Basic Information Security Policy

Global Design IT Co., Ltd. uses IT and Internet technologies to support corporate communication to expanding value of customers’ corporate.

For that purpose, we handle various business “information” and come to recognition that ensuring “information security” is a top priority issue in management as the basis for building trust with our customers.

In order to ensure the safe management of “information”, we comply with related laws and establish the following basic information security policy.

1.  Target information assets

Aside from the important “information” we receive from our customers, we protect all information assets related to our business activities. We will carry out appropriate management according to the purpose of use and the degree of importance; and endeavor to ensure the confidentiality, integrity, and availability required for information assets.

2.  Risk analysis and evaluation

To prevent and evaluate the impact and potential of loss in information security caused by threats to the information assets (unauthorized access, leakage, falsification, loss, destruction, obstruction of use, etc.) on the business through risk analysis and evaluation standards, the company will examine and implement the most suitable countermeasures.

3.  Promotion system

We have laid down internal regulations to properly secure information security and establish a company-level management system for compliance and operation.

In addition, we carry out audits to maintain objectivity as well as regularly review our rules and systems.

4.  Education and Training

We will inform all employees (executives, employees, contract employees) of the basic information security policy. In addition, we plan and continuously implement the education and training necessary to maintain a high awareness of information security. We will seek clear responsibility for those who violate our basic information security policy and internal regulations.

5.  Response to security incidents

In the unlikely event of a security accident, we will strive to minimize the damage, investigate the cause promptly, and implement corrective measures to prevent recurrence.

On the other hand, in order to minimize the impact on customers, we will establish a business continuity mechanism for early recovery.


Personal Information Protection Policy

In an information society that is evolving day by day, Global Design IT Co., Ltd. provides high-quality information to various media such as mobile terminals and PCs under the policy of “get necessary information in a clean and easy-to-understand and optimal way”. We are working hard every day to provide high quality information services.

As a company engaged in web system development operation and website construction operation, we handle various types of “information” in our business and recognize that safe management of such “information” is an important social responsibility.

Above all, we strongly recognize the importance of personal information, and place privacy protection as one of the top priorities in our corporate activities. In order to put above content into practice, we have established the following personal information protection policy, and executive officers as well as all employees will endeavor to properly handle and manage personal information in accordance with this policy.

1. Acquisition, use and provision of personal information

We focus to acquire, use and provide appropriate personal information while taking the content and scale of business into consideration. Furthermore, the use of personal information shall be within the scope of the purpose of use specified in advance at the time of acquisition, any personal information beyond the scope will not be handled (utilization outside intended purposes), and measures will be taken to prevent utilization outside intended purposes.

2. Appropriate management of personal information

Personal information acquired by the Company and personal information entrusted from outside will be managed safely and accurately, and information security measures against problems such as unauthorized access, loss, destruction, falsification, leakage, etc., will be taken and prevented. In order to prevent the unlikely event of a problem, we will promptly take corrective action.

3. Response to complaint consultation

Our company accepts complaints and inquiries from the said individual regarding the handling of their personal information and the personal information protection management system, and responds appropriately and promptly.

4. Compliance with laws and regulations

We will endeavor to practice our actions in compliance with laws and ordinances regarding personal information protection, national guidelines, “Personal Information Protection Management System-Requirements (JIS Q 15001)”, and other norms.

5. Formulation and continuous improvement of personal information protection management system

We have established a management system for personal information protection, and make it known to all executive officers and employees. In addition, we review this regularly with the president as the center, and strive for continuous improvement.

Personal Information Management

Purpose of using personal information at our company

Purpose of use when entrusted by the customer

  • For website creation and operation management
  • For internet related system development and operation management
  • For server/network construction and operation management
  • For creating, sending, collecting and inputting various survey tables
  • For creating, printing and shipping of leaflets, posters, rosters, etc.
  • Other businesses that have connection with those above

Purpose of use when acquired by the company

1.Personal information regarding customers and business partners
  • To respond to inquiries and consultations about company’s products and services
  • To provide maintenance and support services regarding our products
  • For information about our services, events, etc.
  • To conduct a survey
  • For business negotiations, business contacts, meetings, etc.
  • To fulfill the contract
2.Personal information about recruitment applicants
  • To respond to inquiries about our business and recruitment information etc.
  • For the company’s recruitment examination
  • For office contact such as acceptance / rejection
3.Personal information of employees including executive officers
  • For the company’s personnel and labor management
  • To create and manage employee lists, emergency contact networks, organizational charts, etc.
  • To report to customers and subcontractors as the business implementation system, etc. is performed
4.Personal information of retired employee
  • For post-retirement contact from office
5.Personal information generated by the operation of Privacy Mark
  • For privacy mark operation management

Well-known matters regarding personal information subject to disclosure and requests for disclosure, etc.

Regarding the following personal information subject to disclosure held by our company, based on demand from the person in question or their agent, our company will respond to notification of the purpose of use, disclosure, correction of contents, addition or deletion, suspension of use, deletion and suspension of provision to third parties.

Purpose of use of personal information subject to disclosure

  • Personal information of employees, including executive officers: For personnel and labor management of our company
  • Personal information about applicants for recruitment: For the company’s recruitment screening
  • Customer information: For business execution
  • Inquiry information: For inquiries

Personal Information Manager (Personal Information Protection Manager)

In charge of personal information management: GLOBAL DESIGN IT LIMITED COMPANY
Contact information: (+84)236-3868-778 (Japanese / Vietnamese)


Contact With Us

For inquiries about Lab type offshore development, please contact to Global Design IT.