Security policy
Information Security Policy
Enacted January 1, 2023
i Cubed, Inc.
Tsutomu Sasaki, President and CEO
i Cubed Systems, Inc. (hereinafter “the Company”) will serve our customers through the provision of mobile device management services and other related solutions.
The Company will protect the information assets we retain in the course of conducting our business from all threats and consistently implement appropriate administrative measures to uphold the trust placed in us by our customers and other stakeholders.
To this end, we have established the following “Information Security Policy” to ensure the safe and proper implementation of information security activities and the continuous improvement of these activities.
Definition of information security
The Company defines information security as maintaining and improving the confidentiality, integrity, and availability of information assets.
Risk assessment
The Company will identify foreseeable information security risks associated with the handling of information assets we retain in accordance with procedures established within our internal regulations.
We analyze and evaluate the causes of identified risks, determine optimal countermeasures, and then establish and implement corresponding operational procedures.
By implementing risk countermeasures, we will reduce identified risks to levels acceptable to the Company.
This risk countermeasure process includes implementing the necessary safeguards to protect information assets entrusted to us by our customers.
Compliance with laws and contractual security obligations
In the operation of our information security management system, the Company will comply with applicable laws and regulations concerning information security, as well as stakeholder requirements such as protecting confidential information and intellectual property rights.
Through these measures, we will uphold our social responsibilities.
Information security education and training
The Company will ensure that all employees engaged in business operations recognize the importance of information security, thoroughly communicate the necessary guidelines for the proper use of information assets, and provide the required education and training to achieve those ends.
Audit
The Company will regularly audit the operational status of its information security management system and implement improvements as necessary to ensure information security.
Information security incidents
The Company will ensure that each employee strives to prevent information security incidents.
Furthermore, we will obtain and secure necessary backups in preparation for any such incidents.
Should an incident occur, we will investigate the cause and promptly implement corrective measures to minimize its impact.
Management of outsourcees and cloud services
In providing various services to the customers, the Company may use outsourced contractors or cloud services.
We will strictly manage data and limit external contractors and cloud service providers to those that meet our specified management strategies and security standards.
Search the entire site by keyword