Information Security Basic Policy

Security Policy

Information Security Basic Policy

Security Policy

Information Security Basic Policy

Security Policy

At Igness, Inc. (hereinafter referred to as our company), the information assets we handle during our business activities, including customer information, are extremely important as our management foundation.

Our company deeply recognizes the importance of protecting information assets from risks such as leakage, alteration, loss, and damage. By ensuring that all officers, employees, and those engaged in business activities comply with this policy, we continuously practice efforts to maintain and enhance the confidentiality, integrity, and availability of information assets.


  1. Compliance with Laws, Regulations, and Contracts
    Our company complies with laws, guidelines, other standards related to information security, and contractual obligations with our customers. We also establish and perform our operations based on an information security policy and related regulations.


  2. Risk Assessment and Implementation of Measures
    Our company sets criteria and methods to appropriately identify and assess risks related to the leakage, alteration, and loss of information assets. We conduct regular risk assessments and implement necessary and appropriate information security measures based on the results.


  3. Establishment of Information Security System
    Our company establishes an information security management system centered around a responsible officer, clearly defining authority and responsibility related to information security.


  4. Education and Awareness
    Our company conducts regular education, training, and awareness activities to inform all officers, employees, and contractors about the importance of information security and ensure the appropriate handling of information assets.


  5. Inspection, Auditing, and Correction
    Our company regularly inspects and, when necessary, audits compliance with the information security policy and the handling of information assets. Should deficiencies or areas for improvement be identified, corrective measures are promptly taken.


  6. Incident Response and Business Continuity
    Our company establishes pre-defined response procedures to swiftly and appropriately handle any detected information security incidents or their signs to minimize damage. For incidents affecting business continuity, we organize and regularly review the management system to ensure business continuity.


  7. Continuous Improvement
    Our company establishes and operates an information security management system based on this policy, continuously reviewing and improving it in consideration of changes in societal and technological trends.


Established on: December 12, 2025
Igness, Inc.
CEO Takuma Ogura


Contact for Security Inquiries

Please contact the following for information security inquiries, vulnerability reports, etc.

Ignis Corporation, Information Security Contact

hello@igness.ai


Copyright © 2025 Igness, Inc. All rights reserved.

Copyright © 2025 Igness, Inc. All rights reserved.

Copyright © 2025 Igness, Inc. All rights reserved.

English