NEWS

2017

Friday, May 26, 2017

Notification of the renewed homepage

The homepage has been renewed.

2014

Friday, September 12, 2014

Notification of a contractor’s license

We have acquired a contractor’s license of interior finishing work and made it through procedures for the update.

We continuously take full effort to satisfy the needs of customers.

I appreciate your kind cooperation.

-Construction business license-
License number : Ordinary Construction Business License from Tokyo Metropolitan Governor(General -26) License No.142178
The valid period of the license : From September 10, 2014 to
September 9, 2019
Approval type : Interior finish Contractors

blank

Monday, June 23, 2014

Notification of acquisition of ISO/IEC 27001

ISO/IEC 27001:2013 / JIS Q 27001:2014
Registration Date: 11/14/2013
Registration Number: IS 602560

The fundamental policy of information security
2.1 version
06/14/2013 : Establishment
06/23/2014 : Revision
Two You CO.,LTD.
CEO: Akihiro Uno

Information assets, including information and the information system,
are the source of profit production and the most precious property
in our company’s business activities as follows.

1. Setting up of exhibitions and trade shows booths
2. Interior decoration/finishing of shop and event space
3. Producing displays, showcases, and POP advertising for sales promotion
4. Planning various events and the operation

Likewise it is the social responsibility to prevent information security accidents in advance. In order for our company to protect information assets from threat of information security, we deal with the information asset precisely and safely and prove worthy of customers’ trust realizing the information security in line with our management strategy.

1. We set the following goals and for certain perform each policy to accomplish them.

Security Goals
- We respect and act in compliance with customer agreements,
and legal or regulatory requirements.
- We prevent information security accidents beforehand.
- We protect information asset from information security threats.

2. By announcing managers’ intention about approaches to information security and clarifying the main principle based on those, we constantly secure effectiveness of the information security management system (ISMS) through properly construct and operate it while endeavoring to ensure confidentiality, completeness, and usability of the significant information assets.

3. We have an organizational framework necessary appointing the information security manager and the information security committee necessary for the ISMS operation.

4. We take appropriate risk measures based on the risk assessment defining systematic methods and evaluation criteria related to risk assessment in order to maintain all the important information asset risks that we handle at an acceptable level.

5. Aiming for the maintenance and improvement of the ISMS, we regularly provide education to all the employees and measure the effect.

6. The scope of application is company-wide including all the divisions.

2011

Monday, March 14, 2011

On the Great East Japan Earthquake

We would like to offer my heartfelt sympathy to the victims of the earthquake.

We report that fortunately both staffs and office did not have
any huge damage.

In response to the situation, we support things we can cooperate
on with all our strength.

We appreciate your kind cooperation.