top of page

Information Security Policy

Digital Leo 

​

1. Purpose

The purpose of this Information Security Policy is to ensure that information assets handled by Digital Leo are protected against unauthorized access, disclosure, alteration, and destruction. This policy establishes guidelines for safeguarding company systems, client data, and operational processes in order to maintain confidentiality, integrity, and availability of information.

​

2. Scope

This policy applies to all employees, contractors, and third parties who have access to Digital Leo systems, data, and services. It covers all digital platforms, communication channels, and operational tools used to support client services.

​

3. Information Security Principles

Digital Leo is committed to maintaining the following security principles:

  • Confidentiality – Ensuring that sensitive information is accessible only to authorized individuals.

  • Integrity – Protecting information from unauthorized modification or tampering.

  • Availability – Ensuring systems and data remain accessible for authorized business operations.

​​

4. Access Control

Access to systems and client data is restricted to authorized personnel only and is granted based on business requirements. Appropriate authentication methods such as passwords and account permissions are used to control access.

​

5. Data Protection

Digital Leo takes reasonable measures to protect client and business data by:

  • Using secure communication channels and trusted service platforms

  • Limiting data access to authorized personnel

  • Avoiding unnecessary storage of sensitive information

  • Following applicable data protection and privacy requirements

Client interactions and messaging data related to marketing campaigns may be processed through third-party platforms such as LINE Official Account services, which maintain their own enterprise-level security controls.

​

6. Third-Party Services

Digital Leo may rely on reputable third-party platforms and service providers to deliver certain services. These providers are selected based on reliability, security capabilities, and compliance with applicable standards.

​

7. Risk Management

Digital Leo periodically reviews operational processes to identify potential risks related to information security. Appropriate mitigation measures are implemented where necessary to reduce potential security risks.

​

8. Incident Management

If a security incident or data breach is suspected, the issue will be investigated promptly. Appropriate corrective actions will be taken to contain the incident and prevent recurrence.

​

9. Policy Review

This policy will be reviewed periodically and updated as necessary to reflect changes in business operations, technology, and regulatory requirements.

bottom of page