About information security

ISO/IEC27001 certification

Macnica and Macnica Solutions Corp. have received ISO/IEC 27001:2013 and JIS Q 27001:2014 certification, which are conformity assessment systems for information security management systems, from the Japan Quality Assurance Organization (JQA). I am getting it.

Certification Details

Registered Business

Macnica
1-5-5 Shin-Yokohama, Kohoku-ku, Yokohama-shi, Kanagawa Prefecture

Registration Number

JQA-IM1874

Registered Activity Scope
  • Import/export, development, and sales of corporate networks and security-related hardware and software
  • Providing IT solutions covering consulting, maintenance, and services
Declaration of application

Declaration of Applicability (10th Edition)

Related office
  1. Macnica West Japan Office:
    2-33-3 Nakanoshima, Kita-ku, Osaka City, Osaka Prefecture

  2. Macnica Solutions Corp..:
    1-5-5 Shin-Yokohama, Kohoku-ku, Yokohama-shi, Kanagawa Prefecture

Registration Date

April 8, 2022
* Transferred from another certification /registration body(initial registration date:December22,2005)

Registration renewal date
August 12, 2023
Date of Expiry

August 11, 2026

Certification Registration Body

Japan Quality Assurance Organization (JQA)

Image of ISO/IEC27001 certification

Information Security Basic Policy

Macnica 's basic information security policy is as follows.

Macnica recognizes the preservation of information assets as a social responsibility and an important management issue for companies, and declares that it will continue to work on information security measures by establishing an information security management system. .

  1. Operation of Information Security

    Establish basic procedures and guidelines for information security, clarify the responsibility of the company as a company for information security, and ask employees to fulfill their responsibilities.

  2. Establishment of System

    By appointing a Member of the Board in charge of information security and establishing an information security committee, we will establish a system to promote information security measures, strive to protect information assets, and prevent unauthorized access, loss, leakage, falsification, destruction, etc. of information assets. take appropriate measures to prevent and correct

  3. Implementation of Education and Training

    We will continue to provide education and training on information security, recognize the importance of information security, and ensure that information assets are properly used.

  4. Compliance with Laws and Regulations

    Comply with information security laws and other norms.

  5. Review and Improvement

    In order to comply with this basic information security policy and maintain information security, we will review and improve it regularly and as needed.