Our company continuously improves its information security management system based on the following information security policy.
Information Security Policy
-
As a systems engineering company, we will build and maintain information security structures and systems in accordance with the following basic policies in order to establish and maintain social trust and reputation.
- We comply with relevant laws and contractual requirements.
- We strive to properly protect and manage proprietary information.
- We aim to comply with international standards related to information security.
- We plan and implement information security programs to establish and maintain information security structures and systems.
- We establish and operate an Information Security Committees to monitor and support the smooth promotion of the Information Security Program.
Masakazu Haneda, Representative Director, President & CEO
Information Security Management System (Organizational security management measures)
Project managers of individual projects have overall responsibility and authority regarding information security specific to their project.
Information Security Measures
Employees are required to comply with various rules related to information security in their work regulations, and employees of partner companies are required to comply with various rules regarding information security, as well as disciplinary action and compensation for damages in the event of a violation. For full-time employees and temporary workers, we also obtain written pledges regarding confidentiality, even after their employment ends.
Entrance to the office area is restricted to those other than our employees. In areas with particularly high security requirements, such as server rooms, only authorized personnel are allowed to enter.
As a disaster countermeasure, we promote the remote storage of backup data and the use of highly available cloud services as necessary.
We have implemented a variety of measures, including installing firewalls, anti-malware measures, applying security patches, encrypting media and communications, restricting connections to websites, and restricting the use of external storage media.
In addition to monitoring and inspecting network usage status and various logs, we also conduct software vulnerability diagnosis and network platform diagnosis as necessary.
In order to improve the security level of the products and system services we provide to our customers, we are implementing various activities and improvements such as those listed below.
- Establishment of technical standards for security measures
- Survey of software product security measures and feedback on our own products
- Implementation of vulnerability diagnosis for web application type products (SaaS type)
Cloud Service Information Security Policy
Based on our commitment to information security, our organization uses cloud services to develop our business with a focus on the ERP field. This policy has been established in order to appropriately handle information from users of the systems provided by our company through cloud services from an information security perspective.
- Target of this cloud service information security policy:
GLASIAOUS+
GLASIAOUS
- Information security requirements applicable to the design and implementation of cloud services
Based on the basic information security policy and this cloud services policy, our company designs and implements cloud services that take into account the information security requirements of users, including the following.
- Isolation of cloud computing environments
Our cloud services utilize virtualized environments provided by cloud service providers, and provide tenant environments that are physically or logically isolated depending on the contract. Additionally, user data will be provided in logical isolation for each usage contract.
- Access and protection of customer data by our operations personnel
Except as stipulated in the terms of use, service specifications, etc., we will not access information assets stored in cloud services stored by users without the user's prior permission.
- Providing a secure authentication procedure
For cloud services, we provide strong authentication methods such as multi-factor authentication.
- Isolation of cloud computing environments
- Cloud service risks
Our company regularly conducts information security risk assessments for cloud services and takes measures to address identified risks related to cloud services.
- Establishment of operational system
We have established an operational system for cloud service administrators, etc., and will regularly provide education and training to appropriately handle user data.
- Notifications related to cloud services
In accordance with cloud service change management procedures, we will notify users on the service screen or by notification to individual users regarding changes in service content that affect users.
- Information sharing
With the prior permission of the user, within the scope stipulated in the terms of use, service specifications, etc., we will provide violation notices and share information through investigations and forensic support as a countermeasure against incidents such as unauthorized access to cloud services and information leaks.
Business Engineering Corporation
Satou Yuusuke, Managing Director
Revised: October 1, 2024
[ISO/IEC 27001 certification registration information]
ISO/IEC 27001 is an international standard for information security management systems (ISMS). This certification aims to provide requirements for organizations to establish, implement, maintain, and continually improve their information security management systems.

Certification Standards | ISO/IEC 27001:2022 |
---|---|
Certification Registration Number | JUSE-IR-522 |
Certified Organization | Business Engineering Corporation Products Business Division Systems Development Division / Systems Development Dept. 4 and Development Technology Dept. Cloud Business Promotion Division / Cloud Technology Operation Dept. Products Service Division / Technical Services Dept. |
First Certification Date | January 25, 2024 |
Certification Registration Scope | Development and operation of cloud-based ERP |
Certifying Agent | JUSE, ISO Center |
[ISO/IEC 27017 certification registration information]
ISO/IEC 27017 is an international standard for cloud service providers and their users to build a safer cloud environment and reduce security risks, assuming they have obtained ISMS (ISO/IEC 27001) certification. This certifies that cloud service-specific controls have been implemented and security standards have been met.

Certification Standards | ISO/IEC 27017:2015 |
---|---|
Certification Registration Number | JUSE-IR-522-CS01 |
Certified Organization | Business Engineering Corporation Products Business Division Systems Development Division / Systems Development Dept. 4 and Development Technology Dept. Cloud Business Promotion Division / Cloud Technology Operation Dept. Products Service Division / Technical Services Dept. |
First Certification Date | January 25, 2024 |
Certification Registration Scope | Development and operation of cloud-based ERP (GLASIAOUS and GLASIAOUS+) |
Certifying Agent | JUSE, ISO Center |
Disclosure Information | Cloud Security Policy White Paper |
[JUSE-IS27018:2023 (ISO/IEC 27018) Certification Registration Information]
JUSE-IS27018:2023 (ISO/IEC 27018) is a standard certified by the ISO Certification Center of the Union of Japanese Scientists and Engineers (JUSE) that focuses on the protection of personal information managed by cloud service providers on public clouds, with the prerequisite of ISMS (ISO/IEC 27001) certification. It is specialized in the handling of personal information stored on the cloud, and is applicable only to organizations that provide cloud services.

Certification Standards | JUSE-IS27018:2023(ISO/IEC 27018:2019) |
---|---|
Certification Registration Number | JUSE-IR-522-CP01 |
Certified Organization | Business Engineering Corporation Products Business Division Systems Development Division / Systems Development Dept. 4 and Development Technology Dept. Cloud Business Promotion Division / Cloud Technology Operation Dept. Products Service Division / Technical Services Dept. |
First Certification Date | January 27, 2025 |
Certification Registration Scope | Development and operation of cloud-based ERP |
Certifying Agent | JUSE, ISO Center |