{"id":16181,"date":"2026-03-01T00:01:24","date_gmt":"2026-02-28T17:01:24","guid":{"rendered":"https:\/\/www.e-technostar.com\/english\/?page_id=16181"},"modified":"2026-03-01T00:10:08","modified_gmt":"2026-02-28T17:10:08","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.e-technostar.com\/english\/company\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<section class=\"l-section is-xxxlg\">\n<div class=\"l-container\">\n<h2 class=\"c-heading is-md is-align-center is-bottom-line\"><small><span style=\"font-family: 'Noto Sans JP', sans-serif;\"><strong>Information Security Policy<\/strong><\/span><br \/>\n<\/small><\/h2>\n<div class=\"row\">\n<div class=\"large-10 is-push-lg-1 small-12\">\n<div class=\"c-privacy\">\n<h6>Basic Philosophy<\/h6>\n<p><span>TechnoStar Co., Ltd. (hereinafter referred to as &#8220;the Company&#8221;) conducts its business based on the corporate philosophy:<\/span><\/p>\n<p><span>\u201cWe contribute to society through CAE and co-create the future.\u201d<\/span><\/p>\n<p><span>\u00a0<\/span><\/p>\n<p><span>Information assets handled in the course of our business, including customer information, are extremely important as the foundation of the Company\u2019s management.<\/span><\/p>\n<p><span>Recognizing the importance of protecting information assets from risks such as leakage, damage, and loss, all persons who handle information assets, including officers and employees, shall comply with this Policy and actively engage in initiatives to maintain information security, including confidentiality, integrity, and availability of information assets.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><span>Basic Policy<\/span><\/h6>\n<ol>\n<li><span> In order to protect information assets, the Company establishes an Information Security Policy and related rules and regulations, conducts business in accordance with them, and complies with laws, regulations, other relevant standards related to information security, as well as contractual obligations with customers.\n<p><\/span><\/li>\n<li><span> The Company clarifies criteria for analyzing and evaluating risks such as leakage, damage, and loss that exist for information assets, establishes a systematic risk assessment methodology, and conducts risk assessments on a regular basis. Based on the results, necessary and appropriate security measures shall be implemented.\n<p><\/span><\/li>\n<li><span> The Company establishes an information security management structure led by the executive in charge, and clearly defines authorities and responsibilities related to information security. In addition, in order to ensure that all employees recognize the importance of information security and properly handle information assets, the Company conducts regular education, training, and awareness activities.\n<p><\/span><\/li>\n<li><span> The Company periodically inspects and audits compliance with the information security policy and the handling of information assets. Any deficiencies or areas for improvement identified shall be promptly corrected through appropriate corrective actions.\n<p><\/span><\/li>\n<li><span> The Company takes appropriate measures in response to the occurrence of information security events and incidents. In preparation for such occurrences, response procedures to minimize damage are established in advance, and in the event of an incident, the Company responds promptly and implements appropriate corrective actions. In particular, for incidents that may lead to business interruption, a management framework is established and regularly reviewed to ensure business continuity.\n<p><\/span><\/li>\n<li><span><span><span> The Company establishes an Information Security Management System (ISMS) with objectives set to realize the basic philosophy, implements and operates it, and continuously reviews and improves it.<\/span><\/span><\/span><br \/>\n<hr \/>\n<p><span><span><\/span><\/span><\/li>\n<\/ol>\n<div class=\"u-mbs is-top is-md\">\n<p class=\"u-text-right\">Established on: March 1, 2026<br \/>\n<span>TechnoStar Co., Ltd.<\/span><br \/>\nRepresentative Director: Katsutaka OKAMORI<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<div class=\"c-block-archive  is-years is-link\">\n<div class=\"c-block-archive__container\">\n<div class=\"l-container\">\n<div class=\"c-block-archive__block\">\n<div class=\"c-block-archive__title\"><span>Company Info<\/span><\/div>\n<div class=\"row\">\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/message\/\">Message from the President<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/outline\/\">Company Profile<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/history\/\">History<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/client\/\">Major trading partners<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/access\/\">Location<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/partners\/\">Partner<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/privacy\/\">Privacy policy<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/quality\/\">Quality control policy<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/other-companies-trademarks\/\">Other Companies Trademarks<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/careers\/\">Employment information<\/a><\/div>\n<div class=\"large-3 small-12\"><a class=\"c-button is-sm js-current-nav\" href=\"https:\/\/www.e-technostar.com\/english\/company\/careers\/\">Basic Policy on Information Security<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"u-hidden-sm u-hidden-lg\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Policy Basic Philosophy TechnoStar Co., Ltd. (hereinafter referred to as &#8220;the Company&#8221;) conducts its business based on the corporate philosophy: \u201cWe contribute to society through CAE and co-create the future.\u201d \u00a0 Information assets handled in the course of our business, including customer information, are extremely important as the foundation of the Company\u2019s management. Recognizing the importance of protecting information assets from risks such as leakage, damage, and loss, all persons who handle information assets, including officers and employees, &hellip; <span>[More]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":472,"menu_order":26,"comment_status":"closed","ping_status":"closed","template":"template-allhtml.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-16181","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/pages\/16181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/comments?post=16181"}],"version-history":[{"count":8,"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/pages\/16181\/revisions"}],"predecessor-version":[{"id":16514,"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/pages\/16181\/revisions\/16514"}],"up":[{"embeddable":true,"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/pages\/472"}],"wp:attachment":[{"href":"https:\/\/www.e-technostar.com\/english\/wp-json\/wp\/v2\/media?parent=16181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}