Skip to main content

Tag: “Security”

Home Computer Setup for Japan Expats

A Stranger in a Strange Land? If you're new to Japan and its language, or even if you're simply not so confident about dealing with Japan telecomm carriers or your building superintendent, eSolia's bilingual IT professionals can help get you sorted. We have been in business since 1999, and can help you with any computer-related tasks at your new home in Japan. eSolia Home Computer System Services eSolia's bilingual engineers can handle a range of activities related to your Japan home computer system, ensuring you have a fully functional and secure setup tailored to your needs. Basic Setup Services Internet and Phone Line Coordination Coordination for Internet Line or Phone Line installation Liaison with Japanese telecom carriers and building management Router, firewall, and WiFi access point configuration Equipment Sourcing and Installation Source various equipment such as Macs, PCs, Printers, WiFi devices, Routers, Firewalls, Displays, or other peripherals Basic system setup to connect Mac or PC to printer, WiFi, Internet or other peripherals Installation of your licensed software Data Migration and Customization Data Transfer and Migration Transfer and migration of data from your old to new system Documents, bookmarks, photos, music, email and so on External hard drive and cloud storage setup Custom Configuration Arranging automatic startup for specific apps Settings for software such as anti-virus or email Arranging "resource sharing" for printers Corporate VPN connection setup Advanced system setup activities such as hard disk encryption Maintenance and Support Regular Maintenance Regular maintenance for existing systems Hard disk defragmentation, cache clearing General cleanup with recommendations System performance optimization Training and Support Basic 15-minute "system walkthrough" training Basic operation instruction Security advice and best practices Consultation session to address your specific questions Time Requirements and Costs Standard Work Duration A full setup for a new system typically takes 3 or 4 hours, but it depends upon what you require and what options you would like us to implement. We can give a time and cost estimate once we define the scope of work with you. Factors Affecting Work Time Geographic Considerations We are based in Tokyo, so there is cost associated with requesting us to travel to areas outside the Greater Tokyo area Multiple visits naturally cost more than a single visit Preparation Status Have your software installers, license numbers and any needed passwords ready, so that the work may proceed smoothly For downloadable software, it is more time-efficient to have already downloaded the installer files, especially in the case of a large file like MS Office System Conditions Older or failing systems, as well as un-maintained systems (e.g with full hard disks) may be slow Adding tasks to the work order during the work, will cause delays Why Choose eSolia Experience and Bilingual Support Over 20 Years Experience - Supporting expatriates in Japan since 1999 Complete Bilingual Support - Technical support in both Japanese and English Cultural Understanding - Familiar with Japanese business practices and procedures Comprehensive Service One-Stop Service - From equipment sourcing to complete setup Ongoing Support - Post-installation maintenance and troubleshooting Customized Solutions - Tailored configurations to meet your specific needs Quality and Reliability Professional Technical Expertise - Enterprise-level technical support Quality Assurance - Responsibility for work quality and after-service support Flexible Scheduling - Visit times arranged to suit your schedule Frequently Asked Questions Q: Can you provide support in English? A: Yes, we provide complete bilingual support in both Japanese and English. Q: Can you help with equipment purchasing? A: Yes, we provide equipment selection and purchasing support based on your requirements. Q: Do you provide support after installation? A: Yes, we offer post-installation troubleshooting and regular maintenance services. Q: Do you service areas outside of Tokyo? A: While we are Tokyo-based, we can provide services outside the Greater Tokyo area with travel costs included in the estimate. Common Setup Scenarios New Arrival Setup Complete home office setup for professionals relocating to Japan Integration with company systems and VPN access Printer and scanner configuration for home office needs Family Computer Setup Multiple user accounts with appropriate restrictions Parental controls and content filtering Shared printer and storage configuration Gaming and Entertainment High-performance PC or console setup Network optimization for gaming Media center and streaming configuration Small Business Setup Professional grade equipment selection Security hardening and backup solutions Multi-device network with business-grade WiFi Contact Us If you are ready to have eSolia's bilingual IT technicians help with your home setup, please contact us to get started today. We'll provide the optimal solution for your specific situation and help make your transition to life in Japan as smooth as possible. Our professional and reliable IT support will ensure you have everything you need to start your new life in Japan with confidence.
by eSolia Inc.Reading Time: 3 min

Security Policy

Updated: 1 November 2025 eSolia takes cybersecurity seriously. This security policy outlines our commitment to protecting our systems, data, and users through comprehensive security measures and responsible disclosure practices. Vulnerability Disclosure Reporting Security Issues If you discover a security vulnerability in our systems or website, we encourage responsible disclosure: Contact: Report security issues through our contact form with "Security Vulnerability" in the subject Response Time: We aim to acknowledge security reports within 24 hours Investigation: All reports are thoroughly investigated by our security team Updates: We provide regular updates on the status of reported issues What to Include When reporting security vulnerabilities, please include: Detailed description of the vulnerability Steps to reproduce the issue Potential impact assessment Any proof-of-concept code or screenshots Your contact information for follow-up Our Commitment We will not pursue legal action against researchers who report vulnerabilities in good faith We will work with you to understand and resolve the issue promptly We will credit researchers (with permission) when security issues are resolved We maintain transparency about security improvements when appropriate Security Measures Website Security Our website implements multiple layers of security: HTTPS Everywhere: All traffic encrypted with TLS 1.3 Content Security Policy: Strict CSP headers to prevent XSS attacks Secure Headers: Implementation of security headers (HSTS, X-Frame-Options, etc.) Input Validation: Comprehensive validation of all user inputs Regular Updates: Continuous monitoring and updating of dependencies Infrastructure Security Secure Hosting: Hosted on Netlify with enterprise-grade security DNS Security: DNS over HTTPS (DoH) and DNSSEC implementation Access Controls: Principle of least privilege for all system access Monitoring: 24/7 security monitoring and alerting Backup Security: Encrypted backups with secure key management Development Security Secure Coding: Following OWASP security guidelines Code Review: All code changes undergo security review Dependency Scanning: Automated vulnerability scanning of dependencies Static Analysis: Security-focused static code analysis CI/CD Security: Secure build and deployment pipelines Data Protection Information Handling Data Minimization: We collect only necessary information Encryption: All sensitive data encrypted at rest and in transit Access Controls: Strict access controls for all data systems Retention Policies: Clear data retention and deletion policies (see our Privacy Policy) Privacy by Design: Privacy considerations integrated into all systems User Privacy Transparent Practices: Clear privacy policy outlining data use User Rights: Respect for user privacy rights and preferences (detailed in our Privacy Policy) Consent Management: Proper consent mechanisms for data collection Data Portability: Support for data export when requested Right to Deletion: Processes for complete data removal Incident Response Response Process In the event of a security incident: Detection: Immediate identification and assessment Containment: Quick containment to prevent further damage Investigation: Thorough investigation to understand impact Communication: Transparent communication with affected parties Recovery: Complete system recovery and security restoration Review: Post-incident review and process improvement Communication User Notification: Prompt notification of users if their data is affected Transparency: Public disclosure of significant security incidents Regulatory Compliance: Compliance with all applicable breach notification laws Continuous Updates: Regular updates during incident resolution Compliance and Standards Regulatory Compliance We maintain compliance with relevant security and privacy regulations: GDPR: European General Data Protection Regulation (see our Data Protection page) Japan Privacy Laws: Compliance with Japanese data protection laws Industry Standards: Adherence to relevant industry security standards Regular Audits: Periodic security audits and assessments Security Frameworks Our security practices align with established frameworks: OWASP: Open Web Application Security Project guidelines NIST: National Institute of Standards and Technology frameworks ISO 27001: Information security management principles CIS Controls: Center for Internet Security controls Security Resources For Users Security Tips: Best practices for secure interaction with our services Account Security: Guidance on maintaining secure accounts Phishing Awareness: Information about identifying security threats Contact Information: Clear channels for security-related questions For Researchers Scope: Clear definition of systems in scope for security research Guidelines: Responsible disclosure guidelines and expectations Recognition: Security researcher recognition program Resources: Technical documentation for security researchers Continuous Improvement Regular Reviews Policy Updates: Regular review and update of security policies Threat Assessment: Ongoing threat landscape assessment Technology Updates: Continuous improvement of security technologies Training: Regular security training for all team members Industry Engagement Security Community: Active participation in security community Threat Intelligence: Monitoring of emerging security threats Best Practices: Implementation of industry best practices Knowledge Sharing: Contributing to security knowledge base Contact Information For security-related matters: General Security Questions: Use our contact form with "Security" in the subject Vulnerability Reports: Use our contact form with "Security Vulnerability" in the subject Security.txt: Machine-readable security information at /.well-known/security.txt Changes in this Security Policy We reserve the right to update this security policy at any time. Changes will be announced in the "updates" section on the top page of this website, and the latest update date will be shown at the top of this page. For questions about this security policy or our security practices, please contact us through our official channels.
by eSolia Inc.Reading Time: 4 min

Data Protection

Updated: 1 November 2025 eSolia Inc. is committed to protecting your personal data and respecting your privacy rights. This page outlines our data protection practices and your rights under applicable privacy laws. Our Data Protection Principles We follow these core principles in all our data handling: Lawfulness, Fairness, and Transparency We process personal data lawfully and fairly We are transparent about how we collect and use your data We provide clear information about our data practices Purpose Limitation We collect data for specific, explicit, and legitimate purposes We do not use data for purposes incompatible with the original purpose We clearly communicate why we need your information Data Minimization We only collect data that is necessary for our stated purposes We avoid collecting excessive or irrelevant information We regularly review what data we hold and delete what's no longer needed Accuracy We take reasonable steps to ensure personal data is accurate We provide ways for you to update or correct your information We promptly correct any inaccuracies we become aware of Storage Limitation We only keep personal data as long as necessary We have clear retention policies and deletion schedules We securely delete data when it's no longer needed Integrity and Confidentiality We implement appropriate technical and organizational security measures We protect data against unauthorized access, loss, or damage We train our staff on data protection requirements Your Rights Under applicable data protection laws, you have several rights regarding your personal data: Right to Information You have the right to know what personal data we hold about you You can request details about how we use your data We provide this information free of charge Right to Access You can request a copy of the personal data we hold about you We will provide this in a commonly used electronic format We respond to requests within one month Right to Rectification You can ask us to correct inaccurate personal data You can request that incomplete data be completed We will make corrections promptly Right to Erasure ("Right to be Forgotten") You can request deletion of your personal data in certain circumstances This includes when data is no longer necessary for its original purpose We will assess each request according to legal requirements Right to Restrict Processing You can ask us to limit how we use your personal data This may apply while we investigate a complaint or accuracy concern We will inform you before lifting any restrictions Right to Data Portability You can request your data in a structured, machine-readable format You can ask us to transfer data directly to another organization This applies to data you provided with your consent Right to Object You can object to processing based on legitimate interests You can object to direct marketing at any time We will stop processing unless we have compelling legitimate grounds Legal Basis for Processing We process personal data based on the following legal grounds: Consent When you explicitly agree to data processing You can withdraw consent at any time Withdrawal doesn't affect the lawfulness of previous processing Contract Performance When processing is necessary to fulfill our service obligations This includes providing requested IT services or support Processing necessary for pre-contractual steps Legal Obligations When we must process data to comply with legal requirements This includes tax, accounting, and regulatory obligations We only process what's necessary for compliance Legitimate Interests When processing serves our legitimate business interests We balance our interests against your rights and freedoms You have the right to object to this type of processing International Data Transfers If we transfer your personal data outside your country, we ensure appropriate safeguards: Adequacy Decisions We may transfer to countries with adequate data protection laws These are recognized by relevant data protection authorities No additional safeguards are required Standard Contractual Clauses We use approved standard contractual clauses for other transfers These provide equivalent protection to your home country's laws They include binding obligations on data recipients Other Safeguards We may use binding corporate rules or approved codes of conduct We assess the security of the destination country We implement additional technical and organizational measures as needed Data Breaches In the unlikely event of a data breach: Internal Response We have procedures to detect, investigate, and respond to breaches We assess the risk to individuals and take appropriate measures We document all breaches and our response actions Regulatory Notification We notify relevant supervisory authorities within 72 hours when required We provide details about the breach and our response measures We cooperate fully with any regulatory investigations Individual Notification We notify affected individuals when there's a high risk to their rights We provide clear information about the breach and protective measures We offer support and guidance to affected individuals Exercising Your Rights To exercise any of your data protection rights: Contact Methods See contact information below What to Include Clear description of your request Proof of identity (to protect your data) Specific information about the data involved (if applicable) Our Response We respond to requests within one month We may extend this by two months for complex requests We explain any delays and provide regular updates Complaints If you're not satisfied with our response to your data protection concerns: Supervisory Authority You have the right to lodge a complaint with your local data protection authority In Japan, this is the Personal Information Protection Commission In the EU, contact your national data protection authority Changes in this Policy We reserve the right to update this data protection policy at any time. Changes will be announced in the "updates" section on the top page of this website, and the latest update date will be shown at the top of this page. Related Information Privacy Policy - Our complete privacy policy Legal Information - Overview of all legal documents PROdb Security & Privacy - Service-specific data protection Security Policy - Our technical security measures
by eSolia Inc.Reading Time: 4 min

PROdb Security and Privacy Policy

Updated: October 29, 2025 The privacy of your data is very important to us. This document explains how your data is stored, where it is stored and whether it is stored securely. "PROdb" is our brand name for the applications eSolia develops and hosts via the PaaS "dbFLEX", owned and operated by ForeSoft. This document's use of the brand name "PROdb" refers to the PaaS service. Security Infrastructure Customer Data is stored and processed in the following data centers with appropriate physical, technological, and administrative controls enacted to ensure appropriate access of Customer Data. Data Centers Steadfast Networks Data Center Colocation, Chicago, IL, United States Biometric authentication locks and 24/7 surveillance systems Dual diesel-powered emergency generators Advanced fire suppression systems Security and Certifications Data Encryption Communication Encryption 256-bit (SHA2) TLS certificate encryption Support for TLS 1.0, 1.1 and 1.2 All data communications protected by SSL Storage Encryption Databases encrypted via AES256 File attachments also encrypted via AES256 Backup data stored in encrypted format Data Backups and Disaster Recovery Backup System Hourly automated data backups Encrypted backup files Secure disaster recovery facility replication 6-month retention period before permanent deletion No removable media used for backup storage Recovery Infrastructure Rapid disaster recovery capabilities Secure server backup storage Special recovery procedures for natural disasters and security breaches Personnel Access Control Administrative Access Small operations team with infrastructure access Read-only access to database metadata for troubleshooting No customer database access without invitation or authorization Security Measures All employees sign confidentiality agreements Security training and best practices education VPN-only remote server access for authorized personnel All access events logged by IP address Incident Response Response Protocol Email notification to all affected customers within 72 hours of suspected or confirmed data breach Rapid investigation and response measures Transparent reporting and improvement strategies Privacy Personally Identifiable Information (PII) Information We Collect First and last name - for personalized user experience Email address - for unique user identification and communication Password - for account security Locale and time zone - for appropriate data formatting Data Handling User accounts cannot be deleted due to data integrity constraints Personally identifiable information can be cleared upon request Secure encryption protects all information Sharing Personally Identifiable Information Third-Party Disclosure We will never pass your personal information to third parties We won't use your name in marketing statements without your permission Internal System Usage Secure copying into customer database, support system, billing system All systems covered by eSolia's Security and Privacy Policies Cookie Usage Purpose User authentication Keeping user preferences Tracking user movements around the site Security No cookies contain personally identifiable information Secure implementation and access controls Law Enforcement Policy We reject requests to supply data to law enforcement unless by official court order We reject data disclosure requests without legal mandate We will always inform customers when we receive such requests (unless legally prevented) Data Retention and Deletion Customer Responsibilities Data Management Customers are responsible for understanding and implementing their data retention and deletion requirements Customers may delete their data at any time Immediate erasure from production systems Complete Purge Timeline Up to 6 months for complete purge from PROdb backup systems Security and recovery backup retention period Deletion Processes Deleted Records Moved to database "Recycle Bin" for 30 days Automatic purge after 30 days Manual purge available by database administrator Expired Databases Databases become 'expired' when trial period ends or subscription is cancelled PROdb system blocks access to expired databases Paid databases: securely kept in locked state until deletion Trial databases: automatically deleted within 90 days after expiration Deleted Databases Immediate disappearance from user access Physical deletion from system within 30 days 6-month residence in system backups Additional Important Information Business Continuity Stable Operations ForeSoft (dbFLEX operator) maintains strong financial stability 100% debt-free operations without reliance on financing No intention to cease operations Commitment to serving customers throughout database subscription life Data Portability Export tools provided for local data storage Customer data portability guaranteed Intellectual Property Customer Rights Database structure and workflow configuration are customer intellectual property PROdb protects customer intellectual property No sharing with other customers Changes to This Document We reserve the right to modify this document at any time. We will announce changes on this website in the news section. Contacting eSolia Please see below for our contact information. Related Information PROdb Cloud Database PROdb Support PROdb Terms of Service Commercial Disclosure
by eSolia Inc.Reading Time: 3 min