Initiatives for information security

Introducing GMO BRAND SECURITY Co., Ltd.'s information security initiatives and policies.

Acquisition of ISO27001 certification

GMO BRAND SECURITY Inc. has built an information security management system (ISMS) and acquired ISO27001 certification, an international standard, in order to protect information assets from various threats and reduce risks in cloud services for companies. We are here.
ISO27001 is an international standard for information security management, and is a standard for maintaining the confidentiality, integrity, and availability of information for all information assets within the scope of application.

Certification acquired for both the headquarters and the West Japan branch

Certification acquisition information

Registered Business
Cerulean Tower, 26-1 Sakuragaoka-cho, Shibuya-ku, Tokyo
Certified Standards
JIS Q 27001:2014 (ISO/IEC 27001:2013)
Certification Registration Number
Registration Date
Thursday, December 2, 2021
Scope of Registration
  • Consulting services related to brand protection, utilization, and strategy
  • Consulting services related to domain name acquisition, renewal, investigation, and monitoring.
  • Consulting services related to trademark investigation, application, registration, renewal, and monitoring.
  • Consulting services related to counterfeits and intellectual property rights infringement.
  • Provision of systems related to intellectual property rights and intellectual property operations.
Registration Authority
ASR Co., Ltd.

Information Security Basic Policy

Our company is built on a relationship of trust with stakeholders such as customers and business partners.
In order to provide better services and maintain and improve trust, all employees, including management, recognize the value and importance of information assets, take sufficient safety measures, and protect the "integrity" and "confidentiality" of information. "Availability" must be maintained.
In order to properly protect our information assets from various threats, we have established the "Information Security Basic Policy" and are working to improve information security. In addition, we will devote ourselves to compliance management in order to appropriately respond to the requirements of various related laws and regulations, as well as our contractual security obligations.

1. Risk assessment

Establish internal standards and conduct risk assessments, recognize threats and vulnerabilities related to important information assets company-wide, implement appropriate risk countermeasures, and prevent unauthorized access, loss, destruction, or damage to information assets. We will strive to prevent the occurrence of information security incidents and accidents, such as prevention of falsification and leakage.

2. Security Goals

At the same time as formulating information security goals and striving to achieve them, we will make all employees aware of the importance of information assets and information security, and thoroughly inform them of the appropriate use of information assets, facilities and equipment.

3. Strive for prevention, maintenance and improvement

In the unlikely event that an information security problem occurs, we will promptly investigate the cause and take the best measures to minimize damage, and strive to prevent, maintain and improve.

4. Establish a management system

We will continue to implement the activities of the basic information security policy described above and establish a management system that can respond to new threats.

5. In case of violation of legal requirements and internal regulations

In the unlikely event of a violation of legal requirements and internal regulations, penalties stipulated in the employment regulations will be applied.

6. Strive for continuous improvement

We will constantly review this basic policy and strive for continuous improvement.

March 1, 2015
Revised January 12, 2016
Revised May 11, 2022


Page Top