Information Security Policy

FRONTEO Inc. has acquired ISO27001 certification. ISO27001 is an international standard for information security management systems (ISMS).

ISO27001 certification


Organization name FRONTEO Inc.
Registered organization FRONTEO Inc.
PCF FRONTEO Inc.
First registration date 2009th of February 3
Applicable standards JIS Q 27001: 2014 (ISO / IEC 27001: 2013)
Registration range Legal Tech AI Business

 ・ Support for eDiscovery / Compliance
 ・ Forensics and training services
 ・ Information security diagnosis and consulting services
 ・ Forensic tool / software sales and agency business

AI solution business

 ・ Sales and operation support of business data analysis system
 ・ Digital curation service
 ・ Communication robot development / sales / service provision
 ・ Other digital marketing related businesses
 ・ Healthcare business

Certification body Better Living System Examination Registration Center
Registration number
          

IS207

We have established the information security policy as follows, operate and maintain the information security management system based on ISO27001, and safely and securely keep the valuable information assets of our customers, and work to strengthen and maintain the security. I will come.

Information Security Policy

FRONTEO Inc. handles data that requires high confidentiality from customers and provides services that require high integrity and availability.
We recognize that protecting all information assets, including confidential information entrusted to us by our customers, is an important management issue for maintaining and expanding our business activities.
Based on this idea, we have established an "Information Security Policy" and declared that we will implement and promote it in order to actively work on the establishment, introduction, operation, monitoring, review, maintenance and improvement of information security management systems. To do.

  1. We will educate all employees and recognize that it is an important social responsibility to handle information assets appropriately and act accordingly.
  2. We will comply with information security laws and regulations such as information security rules, contractual security obligations, and personal information protection laws.
  3. By continuously analyzing and evaluating risks regarding threats and vulnerabilities to information assets, we will realize an appropriate management system according to the purpose and importance of information assets.
  4. In order to protect the information system, we will implement appropriate security measures based on risk analysis and evaluation.
  5. We will endeavor to maintain the availability of information systems in order to prevent outages of the services we provide.
  6. In the unlikely event that an information security accident occurs, we will promptly handle it to prevent the damage from spreading and strive to prevent recurrence.
  7. We will ensure business continuity by minimizing business interruptions due to serious information system failures and disasters.
  8. We will take strict measures in accordance with our internal rules for our employees who have violated our information security policy and related rules.
ja 日本語
Machine Translation by Google. : close x