{"id":26,"date":"2021-10-04T17:45:46","date_gmt":"2021-10-04T08:45:46","guid":{"rendered":"http:\/\/3.113.175.185\/?page_id=26"},"modified":"2023-01-27T20:55:22","modified_gmt":"2023-01-27T11:55:22","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/corp.genialtech.io\/ja\/information-security-policy\/","title":{"rendered":"\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65b9\u91dd"},"content":{"rendered":"<h1 class=\"has-text-align-center has-vk-color-primary-dark-color has-text-color wp-block-heading\">\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65b9\u91dd<\/h1>\n\n\n\n<p class=\"has-text-align-right\">\u6700\u7d42\u66f4\u65b0\u65e5\uff1a2019\u5e747\u67081\u65e5<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u91cd\u8981\u6027<\/h3>\n\n\n\n<p>\u30b8\u30fc\u30cb\u30a2\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306f\u4f1a\u8a08\u76e3\u67fb\u3092AI\u3092\u7528\u3044\u3066\u81ea\u52d5\u5316\u3059\u308b\u3068\u3044\u3046\u4e8b\u696d\u6d3b\u52d5\u306e\u7279\u6027\u304b\u3089\u3001\u304a\u5ba2\u69d8\u304b\u3089\u304a\u9810\u304b\u308a\u3057\u3066\u3044\u308b\u60c5\u5831\u3001\u305d\u306e\u4ed6\u306e\u793e\u5916\u304b\u3089\u9810\u8a17\u3055\u308c\u305f\u60c5\u5831\u304a\u3088\u3073\u81ea\u793e\u5185\u306e\u60c5\u5831\u306e\u3046\u3061\u3001\n\u6a5f\u5bc6\u60c5\u5831\u30fb\u500b\u4eba\u60c5\u5831\u7b49\u306e\u4fdd\u8b77\u3055\u308c\u308b\u3079\u304d\u5168\u60c5\u5831\uff08\u4ee5\u4e0b\u300c\u60c5\u5831\u8cc7\u7523\u300d\uff09\u3092\u5b89\u5168\u306b\u7ba1\u7406\u3059\u308b\u3053\u3068\u304c\u793e\u4f1a\u7684\u8cac\u52d9\u3068\u3057\u3066\u6c42\u3081\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<p>\u3053\u306e\u793e\u4f1a\u7684\u8cac\u52d9\u3092\u5168\u3046\u3057\u3001\u304a\u5ba2\u69d8\u306e\u6e80\u8db3\u3068\u793e\u4f1a\u306b\u304a\u3051\u308b\u4fe1\u983c\u6027\u306e\u5411\u4e0a\u3001\u306a\u3089\u3073\u306b\u4e8b\u696d\u306e\u5065\u5168\u306a\u767a\u5c55\u3092\u56f3\u308b\u3053\u3068\u3092\u76ee\u7684\u306b\u3001\u5f53\u793e\u306f\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u7d44\u7e54\u7684\u306b\u53d6\u308a\u7d44\u307f\u307e\u3059\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u6574\u5099\/\u904b\u7528\u65b9\u91dd<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u5f53\u793e\u306f\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u3092\u6574\u5099\u904b\u7528\u3057\u3001\u60c5\u5831\u8cc7\u7523\u306b\u4fc2\u308b\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u3001\u7d1b\u5931\u3001\u7834\u58ca\u3001\u6539\u3056\u3093\u3001\u6f0f\u3048\u3044\u7b49\u306e\u30ea\u30b9\u30af\u306b\u5bfe\u3057\u3066\u5408\u7406\u7684\u306a\u5bfe\u7b56\u3092\u8b1b\u3058\u307e\u3059\u3002<\/li>\n\n\n\n<li>\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u6cd5\u4ee4\u3001\u898f\u5236\u3001\u9867\u5ba2\u3068\u306e\u5951\u7d04\u3001\u305d\u306e\u4ed6\u898f\u7bc4\u3092\u9806\u5b88\u3057\u307e\u3059\u3002<\/li>\n\n\n\n<li>\u5f53\u793e\u306f\u6709\u52b9\u306a\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u7dad\u6301\u306e\u305f\u3081\u3001\u5b9a\u671f\u7684\u306b\u6559\u80b2\u8a13\u7df4\u3001\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u304a\u3088\u3073\u30ea\u30b9\u30af\u3068\u5bfe\u7b56\u306e\u518d\u8a55\u4fa1\u7b49\u306e\u5bfe\u7b56\u3092\u8b1b\u3058\u3001\u5f53\u793e\u304c\u5fc5\u8981\u3068\u5224\u65ad\u3057\u305f\u5834\u5408\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u306e\u5909\u5316\u306b\u5fdc\u3058\u3066\u9069\u5207\u306a\u51e6\u7f6e\u3092\u8b1b\u3058\u307e\u3059\u3002<\/li>\n\n\n\n<li>\u5f53\u793e\u306f\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u3001\u30b7\u30b9\u30c6\u30e0\u969c\u5bb3\u304a\u3088\u3073\u305d\u306e\u4ed6\u306e\u7dca\u6025\u4e8b\u614b\u3092\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3057\u3001\u7dca\u6025\u4e8b\u614b\u304c\u767a\u751f\u3057\u305f\u969b\u306f\u8fc5\u901f\u306b\u5bfe\u5fdc\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u304a\u554f\u3044\u5408\u308f\u305b<\/h3>\n\n\n\n<p>\u3053\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65b9\u91dd\u306b\u95a2\u3059\u308b\u3054\u8cea\u554f\u306f\u3001\u4ee5\u4e0b\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u308b\u4f4f\u6240\u307e\u305f\u306f\u3053\u3061\u3089\u306e\u30e1\u30fc\u30eb\u30a2\u30c9\u30ec\u30b9\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002 <a href=\"mailto:support@genialtech.io\">support@genialtech.io<\/a> .<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Information Security Policy Last updated on July 1, 2019 Importance of security Due to the business nature of automating accounting audit with AI, Genial Technology and its subsidiary (the \u201cCompany\u201d) has the social responsibility to securely manage all assets that are required to be protected (the \u201cInformation Asset\u201d), including confidential information and private personal information provided by customers, other parties and intra-company sources. The Company addresses the information security as the entire organization so as to fulfill the social responsibility, satisfy customers, build trust and achieve healthy business development. Design and operation policy for information security system Contacting us If there are any questions regarding this information security policy, please [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - Genial Technology<\/title>\n<meta name=\"description\" content=\"Information security policy, established by Genial Technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/corp.genialtech.io\/ja\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - Genial Technology\" \/>\n<meta property=\"og:description\" content=\"Information security policy, established by Genial Technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/corp.genialtech.io\/ja\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Genial Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-27T11:55:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/corp.genialtech.io\\\/information-security-policy\\\/\",\"url\":\"https:\\\/\\\/corp.genialtech.io\\\/information-security-policy\\\/\",\"name\":\"Information Security Policy - Genial Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#website\"},\"datePublished\":\"2021-10-04T08:45:46+00:00\",\"dateModified\":\"2023-01-27T11:55:22+00:00\",\"description\":\"Information security policy, established by Genial Technology.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/corp.genialtech.io\\\/information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/corp.genialtech.io\\\/information-security-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/corp.genialtech.io\\\/information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/corp.genialtech.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/\",\"name\":\"Genial Technology\",\"description\":\"AI for more effective auditing\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#organization\"},\"alternateName\":\"Genial Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#organization\",\"name\":\"Genial Technology\",\"url\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genialtech.io\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/icon.png\",\"contentUrl\":\"https:\\\/\\\/www.genialtech.io\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/icon.png\",\"width\":512,\"height\":512,\"caption\":\"Genial Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genialtech.io\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - Genial Technology","description":"\u3053\u3061\u3089\u306e\u30da\u30fc\u30b8\u3067\u306f\u30b8\u30fc\u30cb\u30a2\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65b9\u91dd\u3092\u3054\u89a7\u306b\u306a\u308c\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/corp.genialtech.io\/ja\/information-security-policy\/","og_locale":"ja_JP","og_type":"article","og_title":"Information Security Policy - Genial Technology","og_description":"Information security policy, established by Genial Technology.","og_url":"https:\/\/corp.genialtech.io\/ja\/information-security-policy\/","og_site_name":"Genial Technology","article_modified_time":"2023-01-27T11:55:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/corp.genialtech.io\/information-security-policy\/","url":"https:\/\/corp.genialtech.io\/information-security-policy\/","name":"Information Security Policy - Genial Technology","isPartOf":{"@id":"https:\/\/www.genialtech.io\/ja\/#website"},"datePublished":"2021-10-04T08:45:46+00:00","dateModified":"2023-01-27T11:55:22+00:00","description":"\u3053\u3061\u3089\u306e\u30da\u30fc\u30b8\u3067\u306f\u30b8\u30fc\u30cb\u30a2\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65b9\u91dd\u3092\u3054\u89a7\u306b\u306a\u308c\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/corp.genialtech.io\/information-security-policy\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/corp.genialtech.io\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/corp.genialtech.io\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/corp.genialtech.io\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.genialtech.io\/ja\/#website","url":"https:\/\/www.genialtech.io\/ja\/","name":"\u30b8\u30fc\u30cb\u30a2\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc","description":"AI\u3067\u3082\u3063\u3068\u5f79\u7acb\u3064\u76e3\u67fb\u3092\u3002","publisher":{"@id":"https:\/\/www.genialtech.io\/ja\/#organization"},"alternateName":"Genial Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genialtech.io\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.genialtech.io\/ja\/#organization","name":"\u30b8\u30fc\u30cb\u30a2\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc","url":"https:\/\/www.genialtech.io\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.genialtech.io\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/www.genialtech.io\/wp-content\/uploads\/sites\/2\/2021\/10\/icon.png","contentUrl":"https:\/\/www.genialtech.io\/wp-content\/uploads\/sites\/2\/2021\/10\/icon.png","width":512,"height":512,"caption":"Genial Technology"},"image":{"@id":"https:\/\/www.genialtech.io\/ja\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":0,"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"wp:attachment":[{"href":"https:\/\/corp.genialtech.io\/ja\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}