{"id":6534,"date":"2025-09-17T12:35:24","date_gmt":"2025-09-17T03:35:24","guid":{"rendered":"https:\/\/ryze-recruit.com\/en\/?page_id=6534"},"modified":"2025-10-31T11:24:00","modified_gmt":"2025-10-31T02:24:00","slug":"security","status":"publish","type":"page","link":"https:\/\/ryze-recruit.com\/en\/security\/","title":{"rendered":"Security Policy"},"content":{"rendered":"\n<p><strong>Ryze Consulting\u2019s security policy highlights how we protect client data and continuously improve security practices to meet customer expectations.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Ryze Consulting Co., Ltd. is committed to safeguarding the information assets entrusted to us by our customers from threats such as accidents, disasters, and crimes. We will make company-wide efforts to ensure information security based on the following policies in order to live up to the trust of our customers and society.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading is-style-underline_hd has-vk-color-custom-4-color has-text-color has-link-color wp-elements-b417c0fc5fe51b2d6ba98b8d71df7d37\">1) <strong>Management's Responsibility<\/strong><\/h3>\n\n\n\n<p>We will strive to systematically and continuously improve and enhance information security under the leadership of our management team.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading is-style-underline_hd has-vk-color-custom-4-color has-text-color has-link-color wp-elements-1cf1a8e85948d198e776632bc952e577\">2) <strong>Maintenance of Internal Systems<\/strong><\/h3>\n\n\n\n<p>We will make every effort to maintain and improve information security by establishing and enforcing information security measures as official internal policies.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading is-style-underline_hd has-vk-color-custom-4-color has-text-color has-link-color wp-elements-4785783a82c3c07b47f88236a2565a3b\">3) <strong>Employee Efforts<\/strong><\/h3>\n\n\n\n<p>Our employees are required to acquire the knowledge and skills necessary for information security and are expected to demonstrate a strong commitment to maintaining it.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading is-style-underline_hd has-vk-color-custom-4-color has-text-color has-link-color wp-elements-9ddb684c61923d2322649563818e1988\">4) <strong>Compliance with Laws, Regulations, and Contractual Requirements<\/strong><\/h3>\n\n\n\n<p>We will comply with all applicable laws, regulations, standards, and contractual obligations related to information security and will work to meet the expectations of our customers.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading is-style-underline_hd has-vk-color-custom-4-color has-text-color has-link-color wp-elements-8f1ffb61dca3ceb701cd1c95b7e86f94\">5) <strong>Response to Violations and Incidents<\/strong><\/h3>\n\n\n\n<p>In the event of a violation of laws, regulations, contracts, or incidents related to information security, we will take appropriate corrective actions to prevent recurrence.<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:6rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>Date of Establishment<\/strong>: July 1, 2021<\/p>\n\n\n\n<p><strong>Ryze Consulting Co., Ltd.<\/strong><\/p>\n\n\n\n<p><strong>CEO and Representative Director<\/strong>: William Delorme<\/p>\n\n\n\n<div class=\"wp-block-vk-blocks-spacer vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"margin-top:4rem\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"margin-top:2rem\"><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ryze Consulting\u2019s security policy highlights how we protect client data and continuously improve security practices to meet customer expectations.<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":45,"comment_status":"closed","ping_status":"closed","template":"","meta":{"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-6534","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/pages\/6534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/comments?post=6534"}],"version-history":[{"count":4,"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/pages\/6534\/revisions"}],"predecessor-version":[{"id":7781,"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/pages\/6534\/revisions\/7781"}],"wp:attachment":[{"href":"https:\/\/ryze-recruit.com\/en\/wp-json\/wp\/v2\/media?parent=6534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}