SECURITY GUIDELINES
Strong standards, secure systems
Information security policy
Outlook Consulting Co., Ltd. (hereinafter referred to as the “Company”) believes that gaining the trust of our customers is of the utmost importance as a business providing services in the business management field. Recognizing that information assets are important assets, our company has established the “Information Security Policy” as a policy for information security initiatives, and promotes continuous information security management efforts based on this policy.
Purpose
Our company aims to protect the information assets handled by our company from risks such as leakage, falsification, and destruction, regardless of whether it is intentional or accidental, and to continue to provide secure and stable business activities to our customers. We will establish and comply with information security policies.
Information security management initiatives
Our company formulates “Information Security Measures Standards” and “Information Security Implementation Procedures Manual” based on our information security policy, clarifies the content that must be complied with comprehensively and specifically, and implements information security management.
Protection of information assets
Our company strives to appropriately protect information assets by conducting risk assessment and risk management from the perspective of maintaining the confidentiality, safety, and usability of the information assets we hold.
Improving information security literacy
Our company provides continuous in-house education on information security to all those involved in information assets, both to raise awareness and improve technical levels. Additionally, we aim to improve information security literacy by regularly investigating and reviewing the status of compliance with information security management.
Responses to information security breaches
If we discover an event that appears to have compromised our information security, we will promptly respond according to our prepared response methods.
Measures against information security violations
Our company will take strict measures against information security violators, and will take measures depending on the importance of the violation.
Business continuity management
In order to ensure the continuation of stable business activities, in addition to information security management, our company formulates a business continuity plan in preparation for information system failures and errors due to unexpected disasters.
Revised May 26, 2022
Outlook Consulting Co., Ltd.
Yasufumi Hirao, CEO