Here are some of agney*'s efforts to strengthen information security.
Offices and factories
Security cameras
Entrance and exit is monitored and controlled.
Electronic key lock
Access to the factory and office is by electronic key lock, and only authorised staff can enter and exit, and access is logged.
IT communication equipment
Antivirus software
We have installed anti-virus software with continuous monitoring function.
Commercial Wi-Fi equipment
We have installed Wi-Fi equipment with unauthorized access monitoring service.
Unified Threat Management
We have implemented a comprehensive security system, including antivirus, firewalls, and web filtering.
Appropriate disposal of computers and other information devices
We dispose of HDDs and SSDs appropriately, for example by crushing them.
Documentation
Dissolved waste
When disposing of documents containing customer information, we dissolve them.
Important Information Document
It is kept in locked cabinets and safes.
Business Systems
Access Restrictions
In addition to ID and password, we have added two-step authentication and the ability to restrict access itself.
We control the access rights of staff depending on the importance of the data.
Data Protection
We try not to manage data on local storage or USB memory.
Installed software control
Software is managed in a list and installation of software other than that permitted is prohibited.

Home page
JPRS Certification
The communication between your browser and our server is encrypted.
It proves that the legal existence of the website operator/organization has been verified.
Access Restrictions
The administrator has the ability to restrict not only ID and password but also access itself.
Important Information
We have a system in place that ensures that we do not retain any important information, such as customer credit card information.
Email Data
We prevent email data from being saved on local storage, USB memory sticks, etc.
Double Check
This system allows the supervisor to immediately check the contents of the email before it is sent.
email address
As a general rule, we do not issue email addresses to individual employees, and the system allows for centralized management of email information.
Employee training
Regular training
We regularly provide training on information security rules and how to use new systems and equipment.
Literacy Education
We regularly provide information management literacy training.