Approach to Information Security

Fundamental Principles of Information Security

GMO Internet, Inc. and its subsidiaries (as defined in Article 2, Paragraph 3 of the Companies Act) recognize the strict protection of customer information assets and business-related information assets as a social responsibility.

To fulfill this responsibility, we have established, implemented, reviewed, maintained, and continuously improved our internal Information Security Management System (ISMS).

Additionally, we comply with information security laws, national guidelines, and other applicable regulations.

We regard information security management as a key corporate activity and are committed to protecting information security in accordance with the following information security policies.

Basic Policy on Information Security

Purpose of Information Security

We aim to prevent information security incidents such as "data leakage," "alteration," and "theft" by appropriately implementing our Information Security Management System (ISMS).

Through this, we strive to build trust with our customers and society, which is the primary objective of our ISMS.

Compliance with Laws and Regulations

We comply with the Personal Information Protection Law, as well as all relevant laws, regulations, and contractual agreements related to information security.

Maintenance and Management System

We will establish a system to continuously implement and improve activities based on our basic policy, promoting the advancement of information security.

Education, Training, and Awareness in Information Security

We provide necessary education and training on information security to all executives and employees of our group (hereinafter collectively referred to as "officers, etc.").

By ensuring that each individual understands the importance of Information Security Management System (ISMS) activities, we strive to enhance information ethics and ensure thorough awareness of information security-related regulations.

Regular Review and Continuous Improvement

We regularly review our established Information Security Management System (ISMS) and strive for continuous improvement.

Information Security for Outsourced Contractors

We evaluate and supervise the eligibility of outsourced contractors from an information security perspective.

Additionally, we conduct regular assessments of their information security measures to ensure the protection of our information assets.

Response to Incidents and Security Breaches

We have established a contingency plan in advance to address incidents and security breaches.

In the event of an incident or security breach, the discoverer must immediately report the details to the responsible manager, who will then promptly notify relevant parties and take emergency measures if necessary, in accordance with the contingency plan and information security regulations.

Additionally, we will analyze the cause of the incident or breach and implement measures to prevent recurrence.

Measures for Violations

We will take disciplinary action in accordance with the "Employment Regulations" and "Reward and Punishment Regulations" if executives or employees violate information security-related regulations.

Established: January 1, 2025
GMO Internet, Inc.
Executive Vice President
Hirofumi Yamashita

This website contains machine translations and may not always be accurate. Please note that it may differ from the original Japanese text.