Information Security
Basic Policy
- 1. purpose of information security
-
Works Applications, Inc. and its group companies recognize that it is their social responsibility to protect their information assets from all threats, to ensure the necessary information security for this purpose, and to ensure the continuity and stability of their business activities. In order to realize this, we have established a basic policy for information security.
Employees within the scope of application shall understand the purpose of this policy, and shall familiarize themselves with and comply with the Information Security Basic Policy, rules, and procedures. - Definition of information security
-
Information security means maintaining the confidentiality, integrity, and availability of information.
- Goals of information security 4.
-
The information security objectives are to ensure the confidentiality, integrity, and availability of information assets, and in the event of an information security incident, to take appropriate measures to minimize the damage and prevent recurrence by promptly recovering from the incident.
- Scope of application
-
The scope of application shall be Works Applications, Inc. and its group companies, and shall cover the information assets handled in the businesses within the scope of application. In addition, all persons who handle the information assets shall be subject to the information security objectives.
In addition, the contractor shall enter into a contract with the contents complying with this basic policy and apply it. - Information security organizational structure 6.
-
An Information Security Committee shall be established for the purpose of implementing information security, and an Information Security Manager shall be appointed to be responsible for maintaining information security.
- (6) Implementation of risk assessment (7) Compliance with laws and regulations
-
Establishment and maintenance of the Information Security Management System (ISMS) shall be conducted in alignment with the organization's strategic risk management perspective.
Risk assessment is conducted based on the confidentiality, integrity, availability, threats, and vulnerabilities of information, and risk mitigation measures are taken to mitigate high risks. - Compliance with laws and regulations
-
All employees within the scope of this policy must comply with all laws and regulations related to information security.
- 8. education 9. business continuity management
-
The contents of this basic policy shall be made known to all applicable employees, and necessary training shall be provided on an ongoing basis to maintain information security.
- 9. business continuity management 10. audit and continuous improvement
-
Take measures to ensure business continuity in order to minimize business interruption due to disasters, breakdowns, etc.
- 10. audit and continuous improvement
-
Conduct internal audits periodically and as necessary to ensure that information security is being observed.
In addition to improvements through these audits, the company shall conduct reviews in response to changes in the environment, such as changes in information systems and new threats, and implement continuous improvements. - 11. penalties
-
Employees who violate the regulations on information security shall be subject to disciplinary action based on employment regulations or the application of penalties based on contracts.
January 6, 2025
Works Applications, Inc.
Representative Director and Chief Executive Officer
Osamu Hata
ISMS Certification
We obtained Information Security Management System (ISMS) certification in June 2012, as it is our social responsibility to protect our information assets from all possible threats and to ensure the continuous and stable operation of our business activities by working to ensure the necessary information security for this purpose.
| Organization Name | Works Applications, Inc. |
|---|---|
| Certification Registration Number | IS 584786 |
| Scope of Registration |
|
| Certification Criteria | ISO/IEC27001:2022 (JIS Q 27001:2023) |
| Initial Registration Date | June 5, 2012 |
| Expiry date | December 17, 2026 |
| Certification Body (Certification Number) | BSI Group Japan K.K. (ISR004) |
| Certification Mark |
IS 584786 - ISO/IEC 27001:2022 |
ISMS Cloud Security Certification
| Certification Registration Number | CLOUD 767659 |
|---|---|
| Scope of Registration | System operation and maintenance as a Cloud Service Provider for the provision of HUE Cloud Services (AC) and the use of Amazon Web Services, Microsoft Azure and Oracle Cloud Infrastructure as Cloud Service Customers ISMS Cloud Security Management System |
| Certification Criteria | JIP-ISMS517-1.0 |
| Initial Registration Date | September 10, 2022 |
| Certification Body (Certification Number) | BSI Group Japan K.K. (ISR004) |
| Certification Mark |
CLOUD 767659 - ISO/IEC 27017:2015 |
| Certification Registration Number | CLOUD 778841 |
|---|---|
| Scope of Registration | ISMS for system operation and maintenance as a cloud service provider for the provision of HUE Classic Cloud services, and for use as a cloud service customer for Amazon Web Services and Oracle Cloud Infrastructure Cloud Security Management System |
| Certification Criteria | JIP-ISMS517-1.0 |
| Initial Registration Date | September 10, 2022 |
| Certification Body (Certification Number) | BSI Group Japan K.K. (ISR004) |
| Certification Mark |
CLOUD 778841 - ISO/IEC 27017:2015 |
| Certification Registration Number | CLOUD 778843 |
|---|---|
| Scope of Registration | System operation and maintenance as a cloud service provider for the provision of HUE Works Suite Workflow, Project Board, Enterprise Spreadsheet, EBM, and Digital Invoice, and for use as a cloud service customer for Amazon Web Services and Oracle Cloud Infrastructure ISMS cloud security management system for use as a cloud service customer |
| Certification Criteria | JIP-ISMS517-1.0 |
| Initial Registration Date | September 10, 2022 |
| Certification Body (Certification Number) | BSI Group Japan K.K. (ISR004) |
| Certification Mark |
CLOUD 778843 - ISO/IEC 27017:2015 |