uSonar has established an advanced security framework to protect our vast database.
We have appointed a person responsible for the handling of personal information, clarified the scope of employees who handle personal information and the personal information they manage, and established a reporting and communication system to the responsible person in the event that any facts or signs of violations of the Personal Information Protection Act or internal personal information handling regulations are identified.
Establishment of Organizational Structure
To ensure the secure management of personal information, we have designated a Chief Privacy Officer (CPO), audit managers, and various operational managers, clearly defining their responsibilities and roles.
Development and Implementation of Compliance Programs (Personal Information Protection Regulations)
We have established a compliance program as a code of conduct for personal information protection (including provisions based on the determination that Japan ensures an adequate level of protection for personal information in accordance with GDPR). We conduct regular education and training for all individuals engaged in uSonar business operations to ensure thorough awareness and promote a culture of compliance.
Means to Monitor the Handling Status of Entrusted Data
We have built a system that centralizes the status of data handling by utilizing an entrusted media management ledger. When receiving data, we issue a "Customer Information Custody and Return Receipt," store the data on servers with restricted access, and manage physical media under lock and key.
Evaluation, Review, and Improvement (Establishment and Operation of the Security Center)
We have assigned personnel responsible for personal information and, through our Security Center (Management Committee chaired by Representative Director Nami Fukutomi), we execute ongoing evaluations, reviews, and improvements.
Response to Accidents or Violations
In the unlikely event that an accident or violation is discovered, we have established a workflow within the Security Center to conduct fact-finding investigations, determine root causes, identify the scope of impact, consider and implement recurrence prevention measures, and take appropriate corrective actions.
We conduct regular training for employees regarding important considerations for handling personal information and include provisions concerning the confidentiality of personal information in our employment regulations. We implement human security management measures by requiring employees to sign non-disclosure agreements regarding personal information designated as business secrets and by providing ongoing education and training.
We implement physical security management measures, including access control for buildings and rooms, and safeguards against the theft of personal information, to prevent unauthorized access, loss, destruction, tampering, or leakage of data.
Prevention of Theft and Other Incidents
• Surveillance Cameras
Surveillance cameras monitor for unauthorized intruders and illicit activities 24 hours a day, 365 days a year. Recorded image data is retained for a minimum of three months to maintain a comprehensive security history.
• Electronic Media Lock Management
In addition to physical locking, access to areas containing storage cabinets is restricted via an entry/exit management system.
• After-Hours and Holiday Support
We implement 24/7/365 security through a combination of building security personnel, surveillance cameras, and entry/exit monitoring equipment.
• Prohibition of Removing Equipment Such as PCs from the Office
Removing equipment such as PCs from the office is prohibited. As an exception, removal is permitted only after following the application and approval procedures designated by the CIO.
• Implementation of Personal Belongings Inspections
By conducting random inspections of personal belongings, we regularly check that unauthorized personal PCs, storage media, smartphones not previously registered, or sharp objects and hazardous materials are not brought into the office.
We have implemented mechanisms to protect information systems that handle personal information from unauthorized external access or malicious software.
Access Control
• Login Control
uSonar grants access to personal information only to specific employees with authorized privileges. Data is not duplicated, and access logs are stored and monitored. Furthermore, at uSonar, each individual sets their own password for logging into their personal terminal. Electronic documentation is managed on a shared server, with access control implemented at the folder level within the system.
• ID Management and Deletion
We immediately execute changes or deletions of privileges, such as IDs and entry/exit cards, for employees who have transferred or resigned.
Software Security Measures
Malware Protection
To address both known and unknown malware, we have deployed multiple security software solutions across all terminals.
Blacklisting
Each user is granted only standard user privileges on their terminal and is restricted from installing applications. We maintain a blacklist of unauthorized software and implement controls to prevent such applications from launching, even if they are inadvertently installed.
Other security measures are not disclosed for security reasons. For further details, please contact us, and we will provide an explanation as necessary.
uSonar has obtained three ISO certifications.
Partially Revised on 2021/12/15
2022/07/19 Changed company name from Landscape Co., Ltd. to uSonar Co., Ltd.