tele-net Corporation
SINCE1994
Top Page

Information Security Policy

At tele-net, in accordance with our role as a contact center handling private information received from clients, recognize our duty to protect this information from leaks, falsification, destruction, loss, or unauthorized access. We will take all measures to ensure minimal risk of the aforementioned and utilize the following security policies in order to ensure that our network remains a safe environment for you to entrust your private information to.

1.Definition of Information Security

Information security is defined as maintaining the privacy, availability, and completeness of information assets.

2.Applicable Staff

This policy applies to all board members and staff of tele-net, as well as the staff of any companies that are partnered or work with tele-net.

3.Information Security Target

To ensure that our customers receive the most appropriate service for their needs whilst ensuring that we fulfill our duty to eliminate information leaks, falsification, theft and other security risks to the information assets we handle, both internally and from any partnered companies.

4.Responsibility and System

To ensure the policy is protected, we operate an information security management system and an information security room to maintain a smooth operation.

5.Core Rules

5-1.
Implementation of all legal requirements, as well as any additional requirements negotiated in the contract with clients, is maintained and improved upon continuously.
5-2.
(Personal information protection policy) All legal measures, as well as all measures required by JIS Q 15001 are prioritized to ensure protection of all private customer and staff information received from our clients.
5-3.
(Staff duty) Any board members, in-house staff, staff belonging to partner companies, and any other persons falling within the management of our company, will receive thorough education of this policy, and the consequences for failing to uphold any security measures will be clearly explained and written on their contract.
5-4.
Periodic audits of the security policy and measures will be carried out to ensure that all staff are being made aware of the policy, are implementing and maintaining it correctly, and all efforts are being made for continual improvement of the policy. Any issues will be solved as an immediate priority.

Enacted 6/1/2006
Last updated: 3/17/2015
CEO Takahashi Hiroyuki

ISMS Registration

Applicable Standard JIS Q 27001:2014(ISO/IEC 27001:2013)
Statement of Applicability 9/17/2021 Statement of Applicability version 3.3
Initial Date of Registration 4/8/2007
Registration Number RB-IS15015
Certification Body K.K. ISO Certification Registration Organization (RB-ISO)
Accreditation Organization Japan Accreditation Board
Registration Mark ISO27001:2005(ISMS)
Registered Organization
  • Tokyo Shinagawa Headquarters
  • Tokyo Iidabashi Office
  • Osaka Branch, Osaka Contact Center
  • Fukuoka Branch, Fukuoka No.1 Contact Center
  • Fukuoka No.2 Contact Center
  • Tokushima contact center
  • Nagano Contact Center
  • Hyuga Contact Center
Registration Area Contact Center Work
(Inbound call work, Customer Center, Telemarketing etc.)