U-KOMI

Information Security Policy

Subspire Inc. (hereinafter referred to as "the Company") hereby establishes the following Information Security Policy to ensure the safety and reliability of "U-KOMI", our review collection and utilization tool (hereinafter referred to as "the Service"). We are committed to promoting awareness of this policy both internally and externally, and to continuously improving our practices.


1. Protection of Information Assets

We recognize the importance of protecting information assets such as review data, personal information, and access logs entrusted to us by client companies and end users. We will safeguard these assets from risks such as unauthorized access, leakage, alteration, loss, or destruction through appropriate technical and organizational measures.


2. Access Control

Access to information assets in the operation of the Service is strictly limited to the minimum level necessary. Access rights are managed with rigor, and similar controls are imposed on external contractors under proper supervision.


3. Data Storage and Security

We operate the Service in an environment that adheres to strict security standards. Data is stored and processed securely, and all handling and storage locations are managed in compliance with applicable laws and regulations.


4. Internal Training and Awareness

To foster a security-conscious culture, we provide regular training and education to our employees and relevant personnel. This ensures understanding of information security and promotes proper behavior in daily operations.


5. Security Incident Response

In the event of a security incident or threat, we will respond promptly in accordance with internal procedures. We will also conduct root cause analysis and take necessary measures to prevent recurrence.


6. Compliance with Laws and Regulations

We comply with all applicable laws and guidelines, including the Act on the Protection of Personal Information, and maintain an information management framework that fulfills our social responsibilities.


7. Continuous Improvement

To maintain and enhance the effectiveness of our information security management, we regularly review and update this policy based on internal audits and external requirements, ensuring continuous improvement.


Date of Enactment: July 2025
Subspire Inc.
U-KOMI Operations Manager