{"id":60116,"date":"2023-11-22T10:22:34","date_gmt":"2023-11-22T01:22:34","guid":{"rendered":"https:\/\/monolith.law\/en\/?p=60116"},"modified":"2024-03-04T13:30:19","modified_gmt":"2024-03-04T04:30:19","slug":"information-leak-crisis-management","status":"publish","type":"post","link":"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management","title":{"rendered":"Learning Crisis Management and the Role of Lawyers from the Case of Information Leakage of 650,000 Cases at T\u00c5\u008dken Corp."},"content":{"rendered":"\n<p>On April 1, 2005 (Heisei 17), the Japanese Personal Information Protection Law was fully implemented, and businesses handling personal information are obliged to take safety management measures. However, incidents of personal information leakage are unceasing.<\/p>\n\n\n\n<p>When an information leakage incident occurs, the response procedure and speed are particularly important. Especially in small and medium-sized enterprises without specialized information security staff, it is conceivable that they may not be able to decide how to respond immediately.<\/p>\n\n\n\n<p>Therefore, this time, based on the response of T\u014dken Corporation to the information leakage incident, we will explain the crisis management system for information leakage.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Overview_of_Information_Leakage\" title=\"Overview of Information Leakage\">Overview of Information Leakage<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Discovery_of_Unauthorized_Access_and_Initial_Response\" title=\"Discovery of Unauthorized Access and Initial Response\">Discovery of Unauthorized Access and Initial Response<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Key_Points_of_Initial_Response\" title=\"Key Points of Initial Response\">Key Points of Initial Response<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Press_Release_Following_the_Discovery_of_Information_Leakage\" title=\"Press Release Following the Discovery of Information Leakage\">Press Release Following the Discovery of Information Leakage<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#About_the_Content_of_the_Leaked_Information\" title=\"About the Content of the Leaked Information\">About the Content of the Leaked Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#About_Future_Measures\" title=\"About Future Measures\">About Future Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Q_A_on_Damage_Compensation_etc\" title=\"Q&amp;A on Damage Compensation, etc.\">Q&amp;A on Damage Compensation, etc.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Questions_Remain_About_the_Timing_of_the_Initial_Press_Release\" title=\"Questions Remain About the Timing of the Initial Press Release\">Questions Remain About the Timing of the Initial Press Release<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Key_Points_for_Notification_Reporting_and_Disclosure\" title=\"Key Points for Notification, Reporting, and Disclosure\">Key Points for Notification, Reporting, and Disclosure<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#In_Case_of_Criminal_Activity\" title=\"In Case of Criminal Activity\">In Case of Criminal Activity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#In_Case_of_Possible_Leakage_of_Personal_Credit_Information\" title=\"In Case of Possible Leakage of Personal Credit Information\">In Case of Possible Leakage of Personal Credit Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#In_Case_of_Large_Scale_or_Wide_Impact_or_When_Individual_Notification_to_All_Stakeholders_is_Difficult\" title=\"In Case of Large Scale or Wide Impact, or When Individual Notification to All Stakeholders is Difficult\">In Case of Large Scale or Wide Impact, or When Individual Notification to All Stakeholders is Difficult<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Announcement_of_the_Second_Press_Release\" title=\"Announcement of the Second Press Release\">Announcement of the Second Press Release<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#The_Central_Role_of_the_Crisis_Response_Headquarters\" title=\"The Central Role of the Crisis Response Headquarters\">The Central Role of the Crisis Response Headquarters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Summary\" title=\"Summary\">Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/monolith.law\/en\/general-corporate\/information-leak-crisis-management\/#Introduction_to_Our_Firm%E2%80%99s_Measures\" title=\"Introduction to Our Firm&#8217;s Measures\">Introduction to Our Firm&#8217;s Measures<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Overview_of_Information_Leakage\"><\/span>Overview of Information Leakage<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The main details regarding the information leakage caused by unauthorized access at T\u014dken Corporation are as follows:<\/p>\n\n\n\n<ul>\n<li>Occurrence: Over a period of 24 days from August 20, 2020, to September 12, 2020<\/li>\n\n\n\n<li>Discovery: October 20, 2020<\/li>\n\n\n\n<li>Cause: The server storing various user information was illegally accessed by a third party via the group&#8217;s homepage<\/li>\n\n\n\n<li>Target: Inquirers to the group company&#8217;s site, members, and applicants for various campaigns<\/li>\n\n\n\n<li>Information: &#8220;Email address&#8221;, &#8220;Name&#8221;, &#8220;Address&#8221;, &#8220;Phone number&#8221;, &#8220;Password&#8221;, &#8220;Gender&#8221;, &#8220;Date of birth&#8221;, etc.<\/li>\n\n\n\n<li>Number of cases: There is a possibility of information leakage in a total of 657,096 personal information cases<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Discovery_of_Unauthorized_Access_and_Initial_Response\"><\/span>Discovery of Unauthorized Access and Initial Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>On October 20, 2020, Tokken Corporation discovered unauthorized access to their operated website &#8220;Naslack Kitchen&#8221; during a regular inspection of their website, and took the following initial actions.<\/p>\n\n\n\n<ul>\n<li>As an emergency security measure, &#8220;Naslack Kitchen&#8221; was shut down and all services provided from the site were suspended.<\/li>\n\n\n\n<li>An &#8220;Information Security Measures Headquarters&#8221; was established and consultations were held with external third-party organizations.<\/li>\n\n\n\n<li>By November 11, a survey of the entire group&#8217;s websites was conducted, temporary vulnerability corrections were made, and the maximum number of leaks and items were confirmed.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Points_of_Initial_Response\"><\/span>Key Points of Initial Response<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When the risk of information leakage due to unauthorized access is confirmed, the following measures must be taken immediately to prevent the spread of damage, secondary damage, and recurrence.<\/p>\n\n\n\n<ul>\n<li>Confirmation of the facts (cause of unauthorized access, route, etc.)<\/li>\n\n\n\n<li>Shutdown of the device or site that was subjected to unauthorized access<\/li>\n\n\n\n<li>Disconnection of the device or site that was subjected to unauthorized access from the network<\/li>\n<\/ul>\n\n\n\n<p>What needs to be careful at this time is to take measures to preserve evidence so as not to erase the evidence left on the system without making careless operations.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2021\/08\/Information-leak-crisis-management-2.jpg\" alt=\"\" class=\"wp-image-36554\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Press_Release_Following_the_Discovery_of_Information_Leakage\"><\/span>Press Release Following the Discovery of Information Leakage<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The initial announcement was made on the homepage of T\u014dken Corporation on November 17, 2020 (Reiwa 2).<\/p>\n\n\n\n<p>The announcement detailed the overview of the unauthorized access, future countermeasures, and other information. It also included a comprehensive Q&amp;A section regarding the information leakage incident due to unauthorized access.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>T\u014dken Corporation and our group companies (hereinafter referred to as our group) confirmed on October 20, 2020 (Reiwa 2), that our group&#8217;s network had been subjected to unauthorized access by a third party. As a result, there is a possibility that personal information such as inquiries to Home Mate, which is operated by our group, member information of group companies, and applicant information for various campaigns, etc., may have been leaked externally.<\/p>\n<\/blockquote>\n\n\n\n<p><a href=\"http:\/\/web.archive.org\/web\/20201117041922\/https:\/www.token.co.jp\/corp\/information\/about_unauthorized\/\" target=\"_blank\" rel=\"noreferrer noopener\">About the leakage of personal information due to unauthorized access[ja]<\/a><\/p>\n\n\n\n<p>The <a href=\"http:\/\/web.archive.org\/web\/20201117120104\/https:\/www.token.co.jp\/corp\/information\/about_unauthorized\/pdf\/bs2_related_inquiry_list.pdf#zoom=100\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Q&amp;A on the Information Leakage Incident Due to Unauthorized Access&#8221;[ja]<\/a> linked on the above web page includes the following content:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"About_the_Content_of_the_Leaked_Information\"><\/span>About the Content of the Leaked Information<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: What information was leaked this time?<br> A: We believe that &#8220;name&#8221;, &#8220;address&#8221;, &#8220;telephone number&#8221;, &#8220;email address&#8221;, and &#8220;password&#8221; have been leaked on all sites, including those operated by our group companies.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: Was credit card information leaked?<br> A: Our sites, including those operated by our group companies, do not hold any information such as credit card numbers or My Number (Japanese Individual Number) that can be used for personal identification, so there is no risk of leakage.<\/p>\n<\/blockquote>\n\n\n\n<p>In explaining the leaked information, it is possible to avoid unnecessary anxiety and confusion by clearly stating \u2460 information that may have been leaked and \u2461 information that is not at risk of leakage.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2021\/08\/Information-leak-crisis-management-1.jpg\" alt=\"\" class=\"wp-image-36553\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"About_Future_Measures\"><\/span>About Future Measures<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: Is it safe to continue using the sites, including those of T\u014dken&#8217;s group companies?<br> A: Security enhancements against similar unauthorized access have been completed on all sites operated by our group, including group companies.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: How will you manage information in the future?<br> A: In the future, we will undergo checks by third-party investigation agencies as necessary, and if any vulnerabilities are found on the site, we will immediately correct them and strive for stricter information management.<\/p>\n<\/blockquote>\n\n\n\n<p>In future measures, it is important to carefully explain the security response of the site that the user was using, the possibility of reuse, and the future information management system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_A_on_Damage_Compensation_etc\"><\/span>Q&amp;A on Damage Compensation, etc.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: Will apology money or nuisance fees be paid to those who suffered damage from the information leakage?<br> A: Based on the information leaked due to this unauthorized access, we do not plan to pay apology money or nuisance fees. However, if you have suffered financial damage due to this information leakage and can present specific evidence, please consult with our &#8220;Personal Information Consultation Desk&#8221;.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Q: There was a withdrawal that I don&#8217;t remember. Can I get compensation?<br> A: If there has been a withdrawal from your account that you do not remember, we ask that you directly contact the company that made the withdrawal. Also, if it is confirmed that this information leakage led to a withdrawal that you do not remember, we apologize for the inconvenience, but please report to our &#8220;Personal Information Consultation Desk&#8221;.<\/p>\n<\/blockquote>\n\n\n\n<p>The company clearly states its policy that it will not pay apology money or nuisance fees, but it will individually consult on damage compensation in case financial damage occurs due to information leakage.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2021\/08\/c6ffb54c82db6b5f3fe161f7f5ec9b60.jpg\" alt=\"\" class=\"wp-image-35961\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Questions_Remain_About_the_Timing_of_the_Initial_Press_Release\"><\/span>Questions Remain About the Timing of the Initial Press Release<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>As part of corporate crisis management, it is necessary to prioritize &#8220;preventing the spread of damage&#8221;, &#8220;preventing secondary damage&#8221;, and &#8220;preventing recurrence&#8221;.<\/p>\n\n\n\n<p>Therefore, when an information leakage is discovered, it is important to notify the relevant parties as soon as possible after taking initial response measures.<\/p>\n\n\n\n<p>While T\u014dken Corporation&#8217;s Q&amp;A carefully answers a wide range of anticipated questions, suggesting that it was prepared in close consultation with experts such as lawyers in advance, questions remain about the announcement being made about a month after the discovery of unauthorized access.<\/p>\n\n\n\n<p>Indeed, as a company, it would want to make an announcement after conducting investigations and measures, but shouldn&#8217;t the following four points have been announced earlier as a first report?<\/p>\n\n\n\n<ul>\n<li>Discovery of information leakage and the expected targets<\/li>\n\n\n\n<li>Content of the leaked personal information<\/li>\n\n\n\n<li>There is no possibility of leakage of credit information such as card numbers<\/li>\n\n\n\n<li>Future structure and schedule<\/li>\n\n\n\n<li>Contact point for inquiries<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Points_for_Notification_Reporting_and_Disclosure\"><\/span>Key Points for Notification, Reporting, and Disclosure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When information is leaked, it is necessary to consider notifying users and business partners, reporting to supervisory authorities and the police, and disclosing information through websites and the media, depending on the cause and content of the information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_Case_of_Criminal_Activity\"><\/span>In Case of Criminal Activity<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If there is a possibility of a crime related to unauthorized access, it is necessary to investigate the facts and take evidence preservation measures, and then promptly report to the police.<\/p>\n\n\n\n<p>In the case of T\u014dken Corporation, a damage report was made to the Ministry of Land, Infrastructure, Transport and Tourism and the Aichi Prefectural Police Headquarters the day after the investigation of the entire group&#8217;s website was completed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_Case_of_Possible_Leakage_of_Personal_Credit_Information\"><\/span>In Case of Possible Leakage of Personal Credit Information<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If there is a possibility of leakage of My Number, credit card numbers, bank accounts, IDs, passwords, etc., it is necessary to promptly notify the person and urge them to stop these to prevent secondary damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_Case_of_Large_Scale_or_Wide_Impact_or_When_Individual_Notification_to_All_Stakeholders_is_Difficult\"><\/span>In Case of Large Scale or Wide Impact, or When Individual Notification to All Stakeholders is Difficult<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Information will be disclosed through website publication or press releases. However, if there is a possibility that disclosure may lead to further damage, consider the timing and target of the disclosure.<\/p>\n\n\n\n<p>Also, ensuring transparency and disclosing facts as much as possible when making a public announcement will not only lead to corporate trust but also prevent further damage and similar accidents.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2021\/08\/f5998b2ea88a59c00a098bca4bb90a2e.jpg\" alt=\"\" class=\"wp-image-35963\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Announcement_of_the_Second_Press_Release\"><\/span>Announcement of the Second Press Release<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>On February 9, 2021, after the start of the new year, T\u014dken Corporation announced the second report on the leakage of personal information on their website, and made corrections to the leaked items and the number of leakages.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>As a result of a re-investigation of the leaked items by a third-party forensic investigation, some differences were confirmed. Therefore, we kindly ask you to check again in Appendix 1 &#8220;About the Items for Each Site\/Service&#8221;. (Excerpt) The maximum number of leaks has been revised from 657,096 cases to 655,488 cases.<\/p>\n<\/blockquote>\n\n\n\n<p>The content was essentially the same as the initial press release, with minor additions such as how to deal with spam and suspicious emails. This announcement was the final one.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Central_Role_of_the_Crisis_Response_Headquarters\"><\/span>The Central Role of the Crisis Response Headquarters<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Following the discovery of unauthorized access, T\u014dken Corporation has established an &#8216;Information Security Headquarters&#8217;. This body is committed to preventing recurrence by collaborating with external third-party organizations and the police.<\/p>\n\n\n\n<p>While the structure of this organization is unclear, it is necessary to simultaneously carry out not only system security measures but also communication with targeted users, media response, shareholder response, and consideration of legal responsibilities. Generally, the participation of the following external third-party organizations and experts is required:<\/p>\n\n\n\n<ul>\n<li>Major software companies<\/li>\n\n\n\n<li>Leading security specialist vendors<\/li>\n\n\n\n<li>External lawyers with deep knowledge in cybersecurity<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In cases like this, where a large-scale personal information leak exceeding 650,000 cases has been discovered, the importance of &#8220;initial response&#8221; and &#8220;notification, reporting, and public announcement&#8221; centered on the countermeasure headquarters, as well as &#8220;security measures,&#8221; cannot be overstated.<\/p>\n\n\n\n<p>Speed is particularly required not only for the initial response but also for notifications and reports to the police and relevant government agencies, as well as public announcements (press releases) to stakeholders.<\/p>\n\n\n\n<p>However, if you handle the situation incorrectly, you may be held liable for damages. Therefore, rather than making judgments on your own, we recommend proceeding with prior consultation with a lawyer who has extensive knowledge and experience in cybersecurity.<\/p>\n\n\n\n<p>If you are interested in crisis management during Capcom&#8217;s information leakage due to malware, please see the article for a detailed description.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/corporate\/capcom-information-leakage-crisis-management\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/corporate\/capcom-information-leakage-crisis-management[ja]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction_to_Our_Firm%E2%80%99s_Measures\"><\/span>Introduction to Our Firm&#8217;s Measures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Monolith Law Office is a legal office with high expertise in both IT, particularly the Internet, and law. Our firm handles the creation and review of contracts for various cases, ranging from companies listed on the Tokyo Stock Exchange Prime to venture companies. If you are in trouble, please refer to the article below.<\/p>\n\n\n<figure class=\"is-type-wp-embed\">\n<div><a href=\"https:\/\/monolith.law\/contractcreation\" target=\"_blank\" rel=\"noopener\">https:\/\/monolith.law\/contractcreation[ja]<\/a><\/div>\n<\/figure>","protected":false},"excerpt":{"rendered":"<p>On April 1, 2005 (Heisei 17), the Japanese Personal Information Protection Law was fully implemented, and businesses handling personal information are obliged to take safety management measures. Howev [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":61048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[24,29],"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/60116"}],"collection":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/comments?post=60116"}],"version-history":[{"count":1,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/60116\/revisions"}],"predecessor-version":[{"id":61049,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/60116\/revisions\/61049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media\/61048"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media?parent=60116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/categories?post=60116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/tags?post=60116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}