{"id":14534,"date":"2023-04-24T16:48:45","date_gmt":"2023-04-24T16:48:45","guid":{"rendered":"https:\/\/test.uploadbook.com\/syscom\/?page_id=14534"},"modified":"2023-04-24T20:24:44","modified_gmt":"2023-04-24T20:24:44","slug":"compliance","status":"publish","type":"page","link":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/","title":{"rendered":"Compliance"},"content":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2><strong>SOC 2 Report<\/strong><\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left&#8221;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;14526&#8243; img_size=&#8221;medium&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<b><span data-contrast=\"auto\">1. Purpose<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the progress of IT, we can enjoy greater convenience, but at the same time, companies are exposed to various threats such as information leakage, tampering, destruction, and loss. SYSCOM GLOBAL SOLUTIONS INC. handles confidential information of customers while using Data Center and Public Cloud and providing IaaS implementation support and operational assistance. In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2. About SOC2<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">SOC for Service Organizations reports are designed to help service organizations that provide services to other entities, build trust and confidence in the service performed and controls related to the services through a report by an independent CPA.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">SOC 2<\/span><span data-contrast=\"none\">\u00ae<\/span><span data-contrast=\"none\">\u202f- SOC for Service Organizations: Trust Services Criteria<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization relevant to security, availability, and processing integrity of the systems the service organization uses to process users\u2019 data and the confidentiality and privacy of the information processed by these systems. These reports can play an important role in:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbOversight of the organization<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:120,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbVendor management programs<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:120,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbInternal corporate governance and risk management processes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:120,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbRegulatory oversight<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:120,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3. In Scope Service<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbSYSCOM Data Center IaaS Implementation Services and Support Operations<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\"> in the U.S.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbPublic Cloud IaaS Implementation Service and Support Operations<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\"> in the U.S.\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4. Leadership and commitment<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Under the guidance from SOC2, Executive Management is committed to the establishment of an effective Information Security Management System (ISMS).\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The firm\u2019s commitment is demonstrated by:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbA documented ISMS Policy with clearly defined and fully supported objectives.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbAn ISMS that is operational and socialized within the processes, systems, and people within the current approved scope.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbAllocating the resources needed to establish, maintain, and continually improve the ISMS.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbClearly communicating top management\u2019s commitment and support of the objectives, implementation, and continual improvement of the ISMS to the entire firm.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbMonitoring the implementation and promoting continual improvement of the ISMS and the objectives by which the ISMS is assessed.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbSupporting those persons responsible for monitoring and measuring the InfoSec controls selected for implementation within the ISMS.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbSupporting the development of vendor relationships, contracts and agreements that align with the approved ISMS outcomes described within the ISMS objectives and policies developed by the ISMS Management Team and endorsed by the Management Team.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u30fbEncouraging a culture of information security as a firm\u2019s core value in practice at SYSCOM and creating policies that require personnel and select interested parties to conform to the policies and procedures derived from this ISMS and report opportunities to correct and improve it.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">5. Organizational roles, responsibilities, and authorities<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Top management has established the <\/span><span data-contrast=\"auto\">ISMC (Information Security Management Committee)<\/span><span data-contrast=\"auto\"> and authorizes that body to:\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbAssign roles and responsibilities to specific people and business units within SYSCOM, and to routinely collect reports as necessary to monitor ISMS performance.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbDetermine ISMS-related personnel qualifications and competencies.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbSupport ISMS-related personnel to maintain contact with special interest groups and authorities to enable their success in managing the ISMS.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbAllocate InfoSec responsibilities to managers.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"none\">\u30fbEnsure HR policies support personnel actions that may become necessary in the event of a security incident deemed to be a result of an infraction of the established ISMS-related policies and procedures.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:200,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">6. Compliance with Laws and Social Ethics<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SYSCOM will faithfully comply with laws, regulations, and contractual security obligations related to information security, such as the protection of personal information.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">7. Information Security Risk Assessment and Treatment Plan<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SYSCOM has determined that a risk-based approach to information security works best for the organization and will conduct a risk assessment at least once annually. The ISMC may initiate additional interim risk assessments as deemed necessary and will define the scope of each as needed.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u30fbRisk assessments are conducted per the SYSCOM Risk Management Methodology. The ISMC will review and approve needed changes to the methodology at least once annually.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u30fbSYSCOM will plan actions to reduce risks in necessary processes when the current risk exceeds the risk threshold accepted by top management.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u30fbA risk treatment plan is documented per the SYSCOM Risk Management Methodology. The ISMC will review and approve needed changes to the methodology at least once annually.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">8. Education and Training<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SYSCOM will continuously provide education and training to ensure that security operations are carried out in accordance with policies and procedures, recognizing the importance and benefits of being compliant with SOC2.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">9. Incident Management and Prevention<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SYSCOM will take necessary preventive measures to prevent information security incidents from occurring, and in case of any incidents, we will promptly investigate and analyze the root causes and take corrective actions to prevent recurrence.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: right;\"><span data-contrast=\"none\">March 1<\/span><span data-contrast=\"none\">st<\/span><span data-contrast=\"none\">, 2023<\/span><\/p>\n<p style=\"text-align: right;\">Seishi Sato<br \/>\nPresident &amp; CEO<br \/>\nSYSCOM GLOBAL SOLUTIONS INC.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per padding-box padding-top padding-bottom footer-bg&#8221;][vc_column][vc_raw_html el_id=&#8221;footer-block&#8221;]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwRk9PVEVSJTIwQkxPQ0slMjAtLSUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text] SOC 2 Report [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left&#8221;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;14526&#8243; img_size=&#8221;medium&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]1. Purpose\u00a0 With the progress of<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Compliance - SYSCOM GLOBAL SOLUTIONS<\/title>\n<meta name=\"description\" content=\"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance - SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-24T20:24:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/\",\"name\":\"Compliance - SYSCOM GLOBAL SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\"},\"datePublished\":\"2023-04-24T16:48:45+00:00\",\"dateModified\":\"2023-04-24T20:24:44+00:00\",\"description\":\"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"name\":\"Syscom Global Solutions\",\"description\":\"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS\",\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\",\"name\":\"syscom global solutions\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"contentUrl\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"width\":204,\"height\":46,\"caption\":\"syscom global solutions\"},\"image\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance - SYSCOM GLOBAL SOLUTIONS","description":"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/","og_locale":"en_US","og_type":"article","og_title":"Compliance - SYSCOM GLOBAL SOLUTIONS","og_description":"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.","og_url":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/","og_site_name":"SYSCOM GLOBAL SOLUTIONS","article_modified_time":"2023-04-24T20:24:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/","url":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/","name":"Compliance - SYSCOM GLOBAL SOLUTIONS","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website"},"datePublished":"2023-04-24T16:48:45+00:00","dateModified":"2023-04-24T20:24:44+00:00","description":"In supporting the valuable business of our customers using IT, we consider it a social responsibility to appropriately manage and operate these information assets. To fulfill this responsibility and maintain the confidentiality, integrity, and availability of information assets, we have built and operated internal processes in compliance with SOC2 to implement systematic information security measures.","breadcrumb":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.uploadbook.com\/syscom\/en\/"},{"@type":"ListItem","position":2,"name":"Compliance"}]},{"@type":"WebSite","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","name":"Syscom Global Solutions","description":"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS","publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization","name":"syscom global solutions","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","contentUrl":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","width":204,"height":46,"caption":"syscom global solutions"},"image":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/14534"}],"collection":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/comments?post=14534"}],"version-history":[{"count":17,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/14534\/revisions"}],"predecessor-version":[{"id":14631,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/14534\/revisions\/14631"}],"wp:attachment":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media?parent=14534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}