security
About the answers to the security sheet
Response to security requirements sheet: from 50,000 yen (free of charge for contracts of 150,000 yen or more)
Please allow one week or more for a response.
For more information, Contact usPlease feel free to contact us through
How to prevent cookies from being stored on your hard disk
How to prohibit cookies from being stored on your hard disk Starting from version 2.14 of learningBOX, a new feature has been added to enhance security in the system. Here is the page...
Read moreRoutine Security Maintenance

In order to protect our customers from recent security threats, we perform regular maintenance about once a month from 4:00 AM to 5:30 AM. This ensures that our middleware is up-to-date with the latest ...
Read moreSetting Account Expiration Date
Account Expiry Date Setting Up to Ver 2.13 of learningBOX, once you set the expiry date, you couldn't change it, but after 2.14, you can change it even after you set it once.
Read moreEnhanced password functionality
Enhanced Password Features New features have been added to learningBOX since version 2.14 to enhance security. In this page, you will find the new password characters...
Read moreDisplay the last login date and time
Last login date and time display Since version 2.14 of learningBOX, a new feature has been added to enhance security. In this page, we will show you the last login date...
Read moreRe-entering passwords for important processes
Re-entering password for important process Since ver.2.14 of learningBOX, new features have been added to enhance security. In this page, you can see the new features...
Read moreISMS Certification

Notice of Acquisition of ISMS Certification learningBOX Corporation has acquired ISO/IEC 27001:2013, the international standard for information security management systems (ISMS), and the...
Read moreprivacy mark

Notice of Privacy Mark Renewal On March 18, 2021, we renewed our Privacy Mark certification, which is granted by the Japan Institute for Promotion of Digital Economy and Community (JIPDEC)....
Read moreSSL encrypted communication

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are both protocols that encrypt data over the Internet.
Read moreRunning on an AWS server

Cloud security is a top priority for AWS, and AWS customers have access to a data center and network architecture that is built to meet the requirements of the most security-conscious organizations.
Read moreIssuing a one-time password

Two-factor authentication can be used to enhance security at login.
Read moreIP restriction

You can allow access only from the company network, for example.
Read moreCountermeasures for XSS

Cross-site scripting (XSS) has become a well-known attack (hacking) technique on websites and simply put, it is "embedding a malicious script into someone else's website". ...
Read moreCSRF Measures

Cross-site Request Forgery (CSRF) is an Internet system that is triggered by, for example, making a user follow a link to a trap in the content of another site...
Read more