{"id":2793,"date":"2025-09-03T20:37:58","date_gmt":"2025-09-03T11:37:58","guid":{"rendered":"https:\/\/www.fortience.com\/?page_id=2793"},"modified":"2025-09-17T12:32:50","modified_gmt":"2025-09-17T03:32:50","slug":"security","status":"publish","type":"page","link":"https:\/\/www.fortience.com\/en\/policy\/security\/","title":{"rendered":"Principle Information Security Policy"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":2785,"menu_order":276,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_locale":"en_US","_original_post":"https:\/\/new-qunie.nexthop.ne.jp\/?page_id=668","footnotes":""},"class_list":["post-2793","page","type-page","status-publish","hentry","en-US"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy | Fortience Consulting Inc. | Fortience Consulting Inc. | NTT DATA Group<\/title>\n<meta name=\"description\" content=\"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fortience.com\/en\/policy\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy | Fortience Consulting Inc. | Fortience Consulting Inc. | NTT DATA Group\" \/>\n<meta property=\"og:description\" content=\"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fortience.com\/en\/policy\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortience Consulting Inc. | NTT DATA Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T03:32:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fortience.com\/wp-content\/uploads\/2025\/08\/OGP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fortience.com\/en\/policy\/security\/\",\"url\":\"https:\/\/www.fortience.com\/en\/policy\/security\/\",\"name\":\"Information Security Policy | Fortience Consulting Inc. | NTT DATA Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.fortience.com\/#website\"},\"datePublished\":\"2025-09-03T11:37:58+00:00\",\"dateModified\":\"2025-09-17T03:32:50+00:00\",\"description\":\"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fortience.com\/en\/policy\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fortience.com\/en\/policy\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fortience.com\/en\/policy\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"TOP\",\"item\":\"https:\/\/www.fortience.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Policy\",\"item\":\"https:\/\/www.fortience.com\/en\/policy\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Principle Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fortience.com\/#website\",\"url\":\"https:\/\/www.fortience.com\/\",\"name\":\"WP\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\",\"description\":\"\u30d5\u30a9\u30fc\u30c6\u30a3\u30a8\u30f3\u30b9\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u306f\u3001NTT\u30c7\u30fc\u30bf\u30b0\u30eb\u30fc\u30d7\u306e\u7dcf\u5408\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4f1a\u793e\u3067\u3059\u3002\u9ad8\u3044\u5c02\u9580\u6027\u3092\u6301\u3061\u3001\u6df1\u3044\u696d\u52d9\u7406\u89e3\u306b\u57fa\u3065\u304f\u8ab2\u984c\u89e3\u6c7a\u529b\u306b\u3001\u6700\u5148\u7aef\u306e\u30c7\u30b8\u30bf\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3092\u639b\u3051\u5408\u308f\u305b\u3001\u304a\u5ba2\u69d8\u306e\u5909\u9769\u3068\u65b0\u3057\u3044\u4fa1\u5024\u5275\u9020\u3092\u652f\u63f4\u3057\u307e\u3059\u3002\",\"alternateName\":\"WP\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3067\u3059\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fortience.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy | Fortience Consulting Inc. | Fortience Consulting Inc. | NTT DATA Group","description":"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fortience.com\/en\/policy\/security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy | Fortience Consulting Inc. | Fortience Consulting Inc. | NTT DATA Group","og_description":"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.","og_url":"https:\/\/www.fortience.com\/en\/policy\/security\/","og_site_name":"Fortience Consulting Inc. | NTT DATA Group","article_modified_time":"2025-09-17T03:32:50+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.fortience.com\/wp-content\/uploads\/2025\/08\/OGP.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fortience.com\/en\/policy\/security\/","url":"https:\/\/www.fortience.com\/en\/policy\/security\/","name":"Information Security Policy | Fortience Consulting Inc. | NTT DATA Group","isPartOf":{"@id":"https:\/\/www.fortience.com\/#website"},"datePublished":"2025-09-03T11:37:58+00:00","dateModified":"2025-09-17T03:32:50+00:00","description":"This page outlines the basic information security policy of Fortience Consulting Inc. Based on our information security policy, we are committed to ensuring the confidentiality, integrity, and availability of information assets through appropriate and secure management.","breadcrumb":{"@id":"https:\/\/www.fortience.com\/en\/policy\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fortience.com\/en\/policy\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fortience.com\/en\/policy\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"TOP","item":"https:\/\/www.fortience.com\/en\/"},{"@type":"ListItem","position":2,"name":"Policy","item":"https:\/\/www.fortience.com\/en\/policy\/"},{"@type":"ListItem","position":3,"name":"Principle Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.fortience.com\/#website","url":"https:\/\/www.fortience.com\/","name":"WP\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8","description":"\u30d5\u30a9\u30fc\u30c6\u30a3\u30a8\u30f3\u30b9\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u306f\u3001NTT\u30c7\u30fc\u30bf\u30b0\u30eb\u30fc\u30d7\u306e\u7dcf\u5408\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4f1a\u793e\u3067\u3059\u3002\u9ad8\u3044\u5c02\u9580\u6027\u3092\u6301\u3061\u3001\u6df1\u3044\u696d\u52d9\u7406\u89e3\u306b\u57fa\u3065\u304f\u8ab2\u984c\u89e3\u6c7a\u529b\u306b\u3001\u6700\u5148\u7aef\u306e\u30c7\u30b8\u30bf\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3092\u639b\u3051\u5408\u308f\u305b\u3001\u304a\u5ba2\u69d8\u306e\u5909\u9769\u3068\u65b0\u3057\u3044\u4fa1\u5024\u5275\u9020\u3092\u652f\u63f4\u3057\u307e\u3059\u3002","alternateName":"WP\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3067\u3059","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fortience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/pages\/2793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/comments?post=2793"}],"version-history":[{"count":2,"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/pages\/2793\/revisions"}],"predecessor-version":[{"id":3930,"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/pages\/2793\/revisions\/3930"}],"up":[{"embeddable":true,"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/pages\/2785"}],"wp:attachment":[{"href":"https:\/\/www.fortience.com\/wp-json\/wp\/v2\/media?parent=2793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}