Information Security Policy

Information Security Policy

Information Security Policy

Basic Principle 1

Basic Principle 1

InnoJin Corporation (hereinafter referred to as "the Company") recognizes the increasing impact of information security risks on business activities in recent years and positions the protection of all its information assets as an important management issue. The Company establishes an information security policy (hereinafter referred to as "this policy"). The Company acknowledges the importance of protecting its information assets from risks such as leakage, destruction, and loss, and ensures that its executives and employees comply with this policy and engage in activities to maintain information security, including the confidentiality, integrity, and availability of information assets.

InnoJin Corporation (hereinafter referred to as "the Company") recognizes the increasing impact of information security risks on business activities in recent years and positions the protection of all its information assets as an important management issue. The Company establishes an information security policy (hereinafter referred to as "this policy"). The Company acknowledges the importance of protecting its information assets from risks such as leakage, destruction, and loss, and ensures that its executives and employees comply with this policy and engage in activities to maintain information security, including the confidentiality, integrity, and availability of information assets.

Second Basic Policy

Second Basic Policy

1. Protection of information assets

We have established this policy to protect our information assets and will conduct our operations in accordance with it, as well as comply with laws, regulations, and other standards related to information security and contractual obligations with our customers.

We have established this policy to protect our information assets and will conduct our operations in accordance with it, as well as comply with laws, regulations, and other standards related to information security and contractual obligations with our customers.

2. Scope of Application

This policy applies to all "information assets" handled by our company in the course of our business activities. Information assets refer to the information, data, information systems, networks, and facilities that our company owns or manages, and include all tangible and intangible items that our company deems necessary in the conduct of its business.

This policy applies to all "information assets" handled by our company in the course of our business activities. Information assets refer to the information, data, information systems, networks, and facilities that our company owns or manages, and include all tangible and intangible items that our company deems necessary in the conduct of its business.

3. Establishing an Information Security System

Our company establishes an information security system centered around the management team and clarifies the authority and responsibilities related to information security. In addition, we appoint an information security officer to accurately grasp the overall state of information security at the company level and be able to implement necessary measures quickly and appropriately in case of any issues.

Our company establishes an information security system centered around the management team and clarifies the authority and responsibilities related to information security. In addition, we appoint an information security officer to accurately grasp the overall state of information security at the company level and be able to implement necessary measures quickly and appropriately in case of any issues.

4. Improvement of Information Security Awareness

Our company conducts regular education, training, and awareness activities to ensure that employees recognize the importance of information security and handle information assets appropriately.

Our company conducts regular education, training, and awareness activities to ensure that employees recognize the importance of information security and handle information assets appropriately.

5. Implementation of Risk Assessment

Our company regularly inspects and audits compliance with this policy and the handling of information assets, and any deficiencies or areas for improvement that are discovered will be promptly addressed.

Our company regularly inspects and audits compliance with this policy and the handling of information assets, and any deficiencies or areas for improvement that are discovered will be promptly addressed.

6. Prevention of damage to information security

We will take appropriate measures in response to any events or incidents related to information security, and in case they occur, we will establish procedures in advance to minimize damage. In the event of an incident, we will respond promptly and take appropriate corrective actions.

We will take appropriate measures in response to any events or incidents related to information security, and in case they occur, we will establish procedures in advance to minimize damage. In the event of an incident, we will respond promptly and take appropriate corrective actions.

7. Measures against violations of this policy

Our officers and employees shall act in accordance with this policy, and in the event of a violation, they will be subject to disciplinary action based on employment regulations.

Our officers and employees shall act in accordance with this policy, and in the event of a violation, they will be subject to disciplinary action based on employment regulations.

8. Review of this policy

We will review this policy regularly or as necessary to respond to changes in the environment surrounding us and information security risks.

We will review this policy regularly or as necessary to respond to changes in the environment surrounding us and information security risks.

Established on November 5, 2025

InnoJin Corporation
113-0033 Tokyo, Bunkyo-ku, Hongo 2-14-10 Nagashima Building 5th Floor