Assistance materials

Assistance materials
You can download the materials distributed at the seminar!
1~30 item / All 54 items
-
What does "operation confirmation" in the P Mark mean? What is the difference from "internal audit"?
In small companies, the personal information protection manager may check everything!
last updated
-
Things that companies with group companies should be careful about when obtaining the P Mark.
Considering that information may flow between group companies, it is necessary to take measures to prevent the leakage of personal information!
last updated
-
What is internal audit in the P Mark?
Explanation of who, when, to whom, and how it is done! Recommended qualifications for security personnel will also be introduced.
last updated
-
Content and procedures for internal training on the P Mark.
An explanation of the four necessary educational contents for the P Mark, as well as the flow of employee training for the operation and implementation of the P Mark!
last updated
-
A Comprehensive Explanation of the Flow and Methods for Managing Outsourcing to Protect Privacy [P Mark]
An explanation of what types of outsourcing partners handle personal information and how to evaluate these partners!
last updated
-
What are the steps for a company that has obtained a P mark to implement telework?
Explanation of the P mark review in the case of remote work!
last updated
-
I want to consult about acquiring and managing the P Mark! How to choose a consulting company.
Let's choose a consulting company that is experienced and attentive!
last updated
-
What rules should companies with a P mark follow for password management?
Recommended password management methods and poor password management methods, explained with specific examples!
last updated
-
How should I handle business cards in relation to the P mark?
What can be solved with business card management services and tools! An explanation of recommended handling methods.
last updated
-
How far does personal information go under the P Mark? Specific examples by industry.
There are also industry-specific personal information that is subject to protection! Examples from the telecommunications industry and hospitals are introduced.
last updated
-
[P Mark New Examination Standards] Key Points to Keep in Mind for New Acquisition
A reference for creating regulations! An explanation of the significantly revised P Mark examination criteria.
last updated
-
Is obtaining a P mark necessary for an e-commerce site business? Important aspects of site management.
The P mark plays an important role in operating an e-commerce site that is chosen by customers!
last updated
-
Operational Status Checklist for Internal Audit of P Mark
Why is a checklist for internal audits of the P Mark necessary? We will also introduce the items to check!
last updated
-
A current consultant explains in detail the costs associated with obtaining a new P Mark certification.
We will also introduce the duration required to obtain the P mark and what to do if you become non-compliant!
last updated
-
What companies with P Mark certification should know about the overseas transfer of personal information.
Trends in personal information protection laws overseas! Introducing key points and standards to keep in mind.
last updated
-
Security measures necessary for obtaining ISMS.
I will explain what ISMS is and what benefits it has!
last updated
-
What does the "Personal Information Protection Audit Officer" appointed for obtaining the P Mark do?
An explanation of the individuals who can become personal information protection audit officers and specific check items (business content).
last updated
-
Block suspicious emails! What are effective measures against targeted attack emails?
Introducing key points to keep in mind to prevent your valuable information assets from being stolen.
last updated
-
Purpose, implementation methods, and actual flow of internal audits [P Mark]
We will also introduce the benefits of hiring a specialized consultant for internal audits for personal information protection!
last updated
-
What is a targeted attack? What should be done in preparation for emergencies?
A detailed explanation of targeted attacks, one of the attack methods aimed at information assets!
last updated
-
What about the renewal application after obtaining the P mark?
How do I apply for renewal after obtaining the P mark? An explanation of the renewal application process and costs.
last updated
-
Key Points for Acquiring P Mark in a Web Development Company
Explaining the benefits of a web production company obtaining a P Mark, as well as the personal information it holds and how it is handled!
last updated
-
What is the Privacy Mark?
Explanation of the 'Certificate of Assurance Regarding Personal Information Protection' and its effects!
last updated
-
What is ransomware? A clear explanation of infection routes and countermeasures.
We also support those who wish to review their company's security system by obtaining ISMS certification.
last updated
-
What should you do if you get infected with ransomware?
Explaining the measures that should be taken within the company first! Introducing what to do first if infected.
last updated
-
What is the ISMS (ISO 27001) certification mark?
Let's understand the usage conditions and precautions for the logo mark!
last updated
-
What are the characteristics of industries that have obtained ISMS? What should be noted?
We will answer various questions! Introducing the necessity of ISMS and more.
last updated
-
Requirements for obtaining ISMS.
An overview of ISMS and an explanation of the differences between the Privacy Mark (P Mark) and ISMS!
last updated
-
What is a Privacy Policy? An Explanation Focusing on Its Relationship with P Mark Acquisition
Introducing the role of the privacy policy within PMS and the necessity of its creation!
last updated
-
Explaining how to establish a system for internal audits.
Introducing the internal audit report of ISMS, how to conduct internal audits, and the three necessary records for internal audits!
last updated