| 
											
										 | 
									
									
										FORUM8 Co., Ltd. President and CEO, Yuji Ito | 
									
									
										 
											 
											Formulation of basic information security policy 
											 
											 
											
												
													
														 FORUM8 Co., Ltd. supports many engineers through software development,
															hardware development and its service technology, and also develops technology
															that brings safety and security to society through the provision of software and
															hardware. 
															 When conducting our business, strategically utilizing our customers'
															assets and assets as our management resources is a top priority. Proactive use
															of these assets tends to increase the amount of information we hold. Along with
															this, business risks due to information leakage, falsification, loss, etc. are
															also increasing, and efforts must be made to minimize these risks. 
															 For this reason, we have established a basic policy on information
															security with the aim of unifying the intent regarding information security
															within the Company and ensuring the proper protection of assets. 
															
																-  Appropriately protect your assets and assets as our management
																	resources from all threats such as negligence, accidents, disasters and
																	crimes.
																
 - When an information security event occurs, investigate the cause and
																	promptly implement countermeasures to minimize the impact.
																
 -  Clarify business requirements related to information security and legal
																	or regulatory requirements, as well as contractual obligations, and
																	educate and enlighten employees (including officers, part-timers,
																	arbators, and temporary employees of partner companies). , To ensure
																	thorough compliance.
																
 - Any intentional act that jeopardizes the protection of the customer or
																	the assets of our organization shall be subject to disciplinary or legal
																	action.
																
 - Implement risk management consistent with information security related
																	business and legal or regulatory requirements, and contractual
																	obligations.
																
 - In assessing risk, the degree of impact on the business of the
																	organization shall be the standard.
																
 - Regarding the protection of personal information, a separate "Personal Information Protection Policy" shall be established and adhered to.
															
  
														 | 
													 
													
														
															 
															
														 | 
													 
												
											 
										 | 
									
									
										Page Top   | 
									
									
										 
											Approach to security 
											 
										 | 
									
									
										
											
												
													
														| Measures against unauthorized access | 
													 
												
											 
											 
											
												- To prevent unauthorized access to computers on our network via the Internet, computers
													on our network are not directly connected to the Internet, except for special servers
													such as Web servers.
 
													Computers on our network access the Internet through proxy servers with high security. A
													firewall is installed on the Web server and FTP server. 
													A proxy server is a server that connects directly to the Internet on behalf of computers
													that are not connected to the Internet.
											  
											 
											 
											
											 
											
												- Computer viruses can destroy data or damage your computer. Computer viruses can also
													infect other computers.
 
													To prevent viruses from infecting other computers and networks, we install a virus check
													program on all computers and check all data brought in from outside. We also use check
													programs from multiple manufacturers and update definition patterns in real time.
											  
											 
											 
											
												
													
														| Information backup and recovery | 
													 
												
											 
											 
											
												- In order to protect the information on our site and the transaction information with our
													customers from accidents and computer viruses, we operate a complete backup and recovery
													system.
 
													Specifically, by operating a RAID (Redundant Arrays of Inexpensive Disks) system, data
													is protected from physical damage, and backup is also performed in a remote location
													using dual backup and magnetic tape/MO media. We also store it. 
													We back up data in case of any failure to ensure reliable recovery.
											  
											 
											 
											
												
													
														| Countermeasures for system down | 
													 
												
											 
											 
											
												- We take measures when the system or line of the Web server or FTP server is down so that it will not interfere with the services and communications to our customers such as sending homepages, e-mails and various forms as much as possible.
 
													Specifically, a WWW server is installed so that different types of lines (FTTH, analog telephone lines, etc.) can be used in some cases. In addition, the mirror server http://www3.forum8.co.jp is always in operation in case the server goes down.
											  
											 
											 
											
												
													
														| Realization of high security | 
													 
												
											 
											 
											
												- In order to achieve higher security, we are regularly inspected by a security inspection
													company.
 
													If a security hole is found by inspection, we will take immediate measures to improve
													it.
											  
											 
											 
											
												
													
														| Internet sales that you can purchase with confidence
														 | 
													 
												
											 
											 
											
												- We sell our products on the Internet.
 
													Sites that require you to send us your credit card number and password have been verified by Geotrust to ensure that you can purchase our products on the Internet with
													peace of mind. 
													When sending information from a site whose identity has been verified by Geotrust, the information is encrypted with the SSL protocol, so even if the information is stolen on the Internet, the contents will not be known. 
													 
													
														
															
																
																	Secure Seal 
																		User information page, version upgrade center, and order page use SSL encrypted communication to protect customer's personal information. | 
																 
															
														 
													
													 
													
														
															
																
																	<To Customers> 
																		Before sending information to a third-party site that is
																		masquerading as our site, please follow the steps below before
																		sending the information. Please make sure you are on our site. 
																		 
																		 
																		
																			- For sites that have been verified, you will see a locked
																				icon in your browser's status bar.
 
																				 If you do not see the locked icon, please stop sending
																					information. 
																				
																					
																						
																							
																								 
																								 | 
																								 | 
																								 
																								 | 
																							 
																							
																								| Internet Explorer | 
																								 | 
																								Netscape
																									Communicator | 
																							 
																						
																					 
																				
																			 - Double-click (Internet Explorer) or click (Netscape Communicator) on the lock icon.
																			
 - For Internet Explorer, the certicate will be displayed.
 
																				For Netscape Communicator, click "Show Certificate" in the security information to display the certificate.
																			 - If the certificate shows www2.forum8.co.jp, the site you are visiting is definitely our site.
 
																				If the certificate does not show www2.forum8.co.jp,
																					please stop sending information.
																		  
																	 | 
																 
															
														 
													
											  
											 
											 
											
											 
											
												- The personal information provided by the customer will not be used for any purpose other
													than the service. In addition, except for special circumstances, we will not disclose or
													provide your personal information to a third party without your consent.
 
													We will not store your personal information on a computer that is directly connected to
													the internet so that third parties cannot access your personal information via the
													internet. 
													There is a page (user information page) where you can browse your own information on our
													site, but in order to prevent it from being seen by a third party, you need to enter the
													user code and password to browse. We are. The user code and password will be sent to us
													encrypted and will not be stolen.
											  
											 
											 
											
											 
											
												- There is a page on our site that uses a function called "cookies".
 
													Cookies save the information you send us as text data on your computer. And our site
													saves you the trouble of entering the same information by using the saved data. 
													The data we store on your computer in cookies can only be read by our site. Therefore,
													the third party's site does not reveal your information stored in cookies. 
													You can also set cookies so that they do not work on your browser.
											  
											 
											 
											
												
													
														| Improvement of security measures | 
													 
												
											 
											 
											
												- We will continue to improve security measures while reflecting customer feedback.
											
  
										 | 
									
									
										Page Top   | 
									
									
										 
											Display based on mail order laws (door-to-door sales
												law) 
											 
											 
											
												
													
														| Distributer | 
														FORUM8 Co., Ltd. | 
													 
													
														| Operations manager | 
														President and CEO, Yuji Ito | 
													 
													
														| Location | 
														21F, Shinagawa Intercity A Building, 2-15-1 Konan, Minato-ku,
															Tokyo 108-6021 
															TEL (representative)  +81-3-6894-1888 TEL (business contact)
															+81-3-6711-1981 
															FAX  +81-3-6894-3888 E-Mail f8tokyo@forum8.co.jp | 
													 
													
														| Required charges other than
															product price | 
														Consumption tax not included is required separately. 
															Shipping costs are free unless otherwise stated. 
															When it is not displayed separately when paying for the money, a bank transfer
															fee is required separately. | 
													 
													
														| Delivery time | 
														Unless otherwise specified, within 1 week. 
															Please note that there may be a delay when handing over electronically,
															depending on the conditions of the communication line or the Internet. | 
													 
													
														| Payment method and deadline
														 | 
														It is clearly indicated by the method of product purchase.
														 | 
													 
													
														| Returns | 
														In principle, we cannot accept cancellations or returns after application. 
															We have a program license agreement. | 
													 
													
														| Handling of defective
															products | 
														If a product different from the ordered one arrives, or if the product does not arrive due to our responsibility, we will ship or deliver it again, so please contact us immediately. | 
													 
												
											 
											 
											Contact 丗 FORUM8 Version Upgrade Center (VC)E-Mail vc@forum8.co.jp
										 | 
									
									
										 
											  
											Back 
											 
											 
										 |