TopPage »

Application Form

Name *

Birthday

Age

NRC

Gender *

English Level *

Japanese Level *

Graduate/Education

OtherQualification&Certificate

IT Skill

Working Experience

Address

Phone

Email*

Expected Salary

Personal Statement

Curriculum Vitae

Information Security Policy

1 Establishment of ISMS (ISO 27001)
The Company performs the development of information security management measures related to our business and shall establish the ISMS while taking into account request of the customer, the social demands as well as our business policy

2 Request of the customer
The Company performs the safety management of the information securely and shall endeavor to continue the provision of services of customer-friendly in accordance with regulations and procedures stipulated. In order to meet the customer’s expectations related to our business, the information entrusted by suppliers shall be handled under the supervision of the person responsible.

3 Societal demand
The Company shall comply with the Personal Information Protection Law, the Unfair Competition Prevention Laws, regulations related to information security and other regulations.

4 Request on business
The Company achieves the business objectives of the Company and develop information security management measures for customer satisfaction and shall build the information security infrastructure.

a) Implementation of risk assessment
The Company carries out the systematic risk assessment for proper risk control for information assets to clarify the criteria for assessing the risk. The Company develops appropriate information security management measures based on the results of the risk assessment.

b) Implementation of information security management measures
The Company implement appropriate management measures based on the results of the risk assessment in order to protect the information assets from threats such as leakage, alteration and loss.

c) Prevention and correction of information security incidents and accidents
In the event of information security incidents and violation has occurred, the Company promptly takes appropriate corrective action and shall endeavor to prevent a recurrence to minimize the damage.

d) Implementation of business continuity management
The company deals with the interruption of the Company’s business activities while minimizing the impact on the information assets due to a serious failure or disaster. The company also establishes a framework for business continuity management and create a business continuity plan and the plan shall be tested

5 Review of the basic policy
The Company timely conduct a review of the basic policy based on the changes in the results and the Company’s external environment of the audit.

Privacy Policy

Handling of personal information

Operating Partners Myanmar Co., ltd (“the Company”) runs its businesses based on “Trust” and thinks of protection of personal data as its important item of corporate social responsibility. For this reason, the company builds “information security management system” which clarifies the basic attitude and its handling standards for the protection of personal information. The company will fulfill its responsibilities by utilizing the system.

Privacy policy

  1. The Company clarifies the purpose of use of personal information and shall not handle personal information beyond the necessity to fulfill the purpose without consent from the person in question. Information from the person who had the consent will be utilized for the purposes including the following items.
    • Take advantage of as a valuable basic information for product development and service improvement.
    • Dissemination of up-to-date information about the service support from the Company.
  2. The Company shall not provide personal information to a third party without consent from the person unless they are an exception by law.
  3. The Company will comply with the guidelines and other norms of laws and regulations regarding the handling of personal information protection the country set.
  4. The Company strives to prevent and rectify unauthorized access to the acquired personal information, loss of personal information, destruction, falsification and leakage.
  5. The Company continuously makes improvements of the information security management system in order to properly protect personal information.

contact form

your name (required)

e-mail address (required)

title

message