Information Security Policy

We recognize that information assets we own constantly face a variety of threats, and we strive to satisfy customers through the thorough safekeeping of information assets.

We conduct our business activities striving to contribute to society.

To this end, we have established an information security policy to protect information assets we handle from acts of theft, falsification, destruction, leaking or unauthorized access, and will implement an information security management system based on the following policies.

  1. We have established an information security management system that takes into account JISQ 27001:2014, relevant laws and regulations, rules and requirements under customer contracts, which all our officers and staff comply with.  We also use PDCA cycles to continuously improve.
  2. Our information security management system covers all information assets relating to our business activities. We take the utmost care to manage deposited information received from customers to prevent leaks, etc.
  3. We periodically conduct education, training, and promotional activities about information security needed to perform business for all our staff with the aim of improving knowledge and awareness.
  4. Staff that breach our security policy are disciplined according to our employee disciplinary rules.
  5. We strive to prevent obstructions to the continuation of business activities by establishing responsibilities and procedures and measures to prevent security incidents, as well as steps for damage limitation if incidents do arise, among other steps to allow us to respond promptly and appropriately.
  6. We periodically conduct management reviews to examine ISMS implementation and issue necessary instructions.

2018.02.14
H&R Group K.K.
H&R Consultants K.K.
Relo Japan K.K.
Staffing Japan  K.K.
Director: Stephen Richard Burson