Information Security Policy
Basic Philosophy
JITERA PTE. LTD. and its affiliates (hereinafter referred to as ‘Jitera’) conducts business based on the philosophy of “building the next era of software development.” The information assets we handle, including customer information, are critical to our business foundation and operations.
All individuals who handle information assets, including executives and employees, recognize the importance of protecting these assets from risks such as leakage, damage, loss, or unauthorized access. In alignment with this policy, the Company maintains and operates an Information Security Management System (ISMS) to ensure the confidentiality, integrity, and availability of information assets. The Company is ISO/IEC 27001 certified and SOC 2 compliant, and maintains these standards as part of its ongoing security governance.
Basic Policy
To protect information assets, the Company establishes and maintains an information security policy and supporting regulations, and conducts business in accordance with these policies. We comply with applicable laws, regulations, contractual obligations, and recognized industry standards related to information security.
The Company defines standards for identifying, analyzing, and evaluating risks to information assets and operates a structured and systematic risk assessment process. Risk assessments are conducted regularly, and appropriate technical and organizational security measures are implemented and continuously maintained based on the results.
The Company maintains an information security governance structure led by designated executive leadership, with clearly defined roles, responsibilities, and accountability for information security. Regular education, training, and awareness programs are conducted to ensure all personnel understand and appropriately handle information assets.
Compliance with information security policies and procedures is regularly reviewed through monitoring, inspections, and audits. Identified gaps or opportunities for improvement are addressed promptly through corrective and preventive actions.
The Company maintains incident management and response procedures to address information security events. These procedures are designed to minimize impact, ensure timely response, and implement corrective actions. Business continuity and resilience measures are also established, maintained, and periodically reviewed to ensure continuity of operations in the event of disruptions.
The Company operates and continually improves its Information Security Management System (ISMS) to support its business objectives and maintain compliance with ISO/IEC 27001 and SOC 2 requirements.
Established: May 30, 2022
Last Reviewed: April 9, 2026
Jitera
Yota Numata (COO)