Top Policy on Information Security
Since our founding in 1996, we have been providing our customers with security measures via information systems.
Our business is roughly divided into systems security, which prevents external attacks on network systems, and human security, which prevents information leakage from inside a company.
As a group specialized in information security, we provide these two professional solutions to our customers. We are always striving to improve the quality of our services.
Accordingly, our business is founded on the trust of our customers.
An incident such as information leakage that compromises our customer's credibility could have a severe effect on the continuity of our business.
To prevent such incidents, we work as a united group to manage information risk, inform each employee about information security, and strive to secure the trust of our customers.
To this end, we declare that we will implement the following specific measures.
- We will build an information security management system ("ISMS") that complies with the certification standards of ISO / IEC27001: 2013, which is an international information management framework.
- The scope of ISMS applies to anyone who uses our information assets, including management and employees.
- Our ISMS will include an information security committee under the direction of an information security manager.
- We will rectify any defects or violations related to our ISMS upon discovery.
March 30, 2020