{"id":228,"date":"2021-05-22T01:30:24","date_gmt":"2021-05-21T16:30:24","guid":{"rendered":"https:\/\/tmp-prod.tecnos.co.jp\/wordpress\/?page_id=228"},"modified":"2022-11-08T09:50:55","modified_gmt":"2022-11-08T00:50:55","slug":"security","status":"publish","type":"page","link":"https:\/\/www.tecnos.co.jp\/en\/security\/","title":{"rendered":"Approach to Information Security"},"content":{"rendered":"<div class=\"inner privacy security\">\n<section>\n<h2 class=\"style2a\" style=\"border-color: #82132f;\">Approach to Information Security<\/h2>\n<p>We have obtained ISO\/IEC 27001:2013 and JIS Q 27001:2014 certifications, which are information security management system (ISMS) standards.<br \/>\nWe recognize the importance of information security in our business strategy of &#8220;efficiently incorporating the latest IT in the ICT industry, providing optimal solutions to our customers, and improving customer satisfaction,&#8221; and we are committed to protecting the information assets we own, manage, and operate from theft, alteration, destruction, leakage, and unauthorized access. In order to protect our information assets from theft, falsification, destruction, leakage, unauthorized access, etc., we understand our internal issues as well as the needs and expectations of our customers, and strive to prevent security incidents and accidents and take ongoing measures to ensure information security.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/www.tecnos.co.jp\/en\/wordpress\/wp-content\/themes\/nano_tcd065\/assets\/img\/\/isms4.gif\" alt=\"Information system solution services that provide a series of services ranging from information system consulting to planning, development, and maintenance\" \/><figcaption>Information system solution services that provide a series of services ranging from information system consulting to planning, development, and maintenance<\/figcaption><\/figure>\n<section>\n<h5>1. establishment of information security system<\/h5>\n<p>We shall organize a system of information security management system led by the executive officers, and shall make efforts to maintain and improve information security. In addition, we shall establish a system to periodically audit these efforts and strive for improvement.<\/p>\n<\/section>\n<section>\n<h5>2. maintenance of internal regulations concerning information security<\/h5>\n<p>We will establish internal rules based on the Information Security Policy, clearly state our policy on the handling of not only confidential and personal information but also information assets in general, and make it known internally and externally that we will take a strict attitude toward information leaks.<\/p>\n<\/section>\n<section>\n<h5>3. protection of information assets<\/h5>\n<p>We recognize the importance of all information assets in our possession from the perspective of confidentiality, integrity, and availability, and assess the risk of threats and vulnerabilities, and work to protect information assets appropriately under our information security system.<\/p>\n<\/section>\n<section>\n<h5>4. implementation of information security education and training<\/h5>\n<p>We will actively educate and continue to educate all directors and employees to improve their information security efforts and awareness.<\/p>\n<\/section>\n<section>\n<h5>5. response to security incidents and accidents<\/h5>\n<p>In the event of a security incident or accident, or any signs of such an incident or accident, we will work to ensure that prompt action and procedures are taken.<\/p>\n<\/section>\n<section>\n<h5>6. compliance with laws, regulations and norms<\/h5>\n<p>We strive to comply with all laws, regulations, other codes, and contractual requirements applicable to the information security that we undertake.<\/p>\n<\/section>\n<section>\n<h5>7. review and improvement<\/h5>\n<p>We will continuously review and improve this policy in accordance with changes in management policies, business activities, social changes, technological changes, and changes in laws and regulations.<\/p>\n<\/section>\n<p class=\"right\">Revised July 1, 2014<br \/>\nTechnos Japan Inc.<br \/>\nPresident and Representative Director<br \/>\nTakashi Yoshioka<\/p>\n<\/section>\n<section>\n<h2 class=\"style2a\" style=\"border-color: #82132f;\"><strong>Handling of Personal Information<\/strong><\/h2>\n<p>Please <a href=\"\/privacy\">click here<\/a> to learn more about our privacy policy.<\/p>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"Approach to Information Security We have obtained ISO\/IEC 27001:2013 and JIS Q 27001:2014 certifications, whic...","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":27,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/pages\/228"}],"collection":[{"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":16,"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/pages\/228\/revisions"}],"predecessor-version":[{"id":2121,"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/pages\/228\/revisions\/2121"}],"wp:attachment":[{"href":"https:\/\/www.tecnos.co.jp\/en\/wp-json\/wp\/v2\/media?parent=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}