Security Policy
Fundamental Principles
In order to deliver on our core value, Build the Trust, we recognize the importance of information and data and the serious social responsibility to prevent accidents involving information and data. We will strive to ensure the appropriate management and protection of information assets and establish and implement a system (ISMS) to ensure information security. In addition, we will continuously improve our information security by paying attention to customer needs and the latest trends in information technology.
In order to respond to the information security needs associated with the spread of cloud services, we declare that we, as a business operator, will develop and systematically improve our cloud information security measures, as well as security measures concerning our employees who are engaged in the stable operation of our cloud services. We will also develop rules and procedures for information security in order to provide domestic and overseas users with safe access to our cloud services.
Fundamental Policies
-
1.
Protection of information assets
To protect information assets, WingArc1st will develop an information security policy and act in accordance with it. WingArc1st will also comply with laws, regulations and other norms related to information security, as well as with contracts with customers. -
2.
Regular review of information security measures to protect information assets
WingArc1st will conduct regular risk assessments, as well as analyze the potential risks of leakage, damage, or loss of information assets, clarify its standards of risk evaluation, and establish a systematic risk assessment method. Based on the results of these assessments, WingArc1st will implement the necessary and appropriate information security measures. -
3.
Appropriate handling of information assets
WingArc1st will establish an information security system centered on its designated directors and will clarify the authority and responsibilities related to information security. In addition, WingArc1st will provide regular education, training, and awareness programs to ensure that all employees are aware of the importance of information security and how to handle information assets appropriately. -
4.
Regular review of manuals and procedures for the proper handling of information assets
WingArc1st will regularly inspect and audit the status of its compliance with information security policies and its handling of information assets and will take prompt corrective action should it find any deficiencies or areas for improvement. -
5.
Prevention of damage
Should any event or incident relating to information security occur, WingArc1st will take immediate action to prevent potential damage. In the unlikely event that damage does occur, WingArc1st will have response procedures established in advance to minimize the damage, and in the event of an emergency, WingArc1st will respond promptly and take the proper corrective measures. In addition, WingArc1st will conduct recovery tests and reviews of incidents related to the interruption of our Services. - 6. WingArc1st will address requirements arising from the anticipated threat environment to our information assets.
- 7. WingArc1st will impose penalties for any violation of the rules and regulations concerning information security management, and exceptions will be handled at the discretion of the ISMS top management.
-
8.
Establishment of an information security management system
To achieve the fundamental principles of the policy, WingArc1st will establish, implement, and continuously review and improve an information security management system, cloud-specific risk measures, and personal information protection measures on the cloud.
12 January 2023
Jun Tanaka
President, Executive Officer and CEO
WingArc1st Inc.
About the Information Security Management System (ISMS)
Obtained ISO27001, ISO27017, and ISO27018 certifications
Information Security Management System
Outline of certification
Certification Standard | ISO/IEC27001:2013 (JIS Q 27001:2014) |
---|---|
Certification Number | JUSE-IR-507 |
Scope of Certificate Registration |
|
Initial Registration Date | 26 July 2018 |
Examining Authority | Union of Japanese Scientists and Engineers |
Certification Body | ISMS Accreditation Center (ISMS-AC) |
Certificate | Download PDF certificate of ISO/IEC 27001:2013 |
ISMS Cloud Security
Outline of certification
Certification Standard | JIP-ISMS517-1.0 (ISO/IEC27017:2015, JIS Q 27017:2016) |
---|---|
Certification Number | JUSE-IR-507-CS01 |
Scope of Certificate |
The development, operation, maintenance and provision of Business Intelligence cloud services, form cloud services, OCR / document management / data utilization cloud services, and Salesforce data bulk editing cloud services. ISMS-CS Type / Service name: Cloud service provider /MotionBoard Cloud, MotionBoard Cloud for Salesforce, SVF Cloud, SVF Cloud for Salesforce, and invoiceAgent Cloud service customer / Amazon Web Service and Salesforce |
Initial Registration Date | 26 July 2018 |
Examining Authority | Union of Japanese Scientists and Engineers |
Certification Body | ISMS Accreditation Center (ISMS-AC) |
Certificate | Download PDF certificate of ISO/IEC27017:2015 |
Personal Information Protection Measures in the Cloud
Outline of certification
Certification Standard | JUSE-IS27018:2023 |
---|---|
Certification Number | JUSE-IR-507-CP01 |
Scope of Certificate Registration | The development, operation, maintenance and provision of Business Intelligence cloud services, form cloud services, OCR / document management / data utilization cloud services, and Salesforce data bulk editing cloud services. |
Initial Registration Date | 26 July 2018 |
Examining Authority | Union of Japanese Scientists and Engineers |
Certificate | Download PDF certificate of JUSE-IS27018:2023 |