Security Policyイメージ

Security Policy

Established: June 17, 2005
Last updated: July 1, 2022
JSS Inc.
Representative Director and Chairman Hiroki Shitori

At JSS Inc. (hereinafter referred to as JSS), we often handle confidential information from our customers in the course of providing comprehensive security services. Ensuring the security of this confidential information and other assets is not only a clause in our confidentiality agreements with customers but also our social responsibility. Additionally, it is a critical management issue for the survival of JSS.

To ensure information security at JSS, it is essential to implement technical safety measures. Equally important is for each executive and employee to fully recognize the importance of information security and act accordingly.

Based on this fundamental understanding, we hereby establish our "Information Security Policy" as a guideline for the complete realization of JSS's ISMS (Information Security Management System).

1. Definition of Information Security

Information security refers to maintaining the confidentiality, integrity, and availability of information.

  • Confidentiality: The characteristic of not allowing unauthorized individuals, entities (such as organizations, groups, computer systems), or processes to use or disclose information.
  • Integrity: The characteristic of maintaining accuracy and completeness.
  • Availability: The characteristic of being accessible and usable by authorized entities when required.

2. Compliance with Laws and Regulations

Adhere to laws and contractual obligations related to information security and confidentiality.

3. Information Security Education

To enhance awareness of information security, conduct regular information security education for all executives and employees. This education is integrated into the basic training during the on-the-job training as stipulated by the Security Services Act or conducted by unit affiliation at the same time.

4. Information Security Measures

Promote information security measures through the ISO Committee. The committee members are appointed by the executives.

5. Obligations of Executives and Employees

Executives and employees must comply with the MS Manual. Violations of the MS Manual will be subject to penalties as defined by the employment regulations.

6. Risk Assessment

Implement security measures based on risk assessment.

7. Review

Continuously improve the ISMS through management reviews and other means, revising the Information Security Policy and MS Manual as necessary.

That concludes.