catalog
Please complete the inquiry form to access eBook details
-
-
-
-
-
What is a privacy policy? An explanation focusing on its relationship with obtaining a privacy mark (P mark).
Contact this catalog
-
-
-
What does "operation verification" mean in the P Mark? What is the difference from "internal audit"?
Contact this catalog
-
-
What rules should companies with P Mark certification follow for password management?
Contact this catalog
-
Explaining key points of business card management that companies obtaining the P mark should keep in mind!
Contact this catalog
-
Block suspicious emails! What are effective measures against targeted attack emails?
Contact this catalog
-
-
-
Which one should you obtain? A clear explanation of the differences between ISMS (ISO 27001) and P Mark (JIS Q 15001)!
Contact this catalog
-
-
-
-
-
Examples of what constitutes personal information under the P Mark, categorized by industry.
Contact this catalog
-
-
What rules should companies with P Mark certification follow for password management?
Contact this catalog
-
-
A thorough explanation of the flow and methods for managing outsourced partners to protect privacy.
Contact this catalog
-
-
Purpose, Implementation Methods, and Actual Process of Internal Audits <P Mark>
Contact this catalog
-
-
-
-