Security
Shoki Co., Ltd. ("we"/"us") treats information security as a core business priority and works to apply appropriate safeguards in delivering the Service.
1. Authentication and access control
The Service uses external identity providers such as Microsoft accounts for authentication. Each user gets appropriate permissions, and access is limited to what is necessary for the work at hand.
2. Encrypted communication
The Service uses HTTPS for encrypted communication, protecting user actions and transmitted data from unauthorized interception by third parties.
3. Data storage and management
User data is managed on cloud platforms including Microsoft Azure. Data storage and processing run under appropriate access controls and operational discipline.
4. Logging and audit
For stable operation and misuse prevention, we may collect and retain operation and system logs. These logs are used to improve operations and maintain security.
5. Vulnerability and risk management
We investigate and address system vulnerabilities and potential risks as needed, working to sustain and raise the security level.
6. Incident response
In the event of an incident such as a data leak or system outage, we will work to assess the impact, minimize damage, and coordinate with relevant parties as needed.
7. External services and providers
The Service may rely on external cloud services and third-party providers where operationally necessary. We work to manage and supervise these relationships appropriately.
8. Continuous improvement
In light of technology trends and societal expectations, we continuously review and improve our security controls and operations.
Effective date: December 2025
Operator: Shoki Co., Ltd. (株式会社昌己)
LMS / AI-enablement platform by aprendi.cloud