Information Security Policy | ONDA TECHNO Intl. Patent Attys.[Japan Patent Firm] | Gifu City

Information Security Policy | ONDA TECHNO Intl. Patent Attys.[Japan Patent Firm] | Gifu City

Access

Information Security Policy

Information Security Policy

ONDA TECHNO Intl. Patent Attys. has adopted the management philosophy of “Creating worldwide value by offering high quality intellectual property services” and always aims to provide top-quality services to our clients.

Based on this notion, we created our Information Security Policy as a guideline for protecting information assets acquired or used for business activities from threats such as theft, falsification, destruction, leakage, and unauthorized access, and appropriately managing the information assets. We declare that all executive officers and other employees of ONDA will engage in business adhering to ethical standards in accordance with this policy.

Enacted: November 1, 2024
Makoto Onda
President, Patent Attorney
ONDA TECHNO Intl. Patent Attys.

1. Establishment of Information Security Management System

We have an appointed information security manager to direct maintenance, enhancement, and implementation of the information security management system.
In addition, we audit these efforts periodically, and construct a framework for ongoing improvements.

2. Implementation of information Security Measures

We conduct risk assessments to protect information assets, and implement information security measures for our information system, including measures preventing information leakage, unauthorized access, and computer viruses, and measures increasing reliability.

3. Review

We review and continuously refine this policy in light of changes in the business environment, social environment, and legal regulations, the latest trends of information-related technologies, and newly-identified risks.

4. Compliance with Laws, National Regulations, and Contractual Requirements

We comply with laws, national regulations, or contractual obligations related to information security, as well as information security requirements, by specifying these requirements and implementing measures formulated to comply with the requirements.

5. Information Security Measures for Outsourcing

We examine the eligibility of contractors and review the contents of outsourcing contracts from the aspect of protecting confidential information and personal information of our clients.

6. Prevention and Response to Information Security Incidents

We strive to prevent information security incidents, and in the event of an incident, promptly implement appropriate remedies, including recurrence preventive measures.

7. Education and Training on Information Security

We offer regular education and training on information security to the employees, and ensure that the employees are fully aware of the importance of the information security and proper handling and management of the information assets.

8. Business Continuity Management

We secure business continuity by minimizing any interruptions that would result from accidental disasters, information system failures, or intentional abuse of information assets.