Information Security (ISMS)

Management system certificate Appendix
Management system certificateManagement system certificate
Management system certificate
AppendixAppendix
Appendix
Range of Activity
Platemaking, printing, bookbinding and multimedia creation for publication printing, business printing and commercial printing.
Entrepreneur and associated business place
KSI Inc. (headquarters, sales department, manufacturing department) /
printing factory [plate processing, printing] /
Osaka Minami branch [sales department, editing]

KSI has been in the printing business for decades, which means that our customers have always entrusted us with their important information. We utilize information management, which will become crucial in the future.

Managing Information Security

While utilizing the convenience of the information society to protect the precious information with which we have been entrusted from potential danger in the information society, information security must be ensured.
KSI acquired Information Security Management System (ISMS) certification in 2007. We manage personal information and all information that our customers have entrusted to us.

We value our customers' wishes. We serve our customers' business. We consider the benefits for our customers' customers.

With these three mottoes, which place the customer first, we contribute to the development of society through our printing business.

Information security is indispensable in providing printing services to our customers. The establishment and employment of the Information Security Management System is most important for realizing our "customer first" policy.

To more clearly embody our polity, we have and we understand the importance of information security. We routinely review our level of security to maintain the highest possible standards and strictly conduct information security management to your strengthen trust in our company.

To maintain awareness of the importance of the confidentiality of the information properties that customers have entrusted to us, and to secure the integrity and availability of our information properties, we define the Information Security Management policies (Information Security Management Policy and Information Security Application Policy) as below, and we train all employees so they understand and comply with the policies.

Information Security Management System (ISMS)

  1. Establishment and formulation of the Information Security Management System We define policies on information security management and all our employees comply with these policies. We install the ISMS committee and take necessary measures for information security.
  2. Goal of Information Security Management System
    1. We make sure to keep and maintain the information that our customers have entrusted to us and our information properties.
    2. We make sure to meet the expectations and maintain the trust of our customers and business partners.
    3. We realize the effectiveness of ISMS by setting up goals for the improvement of the validity of information security management measures and our understanding and recognition of information security and through PCDA cycles.
  3. Compliance with laws and regulations on information security management We observe all statutes and regulations relevant to information security. We educate all employees so they know the importance of the statutes and regulations and adhere to them.
  4. Education and training We regularly provide education and training to all employees so they understand the importance of ISMS and their roles and responsibilities in providing information security.
  5. Actions against the threat to information security We implement appropriate risk assessment to prevent any threat, including unauthorized access and/or entry to our offices and to our internal systems, disclosure, alteration, loss, destruction, and disturbance of usage of information assets, from arising. We take appropriate action against any threat.
  6. Strict measures for managing outsourcing partners We ensure necessary security measures when outsourcing to avoid any possible leak of information on partners' sites.
  7. Continuous improvement of ISMS We make sure to always keep our ISMS in the best state through review and improvement of risk assessment and internal audit, and we review and take corrective action for all measures and in management.

Date of enactment: January 10, 2007
Second revision: January 1, 2017
KSI Inc.
President, Takayuki Minami

 

Information security application policy

  1. Policy for using mobile devices and teleworking (A.6.2.1, A.6.2.2)
    1. We encrypt mobile devices and media to protect their information.
    2. We keep records when we take mobile devices and media off our sites, and ensure to erase all recorded data at the time of return.
    3. We use only company-owned mobile devices and media. We prohibit using personal mobile devices or media.
    4. We take measures to protect information to be accessed, processed, or stored in teleworking locations, including physical security measures, safe and secure remote access methods, and backup.
  2. Access management policy (A9.1.1)
    1. Management on access control is implemented by each group, and level of access authority is given to individuals, if necessary.
    2. Appropriate level of access authority is given to personnel, taking post, area of assignment, importance of information, software assets, and system to access into consideration.
  3. Policy on using network and network services (A9.1.2, A12.2.1)
    1. Before connecting to the external network, we confirm that no influence arises on the network, information system, and/or information assets.
    2. We install firewall software, monitor access traffic to the internal network system from outside, and block unauthorized access.
    3. We install anti-virus software to detect and prevent the activity of malware, and to cancel and delete the functions of malware.
  4. Policy on encryption measures and usage of encryption key (A10.1.1)
    1. When taking personal information and important secret information (hereinafter "crucial information") off our sites, or when transmitting, moving, and storing crucial information, the information is encrypted for protection.
    2. The encryption key is kept and managed so that no person has access other than the person responsible for the assignment, the external persons who are involved in the assignment and the customer.
  5. Clear desk and clear screen policy (A11.2.9)
    1. All data to be used for assignments is stored on the servers. Unnecessary data is not saved on hard disk drives of local PCs.
    2. A password-protected screen saver is run on all PCs.
    3. Printed sheets and faxed documents are retrieved early, and never left unattended.
    4. Before disposing of hard disk or media, they are destroyed so that no saved data can be retrieved by any means.
  6. Backup policy (A12.3.1)
    1. To protect and maintain completeness and availability of information, backup of information assets is managed and implemented.
    2. Backup data is stored at a different location, considering the viewpoint of business continuation.
  7. Information transmission policy (A13.2.1)
    1. Proper transmission policy, method and measures of its management are prepared and put into action to protect the information exchange, taking each form of transmission into account.
    2. In public places, confidential information is not mentioned. Mobile phones are used only when paying attention to the surrounding situation.
    3. When sending crucial information by email, we do not post the mail directly in the mail body but protect it by encryption.
  8. Secure development policy (A14.2.1)
    We establish regulations for the development of software and/or systems within the organization, and put these policies into action or development.
  9. Information security policy for partners (A15.1.1)
    When a third person of partner companies or outsourcing companies needs to utilize or access our information assets, they must agree to follow and comply with the requirements of the Information Security Management System and sign a non-disclosure agreement.
  10. Compliance policy (A18.1.2, A18.1.4)
    1. We observe the laws, regulations and requirements relevant to the use of software products under intellectual property rights or copyrights.
    2. Protection of privacy and personal information is implemented without fail according to the requirements of all relevant laws and regulations.

Date of enactment: January 1, 2017
Second revision: January 1, 2020
KSI Inc.
President, Takayuki Minami