{"id":3712,"date":"2024-04-11T12:35:49","date_gmt":"2024-04-11T03:35:49","guid":{"rendered":"https:\/\/uism.co.jp\/?page_id=3712"},"modified":"2026-03-21T20:18:58","modified_gmt":"2026-03-21T11:18:58","slug":"information-security-policy_en","status":"publish","type":"page","link":"https:\/\/uism.co.jp\/en\/information-security-policy_en\/","title":{"rendered":"INFORMATION SECURITY POLICY_en"},"content":{"rendered":"\n<div class=\"wp-block-snow-monkey-blocks-section smb-section smb-section--left smb-section--fit is-style-smb-section-undecorated-title tertiary_page_title\"><div class=\"smb-section__inner is-content-justification-center\"><div class=\"c-container\"><div class=\"smb-section__contents-wrapper smb-section__contents-wrapper--left\"><div class=\"smb-section__body is-layout-constrained wp-block-snow-monkey-blocks-section-is-layout-constrained\">\n<div class=\"wp-block-snow-monkey-blocks-section smb-section smb-section--fit is-style-smb-section-undecorated-title\" style=\"--smb-section--contents-wrapper-width:1000px\"><div class=\"smb-section__inner\"><div class=\"c-container\"><div class=\"smb-section__contents-wrapper\"><div class=\"smb-section__header\"><h1 class=\"smb-section__title\"><span style=\"color: #4c9f87\" class=\"sme-text-color\"><br>INFORMATION SECURITY POLICY<\/span><\/h1><\/div><div class=\"smb-section__body is-layout-constrained wp-block-snow-monkey-blocks-section-is-layout-constrained\">\n<p>In today\u2019s world where all information is connected to the Internet, Uism KK aims to protect the valuable information assets entrusted to us by our customers from threat of accident, crime, or disaster, and maintain the trust of our customers based on the following policy:<\/p>\n\n\n\n<h2 class=\"wp-block-heading is-style-plain\">1.<strong>Responsibility and Organizational Structure<\/strong><\/h2>\n\n\n\n<p>We will establish a management structure within the company so that all employees can work to maintain information security, under the direction of the Information Security Management Officer and with top management leadership, and set it as a formal rule within the company through the formulation and operation of information security policies and regulations. We will also establish rules and guidelines for handling information to ensure the confidentiality, integrity, and availability of information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading is-style-plain\">2.<strong>Maintenance of Information Security<\/strong><\/h2>\n\n\n\n<p>Maintenance of Information Security<\/p>\n\n\n\n<p>We will strive for continuous improvement to maintain and improve information security within the company in response to constantly changing threats. We will limit access to information to the necessary minimum range and establish restrictions based on authentication and approval. We establish objectives for our management system and information security, review them periodically, and continuously implement improvements in order to maintain them. We delegate responsibility and authority to management representatives to execute, maintain, and improve the management system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading is-style-plain\">3.<strong>&nbsp;Employee Efforts<\/strong><\/h2>\n\n\n\n<p>Our employees will acquire the necessary knowledge and skills to maintain information security and make sure to take measures for information security. We will conduct education and training on information security for all employees and work on raising security awareness.All employees will perform their duties in accordance with the prescribed manuals.\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading is-style-plain\">4.<strong>Compliance with Laws and Contractual Obligations<\/strong><\/h2>\n\n\n\n<p>We will comply with laws, regulations, norms, and contractual obligations related to information security and prevent information security incidents in advance to carry out business at a high level.<\/p>\n\n\n\n<h2 class=\"wp-block-heading is-style-plain\">5.<strong>Response to Violations and Accidents<\/strong><\/h2>\n\n\n\n<p>In the event of a violation of laws or contracts related to information security or an incident that puts information security at risk, we will promptly and appropriately address the situation to prevent further damage, report and explain to relevant organizations, and strive to prevent recurrence.<\/p>\n\n\n\n<p class=\"has-sm-s-font-size\">Final Revision Date: 12.March.2024<\/p>\n\n\n\n<p class=\"has-sm-s-font-size\">Uism K.K.<br>\u3012151-0053<br>5F BizSmart, 1-25-5 Yoyogi, Shibuya-ku,Tokyo,Japan, 151-0053 Japan<br>Chief Executive Officer: Yuki Asakawa<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/blank-content.php","meta":{"_locale":"en_US","_original_post":"https:\/\/uism.co.jp\/?page_id=3708","footnotes":"","wp-seo-meta-description":"","wp-seo-meta-robots":[]},"class_list":{"0":"post-3712","1":"page","2":"type-page","3":"status-publish","5":"en-US","6":"c-entry"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/pages\/3712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/comments?post=3712"}],"version-history":[{"count":10,"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/pages\/3712\/revisions"}],"predecessor-version":[{"id":8080,"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/pages\/3712\/revisions\/8080"}],"wp:attachment":[{"href":"https:\/\/uism.co.jp\/wp-json\/wp\/v2\/media?parent=3712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}