Bewith’s Security
Maintaining and ensuring security is fundamental to Bewith’s business, and our efforts in this regard are clearly stated in the Security Policy.
In order to maintain the trust of customers toward our client companies and protect their social credibility, Bewith strives to maintain and improve security in various aspects.
Bewith’s Privacy Policy defines our policy to surely protect the information of customers that our client companies have entrusted us with.

Security Certifications
Bewith has obtained certifications for strict privacy and security standards, and all of our domestic offices comply with these standards in both designing and operating business.
Protecting Customer Information



Physical Measures
Restrictions on bringing personal items into work areas
Personal lockers are provided at each location, and employees are required to store their personal belongings such as bags and mobile devices in these lockers upon arrival.

Entry of rooms by authorized persons only (entry/exit records)
All doors to internal areas are locked with electronic locks which require employees to use an individually issued ID card to unlock the doors and enter. Entry/exit information is recorded and stored.

Surveillance cameras in work areas
Surveillance cameras are installed in work areas according to operational requirements in order to record and store activities within these areas.

Technical Measures
Anti-virus protection
All PCs used are equipped with anti-virus software, and the software is kept up to date with the latest versions and definition files while being monitored at all times.

Restrictions on connecting external devices
USB drives and other storage media are restricted by policy, preventing them from being recognized when connected to any PC.

Firewall
A firewall is installed on the internal network to counter external threats.

Full implementation of endpoint detection and response (EDR)
While the utilization of cloud-based services and changes in working environments such as teleworking have increased convenience, cyber attacks, including standardized attacks, are evolving daily thus increasing security risks for companies.
Endpoint detection and response (EDR) is a cyber security platform that, based on the premise that threats to endpoints cannot be fully prevented, monitors the network environment for malicious activity by suspicious parties and analyzes the information using an AI engine on the cloud to detect threats.
Bewith has implemented EDR on all devices to quickly detect and address anomalies, minimizing the impact and damage to business operations.

Access control
Access to internal systems is controlled by granting appropriate permissions. Even with our cloud-based systems, IP address restrictions are in place to prevent access to internal systems from an external network.

Backups
Internal data is backed up regularly to protect it from the threat of loss or destruction.

Human Measures
Conclusion of confidentiality agreements
All employees who join the Company are required to maintain confidentiality and strive to protect information.

Establishment of a security organization
The Security Committee chaired by the President and CEO has been established to monitor the implementation and effectiveness of security measures, conduct appropriate reviews, and make continuous improvements.

Creation of rules and procedures
In order to maintain our security management system, the details of our security measures are clearly defined in written rules, procedures, guidelines, and other documents.

Regular education and training
Security-related training is provided to all employees on a regular basis in an effort to familiarize employees with the latest knowledge and raise awareness. In addition, we conduct training as necessary to raise awareness of information security.
