COMPANY
Information Security Initiatives
ABOUT
The company's commitment to information security
To maintain and improve the security levels necessary for providing cloud and related services, we establish the following cloud service information security policy as a sub-policy under the Information Security Basic Policy stipulated in the ISMS. We continually implement various measures to meet the trust expectations of our customers.
POLICY
Information Security Basic Policy
Our company believes that enhancing not only the quality of our products and services but also the overall quality of our information security is essential for earning the satisfaction and trust of our customers. In conducting our system development business (system design, development, and related services) and system operation service business, we recognize that protecting the information assets entrusted to us by our customers, business partners, shareholders, employees, and all other stakeholders is a vital social responsibility. To fulfill this responsibility, we hereby establish and implement the following Information Security Policy.
-
01.Establishment of an Information Security Management FrameworkWe will establish an Information Security Committee and appoint dedicated personnel responsible for information security. In accordance with ISO/IEC 27001 and other relevant laws and guidelines, we will implement organizational, human, physical, and technical measures to ensure the confidentiality, integrity, and availability of information assets.
-
02.Compliance with Laws and RegulationsExecutives and all employees shall comply with information security–related laws and regulations, governmental guidelines, and internal rules. Any violation will be dealt with appropriately and strictly in accordance with company regulations.
-
03.Incident Response and Prevention of RecurrenceWe strive to prevent information security incidents. Should an incident (accident, failure, or threat) occur, we will promptly investigate the cause, take measures to prevent further damage, and implement thorough steps to prevent recurrence.
-
04.Education and TrainingTWe provide regular education and training to all employees to deepen their understanding of the latest security threats and to raise awareness of proper information handling practices.
-
05.Management of Outsourced ContractorsWhen outsourcing business operations, we will supervise and manage contractors to ensure they maintain a security level equivalent to that of our company.
-
06.Continuous ImprovementWe will regularly review this policy and our management framework based on information security risk assessments, taking into account changes in our business operations, organizational structure, technological advancements, and social circumstances. We are committed to promoting continuous improvement.
-
07.Responsibilities of ManagementExecutives will take the lead in implementing this policy and will assume responsibility for maintaining and enhancing the company’s information security management framework.
Established on December 1, 2023
Last Revised on January 1, 2026
Noriyoshi Komoda, Chief Executive Officer
ISMS
ISMS Information Security Management System
We have acquired ISMS to obtain third-party evaluations of its information security standards.
- Certification Authority
- IMJ Certification Body of Registration Center Inc.
- Certification Registration Number
- IR0186
- Applicable Standard
- JIS Q 27001:2023 (ISO/IEC 27001:2022)
- Scope of Application
-
①Development and research of musculoskeletal motion analysis systems.
②Development and providing of posture analysis systems.