Security Policy

Information Security Policy

Note

Please note that this document is an unofficial translation and was prepared for reference purpose only. The original release is in Japanese.

HAPSMobile Inc. (hereafter called “HM”) has developed “Information Security Policy” in order to always get the trust of society including our customers by taking drastic and high-level measures against the risk of information leakage.
HM intends, from now on, to comply with “Information Security Policy” and “Personal Information Protection Principles (privacy policy)” as separately indicated and maintain information security by protecting information assets from various threats and by properly handling them.

Application of Information Security Policy
  1. Buildup of information security management structure
    Build up a highly secured information security management structure to gain the society's confidence at any time through making every possible effort to protect all information assets held by HM as well as complying with the information security-related statutes and other rules.
  2. Assignment of “Chief Information Security Officer”
    Assign “Chief Information Security Officer (CISO)”, which enables HM to take proactive actions to have accurate visibility of the company-wide information security status and to promptly take necessary measures.
  3. Development of information security-related company rules
    Develop company rules based on Information Security Policy to demonstrate the clear policy for not only the personal information but also information assets in general as well as internally and externally keep everyone informed about HM's tough stance against the information leaks.
  4. Development/enhancement of audit structure
    Further develop the structure which enables HM to carry out internal audits of compliance with Information Security Policy, the company rules and other relevant rules. HM will prove that all of its employees, etc. comply with Information Security Policy.
  5. Implementation of system with full information security measures
    Implement a fully protected system against unauthorized access to, leaks, modification, loss, destruction or hindered use, of the information assets.
  6. Enhancement of information security literacy
    Ensure that the employees, etc. are given security education/training and that all people engaged in HM's information assets perform activities with the information security literacy.
    In addition, HM will continue providing its employees with education/training to cope with ever-changing circumstances.
  7. Strengthened management structure of outsourcing agents
    Request outsourcing agents to keep a security level which is the same or more than that of HM by fully examining eligibility of the outsourcing agents when outsourcing operations. In addition, HM intends to continuously review the outsourcing agents to reinforce contracts' terms with intent to confirm without interruption that the security level is adequately maintained.
Coverage of Information Security Policy

“Information assets” covered by this policy are information obtained or known in the ordinary course of HM's business and all the information held by HM for its business. All of HM's “Directors, employees and temporary staffers” who are engaged in handling and controlling these information assets as well as “outsourcing agents and their employees” who deal with HM's information assets must comply with Information Security Policy.

Supplementary provisions

This Information Security Policy shall be enforced from April 25, 2019.