必博娱乐

Information Security Policy

Information Security Policy of the National Graduate Institute for Policy Studies

July 25, 2012

Regulations of the President

Revised by: September 3, 2019

I. Basic Policy for Information Security

1. Purpose

In our advanced information society, information assets are one of the most important assets of the National Graduate Institute for Policy Studies (hereinafter referred to as the “Institute”). Failure to properly protect our information assets could bring about stagnation in scientific research and educational activities at the Institute and lead to the loss of society’s confidence in the Institute. Accordingly, in order to encourage the Institute’s officers, employees and students to give their constant efforts to properly and strictly managing and using information assets, the Institute’s information security policy (hereinafter referred to as the “Policy”) is hereby established, with the purpose of promoting an understanding of the importance of information security.

2. Basic Principle for the Operation of Information Systems

In order to achieve the purpose mentioned in 1 above, the Institute’s information systems are operated stably and efficiently through superior organization and security, and are made available Institute-wide, pursuant to the Basic Regulations on the Operation of Information Systems prescribed below, so as to ensure the smooth and effective distribution of information.

3. Duties of Users

Persons who use the Institute’s information systems and those who engage in the operational services of these systems must use the systems according to the Policy and comply with the implementation regulations, etc. concerning the operation and use of the systems separately provided for (hereinafter referred to as the “regulations, etc. based on the Policy”).

4. Penal Provisions

Restrictions on use and other penalties imposed if the regulations, etc. based on the Policy are violated may be provided for in the respective regulations, etc.

II. Basic Regulations on the Operation of Information Systems

1. Purpose

The purpose of these Regulations is to provide for the necessary matters as concerns the operation and management of information systems at the Institute, thereby promoting the protection and utilization of information retained by the Institute and the implementation of appropriate information security measures.

2. Scope of Application

These Regulations apply to all persons who operate and manage the Institute’s information systems and all regular users and temporary users.

3. Definitions

In these Regulations, the terms specified in the following items have the meanings stipulated therein:

(1) Information systems

The following systems associated with information processing and information networks, including

devices connected to the Institute’s information networks:

(i) systems owned or managed by the Institute; and

(ii) systems provided to the Institute based on agreements, etc. with the Institute.

(2) Information

The following types of information managed by the information systems mentioned in (1) above:

(i) information recorded in an information system;

(ii) information recorded on external electronic or magnetic recording media; and

(iii) information stated in documents related to information systems (e.g. reference materials

concerning specifications, design, operation, management, and operational method).

(3) Information assets

Information systems, as well as information recorded in information systems, information recorded on

external electronic and magnetic recording media, and information stated in documents related to

information systems.

(4) Administrative information

Information which falls under either of the following:

(i) corporate documents to be regulated by the Regulations on Management of Corporate Documents

of National Graduate Institute for Policy Studies; or

(ii) other corporate documents designated by the Director-General of Administrative Bureau.

(5) Administrative information systems

Information systems that handle administrative information.

(6) Policy

The Basic Principles for the Operation of Information Systems and the Basic Regulations on the

Operation of Information Systems, established by the Institute.

(7) Implementation regulations

Regulations, standards and plans formulated based on the Policy.

(8) Procedures

Specific procedures, manuals and guidelines formulated based on the implementation regulations.

(9) Regular users

Employees and students who use the Institute’s information systems with permission for regular use.

(10) Temporary users

Persons other than employees and students, who use the Institute’s information systems with

permission for temporary use.

(11) Information security

Maintenance of confidentiality, integrity and availability of information assets.

(12) Electronic and magnetic records

Records prepared in electronic format, magnetic format or any other format that renders them

imperceptible through the senses alone, and used in information processing by computers.

Examples of recording media with recording formats that cause the records on them to be treated as

electronic and magnetic records:

Memories, hard disks, CDs, DVDs, MODs, magnetic tapes, magnetic cards, IC cards, two-dimensional

barcodes, QR codes, etc.

Examples of things that are not electronic or magnetic records:

Computer printouts, paper slips, paper forms and other sheets for data entry, and microfilm, that

render the record perceptible through the senses

(13) Information security incident

An incident or event caused intentionally or accidentally in relation to information security, which is

against the Institute’s regulations or laws.

(14) CSIRT

An abbreviation for Computer Security Incident Response Team, which is a team established within the

Institute to handle the Institute’s information security incidents.

(15) Labeling

Measures to enable all persons who handle information to share a common understanding of the

classification of that information. Labeling includes, in addition to labeling by way of identifying the

classification of each piece of information, other measures to ensure that persons handling information

share a common understanding of the classification of the relevant information. Other measures

include, for example, expressly designating in the regulations governing information systems the

classifications of information to be recorded in the relevant information system and ensuring that all

users of that system are aware of these classifications.

4. Information Security Supervisor

(1) The Institute has a Chief Information Security Officer (CISO) as the person responsible for the

operation of the Institute’s information systems, and the Vice President (in charge of general affairs)

assumes this position.

(2) The Information Security Supervisor deals with things related to the Policy and the regulations

based on it, and with the various issues presented by the information systems.

(3) The Information Security Supervisor may designate Institute information systems from among

those that are used as parts of the Institute-wide information infrastructure, which it is evaluated would

cause a particularly large impact if information security is breached.

(4) The Chief Information Security Officer supervises Institute-wide education and education for staff

members from the General Affairs Division.

(5) In the event that the Information Security Supervisor is unable to perform his/her duties, a person

designated in advance by the Information Security Supervisor performs those duties on his/her behalf.

(6) The Information Security Supervisor may appoint an expert with specialized knowledge and

experience in information security as an Information Security Adviser, if necessary.

5. Information Systems Operations Committee

(1) An Information Systems Operations Committee is established as the decision-making body for the

smooth operation of the Institute’s information systems.

(2) The Information Systems Operations Committee is responsible for the following particulars:

(i) those that are related to the amendment and repeal of the Policy and the implementation

guidelines for Institute-wide education;

(ii) those that are related to the formulation, amendment and repeal of regulations and procedures on

the operation and use of the information systems and to education;

(iii) those that are related to annual training plans for education on the operation and use of the

information systems;

(iv) those that are related to the formulation, amendment and repeal of regulations on operational risk

management for the information systems as well as the monitoring of the status of implementation

of these regulations;

(v) those that are related to the formulation, amendment and repeal of the information security audit

regulations as well as the implementation of these regulations;

(vi) those that are related to the formulation, amendment and repeal of emergency action plans for

the information systems as well as the implementation of these action plans; and

(vii) those that are related to the discussion and implementation of the measures to prevent the

recurrence of information security incidents.

(3) Operations Committee is to share information related to reports from CSIRT with officers and

employees as necessary, and submit proposals and reports to the Board of Research and Education

and other bodies with regard to matters that may have a significant impact on the Institute’s

Information systems.

6. Members of the Information Systems Operations Committee

The Information Systems Operations Committee is composed of the chairperson and the following members:

(i) an Information Security Implementation Officer;

(ii) an Information Security Operations Officer; and

(iii) other persons whom the Information Security Supervisor considers necessary.

7. Chairperson of the Information Systems Operations Committee

(1) The Information Security Supervisor serves as the chairperson of the Information Systems

Operations Committee.

(2) The chairperson presides over the Committee’s affairs.

8. Information Security Implementation Officer

(1) The Institute has an Information Security Implementation Officer, and the Director-General of

Administrative Bureau assumes this position.

(2) The Information Security Implementation Officer implements the Policy, the regulations based on it,

and procedure with respect to the development and operation of the Institute’s information systems,

based on the Information Security Supervisor’s directions.

(3) The Information Security Implementation Officer is to supervise the implementation of education for

those engaged in the operation of the information systems and for the regular users of the information

systems.

(4) The Information Security Implementation Officer represents the Institute in issuing communications

and reports concerning the security of the Institute’s information systems.

9. Information Security Audit Officer

(1) The Institute has an Information Security Audit Officer, and the Director of Audit Office assumes this

position.

(2) The Information Security Audit Officer supervises the administrative work for audits, based on the

President’s directions.

10. Organizational Unit for Management and Operation of the Information Systems Operations Committee

In order to ensure the smooth operation of the Information Systems Operations Committee, an organizational unit for the management and operation of the Information Systems Operations Committee (hereinafter referred to as the “Management Unit”) is to be created and assigned to the General Affairs Division.

11. Businesses Handled by Management Unit

The Management Unit conducts the following business in accordance with instructions from an Information Security Implementation Officer:

(1) business related to the operation of the Information Systems Operations Committee;

(2) coordination for the implementation of the Policy in relation to the operation and use of the

Institute’s information system;

(3) coordination for the implementation of plans including training plans, risk management and

emergency action plans; and

(4) liaison and reporting in relation to the security of the Institute’s information system.

12. Information Security Operations Officer

(1) The Institute has an Information Security Operations Officer, and the Director of General Affairs

Division assumes this position.

(2) The Information Security Operations Officer is in charge of deciding the Institute’s operational policy

and coping with the various issues presented by the information systems.

(3) The Information Security Operations Officer is in charge of deciding the structure of the information

systems and coping with technical problems.

(4) The Information Security Operations Officer implements education for staff members from the

General Affairs Division to ensure compliance with the Policy, the regulations based on it, and

procedure.

13. Appointment of Information Security Advisor

(1) The Chief Information Security Officer may appoint a person with expert knowledge and experience

related to information security as an Information Security Advisor.

(2) The Chief Information Security Officer determines the specific business of an Information Security

Advisor, including the following:

(i) providing advice to the Chief Information Security Officer on the advancement of implementation of

the information security measures for the entire Institute;

(ii) providing advice on the formulation of information security regulations;

(iii) providing advice on the formulation of a plan for advancement of implementation of information

security measures;

(iv) providing advice on the generation of an educational plan as well as assistance for the

development of teaching materials and implementation of education;

(v) providing advice on technical matters related to information security;

(vi) in case of contracting out the designing and development of information systems, providing advice

on the formulation of the information security requirements and specifications to be presented as

part of the terms and conditions for procurement;

(vii) daily consultation for users;

(viii) assistance for handling information security incidents; and

(ix) in addition to the business specified in the preceding items, providing advice or assistance related

to information security measures.

14. Development of Organizational Structure for Handling Information Security Incidents

(1) The Chief Information Security Officer is to create a CSIRT to ensure swift and smooth response

to the occurrence of any information security incidents and make clear its roles.

(2) The Chief Information Security Officer is to appoint employees who are determined to have expert

knowledge or capability as CSIRT members. Among CSIRT members, a CSIRT Manager is to be

appointed to take charge of handling the Institute’s information security incidents.

(3) The Chief Information Security Officer is to develop an organizational structure so that the

occurrence of any information security incidents will be immediately reported to him/her.

15. Roles of CSIRT

The Chief Information Security Officer is to provide the roles of CSIRT, including the following, shall be provided for separately:

(1) receiving reports on information security incidents from a section that accepts reports;

(2) reporting information security incidents to the Chief Information Security Officer and other

employees;

(3) liaison with outside parties; and

(4) instruction and recommendation on emergency measures to prevent the expansion of d amage.

16. Division of Roles

(1) In the operation of information security measures, it is prohibited for the same person to play the

following roles concurrently:

(i) a person who applies for approval or permission, and the person who gives that approval or

permission (hereinafter referred to as a “person authorized to give approval, etc.”); and

(ii) a person who is subject to an audit, and the person who conducts that audit

(2) Notwithstanding the preceding paragraph, if, in light of the official authority of a person authorized

to give approval, etc. and other factors, it is found to be inappropriate for such person to determine

whether to give approval or permission (hereinafter referred to as “approval, etc.”), an employee is to

apply for approval, etc. to the superior of the person authorized to give approval, etc. In this, if an

employee obtains approval, etc. from the superior of the person authorized to give approval, etc., the

employee is not required to obtain approval, etc. from the person authorized to give approval, etc.

(3) (Whenever a superior of an employee gives approval, etc. to the employee) in a case referred to in

the preceding paragraph, the employee is to take measures that are in conformity with the points of

compliance as concerns the person authorized to give approval, etc.

17. Classification of Information

The Information Systems Operations Committee is to develop regulations on the classification and restricted use as well as labeling of information handled by information systems, in terms of confidentiality, integrity and availability for electronic and magnetic records, and in terms of confidentiality for documents.

18. Prevention of Acts That May Lead to a Decline in Information Security Level Outside the Institute

(1) The Information Security Implementation Officer develops regulations concerning measures to

prevent acts that may lead to a decline in the information security level outside the Institute.

(2) Persons who operate and manage the Institute’s information systems as well as regular users and

temporary users of these systems take measures to prevent acts that may lead to a decline in the

information security level outside the Institute.

19. Outsourced Management of Information Systems Operations

If the whole or part of the operations of the Institute’s information systems are outsourced to a third party, the Information Security Supervisor is to take the necessary measures to ensure that the third party will implement information security thoroughly.

20. Information Security Audit

The Information Security Audit Officer conducts an audit to confirm that security measures for information systems are being implemented in accordance with procedures that are based on the Policy. An information security audit is governed by regulations on information security audits separately provided.

21. Review

Persons who formulated the Policy, the implementation regulations and procedures are to consider the necessity of reviewing these provisions in a timely manner, and if they find it necessary to review any of them, they are to report this to the Information Systems Operations Committee.

Supplementary Provisions

This Security Policy comes into effect as of March 27, 2012.

Supplementary Provisions

This Security Policy comes into effect as of July 25, 2012.

Supplementary Provisions

This Security Policy comes into effect as of October 1, 2019.

7-22-1 Roppongi, Minato-ku, Tokyo 106-8677

TEL : +81-(0)3-6439-6000     
FAX : +81-(0)3-6439-6010

PAGE TOP

Print Out