Fundamental Principles of Information Security
GMO Internet, Inc. and its subsidiaries (as defined in Article 2, Paragraph 3 of the Companies Act) recognize the strict protection of customer information assets and business-related information assets as a social responsibility.
To fulfill this responsibility, we have established, implemented, reviewed, maintained, and continuously improved our internal Information Security Management System (ISMS).
Additionally, we comply with information security laws, national guidelines, and other applicable regulations.
We regard information security management as a key corporate activity and are committed to protecting information security in accordance with the following information security policies.
Basic Policy on Information Security
Purpose of Information Security
We aim to prevent information security incidents such as "data leakage," "alteration," and "theft" by appropriately implementing our Information Security Management System (ISMS).
Through this, we strive to build trust with our customers and society, which is the primary objective of our ISMS.
Compliance with Laws and Regulations
We comply with the Personal Information Protection Law, as well as all relevant laws, regulations, and contractual agreements related to information security.
Maintenance and Management System
We will establish a system to continuously implement and improve activities based on our basic policy, promoting the advancement of information security.
Education, Training, and Awareness in Information Security
We provide necessary education and training on information security to all executives and employees of our group (hereinafter collectively referred to as "officers, etc.").
By ensuring that each individual understands the importance of Information Security Management System (ISMS) activities, we strive to enhance information ethics and ensure thorough awareness of information security-related regulations.
Regular Review and Continuous Improvement
We regularly review our established Information Security Management System (ISMS) and strive for continuous improvement.
Information Security for Outsourced Contractors
We evaluate and supervise the eligibility of outsourced contractors from an information security perspective.
Additionally, we conduct regular assessments of their information security measures to ensure the protection of our information assets.
Response to Incidents and Security Breaches
We have established a contingency plan in advance to address incidents and security breaches.
In the event of an incident or security breach, the discoverer must immediately report the details to the responsible manager, who will then promptly notify relevant parties and take emergency measures if necessary, in accordance with the contingency plan and information security regulations.
Additionally, we will analyze the cause of the incident or breach and implement measures to prevent recurrence.Measures for Violations
We will take disciplinary action in accordance with the "Employment Regulations" and "Reward and Punishment Regulations" if executives or employees violate information security-related regulations.
Established: January 1, 2025
GMO Internet, Inc.
Executive Vice President
Hirofumi Yamashita