Terms of Use / Disclaimer

The contents of this website are provided by Japan Asset Management Platform Co., Ltd. for informational purposes only. The information herein is not intended to be, and shall not be construed as, an offer to sell or a solicitation of an offer to buy any securities or other financial instruments, including any securities of our company.
This website is not directed at or intended for distribution to or use by any person or entity who is a citizen or resident of or located in any jurisdiction where such distribution, publication, or use would be contrary to law or regulation. This includes, but is not limited to, the United States and U.S. persons.
This website may contain forward-looking statements regarding our future performance, which are subject to risks and uncertainties. These statements are not guarantees of future performance, and actual results may differ. We undertake no obligation to update or revise any forward-looking statements.
While we strive to ensure the accuracy of the information, we do not guarantee its completeness or reliability. All information is subject to change without notice.
By clicking on the "I Agree" link below you acknowledge that you have read and understand the information above.

Information Security Policy


1. Policy


It is essential for Japan Asset Management Platform Co.,Ltd., JAMP Financial Solutions Co., Ltd., JAMP Business Innovation Co., Ltd., and JAMP Fund Management Co., Ltd. (hereinafter collectively referred to as "the Group") to implement appropriate security management of information assets in order to continuously and stably perform the Group's operations and fulfill its social mission. Based on this understanding, the Group will comply with its company regulations, including the Information Security Basic Policy (hereinafter referred to as "this Policy"), when conducting various operations. Furthermore, the Group will establish an Information Security Management System based on JIS Q 27001 (ISO/IEC 27001), strive to establish and continuously improve information security, and endeavor to appropriately protect information assets.

2. Compliance with This Policy and Laws and Regulations


Regarding the handling of information assets, we will comply with laws, regulations, standards, and other requirements, in addition to this Policy and other company regulations of our Group.

3. Protection of Information Assets


To ensure the confidentiality, integrity, and availability of our Group's information assets and to maintain and manage them safely and appropriately, we identify foreseeable threats and vulnerabilities, determine risks, and implement appropriate protective measures against those risks. We also exercise necessary and appropriate supervision over our employees and contractors.

4. Implementation of Education and Training


We will provide necessary information security education to officers and employees, thoroughly disseminate this policy and other company regulations of our group, and promote the enhancement of information security awareness.

5. Response to Violations and Incidents


In the event of an information security violation or incident, we will promptly implement emergency measures, investigate the cause, implement permanent countermeasures, and strive to prevent recurrence.

6. Continuous Maintenance and Improvement


We will monitor the implementation status of information security measures based on our Group's company regulations, including this policy, and strive for continuous maintenance and improvement.