This site has limited support for your browser. We recommend switching to Edge, Chrome, Safari, or Firefox.

Cart 0

No more products available for purchase

Subtotal Free
Shipping, taxes, and discount codes are calculated at checkout

agney*'s approach to information security

情報セキュリティー強化

Here are some of agney*'s efforts to strengthen information security.

Offices and factories

Security cameras

Entrance and exit is monitored and controlled.

Electronic key lock

Access to the factory and office is by electronic key lock, and only authorised staff can enter and exit, and access is logged.

IT communication equipment

Antivirus software

We have installed anti-virus software with continuous monitoring function.

Commercial Wi-Fi equipment

We have installed Wi-Fi equipment with unauthorized access monitoring service.

Unified Threat Management

We have implemented a comprehensive security system, including antivirus, firewalls, and web filtering.

Appropriate disposal of computers and other information devices

We dispose of HDDs and SSDs appropriately, for example by crushing them.

Documentation

Dissolved waste

When disposing of documents containing customer information, we dissolve them.

Important Information Document

It is kept in locked cabinets and safes.

Business Systems

Access Restrictions

In addition to ID and password, we have added two-step authentication and the ability to restrict access itself.
We control the access rights of staff depending on the importance of the data.

Data Protection

We try not to manage data on local storage or USB memory.

Installed software control

Software is managed in a list and installation of software other than that permitted is prohibited.

Information Security

Home page

JPRS Certification

The communication between your browser and our server is encrypted.
It proves that the legal existence of the website operator/organization has been verified.

Access Restrictions

The administrator has the ability to restrict not only ID and password but also access itself.

Important Information

We have a system in place that ensures that we do not retain any important information, such as customer credit card information.

Email

Email Data

We prevent email data from being saved on local storage, USB memory sticks, etc.

Double Check

This system allows the supervisor to immediately check the contents of the email before it is sent.

email address

As a general rule, we do not issue email addresses to individual employees, and the system allows for centralized management of email information.

Employee training

Regular training

We regularly provide training on information security rules and how to use new systems and equipment.

Literacy Education

We regularly provide information management literacy training.