English Langage

ー Information Security Policy

  • Established on July 31, 2015
  • Revised on February 1, 2023
  • HIKE Inc.
  • President and Representative Director: Masataka Mikami

With the mission of conveying the enjoyment of games to our customers in an easy-to-understand manner, HIKE Inc. (hereinafter referred to as "the Company") is involved in the production of game-related books, instruction manuals, websites, and various other fields related to games, and provides services in these fields. Protecting customer information obtained through these activities and the information assets held by the Company is our social responsibility, and at the same time, an important task for us. Therefore, for the purpose of protecting and preventing leakage of all information entrusted to us by our customers, we have established an Information Security Policy which we promote.

Information Security Management System
In order to promote information security, the Company implements measures related to information security through a system consisting of the Representative Director and its advisory body, with the Information Security Committee at the center.
Protection of Information Assets
The Company recognizes all information assets in our possession from the perspective of confidentiality, integrity, and availability, and has established systematic procedures and evaluation criteria for risk assessment. We will strive to protect information assets appropriately.
Development of Internal Regulations
The Company shall establish internal rules based on the Information Security Policy, and indicate a clear policy on the handling of information assets in general, as well as take a strict stance against information leakage.
Education and Training
The Company shall provide education and trainings to all officers and employees on a regular basis for the purpose of thorough implementation and improvement of information security initiatives.
Management of Outsourcers
When outsourcing business, the Company requests that the outsourced party ensures the necessary security level. We endeavor to prevent information leakage by thoroughly examining their suitability from the security point of view.
Information Security Related Incident Prevention and Response
In addition to striving to prevent information security incidents, the Company will promptly take appropriate measures, including measures to prevent recurrence, in the event of an incident.
Compliance with Laws and Regulations
The Company complies with all laws and other guidelines applicable to our information security initiatives.
Continuous Improvement
In order to confirm that this policy is implemented, the Company regularly evaluates the information security management system and strives for its continuous improvement.