About the answers to the security sheet
Response to security requirements sheet: from 50,000 yen (free of charge for contracts of 150,000 yen or more)
Please allow one week or more for a response.
For more information, Contact usPlease feel free to contact us through

How to prevent cookies from being stored on your hard disk

How to prohibit cookies from being stored on your hard disk Starting from version 2.14 of learningBOX, a new feature has been added to enhance security in the system. Here is the page...

Read more

Routine Security Maintenance

In order to protect our customers from recent security threats, we perform regular maintenance about once a month from 4:00 AM to 5:30 AM. This ensures that our middleware is up-to-date with the latest ...

Read more

Setting Account Expiration Date

Account Expiry Date Setting Up to Ver 2.13 of learningBOX, once you set the expiry date, you couldn't change it, but after 2.14, you can change it even after you set it once.

Read more

Enhanced password functionality

Enhanced Password Features New features have been added to learningBOX since version 2.14 to enhance security. In this page, you will find the new password characters...

Read more

Display the last login date and time

Last login date and time display Since version 2.14 of learningBOX, a new feature has been added to enhance security. In this page, we will show you the last login date...

Read more

Re-entering passwords for important processes

Re-entering password for important process Since ver.2.14 of learningBOX, new features have been added to enhance security. In this page, you can see the new features...

Read more

ISMS Certification

Notice of Acquisition of ISMS Certification learningBOX Corporation has acquired ISO/IEC 27001:2013, the international standard for information security management systems (ISMS), and the...

Read more

privacy mark

Notice of Privacy Mark Renewal On March 18, 2021, we renewed our Privacy Mark certification, which is granted by the Japan Institute for Promotion of Digital Economy and Community (JIPDEC)....

Read more

SSL encrypted communication

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are both protocols that encrypt data over the Internet.

Read more

Running on an AWS server

Cloud security is a top priority for AWS, and AWS customers have access to a data center and network architecture that is built to meet the requirements of the most security-conscious organizations.

Read more

Issuing a one-time password

Two-factor authentication can be used to enhance security at login.

Read more

IP restriction

You can allow access only from the company network, for example.

Read more

Countermeasures for XSS

Cross-site scripting (XSS) has become a well-known attack (hacking) technique on websites and simply put, it is "embedding a malicious script into someone else's website". ...

Read more

CSRF Measures

Cross-site Request Forgery (CSRF) is an Internet system that is triggered by, for example, making a user follow a link to a trap in the content of another site...

Read more