Established on January 1, 2023
i Cubed Systems, Inc.
Tsutomu Sasaki, President and CEO
i Cubed Systems, Inc. (the “Company”/ “we”) will contribute to customers through provision of mobile device management services, etc. We will respond to the trust of our customers and other stakeholders by protecting the information assets we possess in the course of business from all threats and by taking appropriate management measures at all times. For that purpose, we have established the “Information Security Policy” as follows, and implement safe and appropriate information security activities, while continuously improving activities overall.
- Definition of information security
We define information security as maintaining and improving the confidentiality, integrity and availability of information assets.
- Risk assessment
We will identify the information security-related risks that can be anticipated when handling the information assets we possess, according to the procedures stipulated in our internal regulations. After analyzing and evaluating the causes of the identified risks and determining the optimal countermeasures, we will develop and implement operational handling procedures. Through the implementation of risk measures, we will reduce the risks identified to below the Company's risk tolerance level. These risk response processes include the implementation of necessary controls to protect the information assets entrusted to us by our customers.
- Compliance with laws and contractual security obligations
In operating the information security management system, the Company complies with laws and regulations related to information security, as well as requests from stakeholders, including requests for protection of confidential information and intellectual property rights, thus fulfilling our social responsibilities through proper information security management.
- Information security education and training
The Company will make all employees who are engaged in business aware of the importance of information security, thoroughly familiarize them with the proper use of information assets, and provide necessary education and training.
- Audit
The Company will periodically audit the operational status of the information security management system and take improvement measures as necessary to ensure information security.
- Information security incidents
At the Company, each employee strives to prevent information security incidents from occurring. In addition, we will acquire and protect the necessary backups in preparation for occurrence of incidents, and should any incident occur, we will take corrective action to minimize the impact by investigating the cause and responding promptly.
- Management of outsourcees and cloud services
In providing various services to the customers, the Company may use outsourcees or cloud services. We will limit the outsourcees and cloud services that we use to those that meet the management measures and security standards set by us, and we will strictly manage data.