, and assess the risk of threats and vulnerabilities, and work to protect information assets appropriately under our information security system.

4. implementation of information security education and training

We will actively educate and continue to educate all directors and employees to improve their information security efforts and awareness.

5. response to security incidents and accidents

In the event of a security incident or accident, or any signs of such an incident or accident, we will work to ensure that prompt action and procedures are taken.

6. compliance with laws, regulations and norms

We strive to comply with all laws, regulations, other codes, and contractual requirements applicable to the information security that we undertake.

7. review and improvement

We will continuously review and improve this policy in accordance with changes in management policies, business activities, social changes, technological changes, and changes in laws and regulations.

Revised July 1, 2014
Technos Japan Inc.
President and Representative Director
Takashi Yoshioka

Handling of Personal Information

Please click here to learn more about our privacy policy.