{"id":295,"date":"2018-11-28T16:07:54","date_gmt":"2018-11-28T07:07:54","guid":{"rendered":"https:\/\/prime-as.co.jp\/en\/?page_id=295"},"modified":"2022-09-20T11:41:43","modified_gmt":"2022-09-20T02:41:43","slug":"security","status":"publish","type":"page","link":"https:\/\/prime-as.co.jp\/en\/company-info\/security\/","title":{"rendered":"Information Security Countermeasures"},"content":{"rendered":"<div class=\"wp-frame\">\n<h2 class=\"title\">Information Security Countermeasures<\/h2>\n<hr class=\"color1\" \/>\n<h6>Initiatives for ISO 27001 (Information Security Management Systems)<\/h6>\n<p>&nbsp;<\/p>\n<p>To earn customers\u2019 trust, Prime Assistance Inc. raises the level of information security awareness in each and every individual employee and regards the protection of information assets, which are customer information and internal management resources, as a social mission. <\/p>\n<p>&nbsp;<\/p>\n<p>In March 2016, the Tokyo Center Division obtained accreditation in ISO\/IEC 27001: 2013 and JIS Q27001:2014, which are global standards for Information Security Management System (ISMS), to carry out contact center and assistance operations.<br \/>\n\t\tIn March 2017, the scope of ISMS application was further expanded as the Kagoshima Center Division also acquired the same accreditation (March 22, 2017)<\/p>\n<p>&nbsp;<\/p>\n<p>We are further advancing activities for information security and strive to protect information assets and customer information to respond to the trust that customers show in us, as well as provide premium service.<\/p>\n<p>&nbsp;<\/p>\n<table class=\"table-style03 margin-bottom35\">\n<tbody>\n<tr>\n<th>Registration renewal date<\/th>\n<td>March 4,2022\uff08Effective date March 22,2016\uff09<\/td>\n<\/tr>\n<tr>\n<th>Initial registration date<\/th>\n<td>March 22, 2016<\/td>\n<\/tr>\n<tr>\n<th nowrap=\"nowrap\">Scope of certification<\/th>\n<td>\n<p>Contact center operations and assistance operations<\/p>\n<\/td>\n<\/tr>\n<tr>\n<th nowrap=\"nowrap\">Assessment body<\/th>\n<td>BSI Group Japan K.K.<\/td>\n<\/tr>\n<tr>\n<th nowrap=\"nowrap\">Certification registration number<\/th>\n<td>IS644829<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p align=\"center\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-1712\" src=\"https:\/\/prime-as.co.jp\/en\/wp-content\/themes\/prime-assistance-en\/images\/company\/ISMS_ANAB_JIPDEC.png\" alt=\"Registration logo\" width=\"300\" \/><\/p>\n<p>ISO\/IEC 27001: 2013 and JIS Q 27001:2014 Information Security Management System (ISMS) are global standards for a framework for protecting information assets and for ensuring a security system to obtain the trust of interested parties. <\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<ul class=\"text-link-ul list-gray smp-ac-box\">\n<li><a href=\"https:\/\/prime-as.co.jp\/en\/wp-content\/themes\/prime-assistance-en\/images\/company\/ISMS_certification_registrationpdf.pdf\" target=\"_blank\" rel=\"noopener\">Displaying the ISMS certification registration<img decoding=\"async\" class=\"ic-pdf\" src=\"https:\/\/prime-as.co.jp\/en\/wp-content\/themes\/prime-assistance-en\/images\/ic_pdf.gif\" alt=\"pdf\" \/><\/a><\/li>\n<\/ul>\n<div class=\"wp-frame\">\n<p>&nbsp;<\/p>\n<h6>Information Security Policy <\/h6>\n<p>Prime Assistance aims to provide premium services to customers through our assistance business. The high level of trust we earn from customers forms the foundation of our service quality, and we have formulated and implemented the policy outlined below to appropriately manage the information assets necessary for maintaining security. <\/p>\n<p>&nbsp;<\/p>\n<table style=\"width: 750px;\" border=\"0\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">1. Information Security Initiatives<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">Prime Assistance positions information security as an important duty in business, regards it as a management strategy and has established, implements, maintains, supervises and improves an information security management system.<\/span><\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">2. Protection of Information Assets <\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">Prime Assistance has set standards to assess the proper degree of risk for the information assets it possesses and conducts proper management measures to securely protect information assets. <\/span><\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">3. Auditing Framework<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">Prime Assistance regularly checks that information assets are being managed appropriately, and takes corrective action based on the results of the checks.<\/span><\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">4. Management of Outsourcers<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">When concluding an outsourcing agreement, we assess whether the outsourcer is sufficiently qualified, require that they maintain security levels comparable to those of Prime Assistance and are thorough in management.<\/span><\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">5. Compliance with Laws, Regulations, Agreements, etc.<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">Prime Assistance is compliant with all laws and regulations related to information security, has established internal rules and regulations, and fulfills its contractually required information security obligations.<\/span><\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"font-size: 15px;\">6. Training<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 30px;\"><span style=\"font-size: 15px;\">Prime Assistance provides continued training and education to all officers and employees to ensure the implementation of its information security management system. <\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: right;\">\n<div class=\"wp-frame\">\n<p><span style=\"font-size: 15px;\">Enacted on December 24, 2015<\/span><\/p>\n<\/p><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Countermeasures Initiatives for ISO 27001 (Information Secu\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":249,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-company_sub.php","meta":{"footnotes":""},"class_list":["post-295","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/pages\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":810,"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/pages\/295\/revisions\/810"}],"up":[{"embeddable":true,"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/pages\/249"}],"wp:attachment":[{"href":"https:\/\/prime-as.co.jp\/en\/wp-json\/wp\/v2\/media?parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}