<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#x30D5;&#x30A9;&#x30FC;&#x30C6;&#x30A3;&#x30A8;&#x30F3;&#x30B9;&#x30B3;&#x30F3;&#x30B5;&#x30EB;&#x30C6;&#x30A3;&#x30F3;&#x30B0;&#x682A;&#x5F0F;&#x4F1A;&#x793E;&#xFF5C;NTT&#x30C7;&#x30FC;&#x30BF;&#x30B0;&#x30EB;&#x30FC;&#x30D7;</provider_name><provider_url>https://www.fortience.com</provider_url><author_name>depart-admin</author_name><author_url>https://www.fortience.com/author/depart-admin/</author_url><title>Information Security Policy | Fortience Consulting Inc. | Fortience Consulting Inc. | NTT DATA Group</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="NP3zM2sMDp"&gt;&lt;a href="https://www.fortience.com/en/policy/security/"&gt;Principle Information Security Policy&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.fortience.com/en/policy/security/embed/#?secret=NP3zM2sMDp" width="600" height="338" title="&#x201C;Principle Information Security Policy&#x201D; &#x2014; &#x30D5;&#x30A9;&#x30FC;&#x30C6;&#x30A3;&#x30A8;&#x30F3;&#x30B9;&#x30B3;&#x30F3;&#x30B5;&#x30EB;&#x30C6;&#x30A3;&#x30F3;&#x30B0;&#x682A;&#x5F0F;&#x4F1A;&#x793E;&#xFF5C;NTT&#x30C7;&#x30FC;&#x30BF;&#x30B0;&#x30EB;&#x30FC;&#x30D7;" data-secret="NP3zM2sMDp" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.fortience.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.</description><thumbnail_url>https://www.fortience.com/wp-content/uploads/2025/08/OGP.jpg</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>630</thumbnail_height></oembed>
