METI Guidelines Cloud Service Level Checklist

Ministry of Economy, Trade and Industry cloud service level
Checklist version

No.typeService level items exampleRegulationscorrespondence/
Possibility
Contents
Application Operations
1availabilityService downtimeService hours (including planned downtime for inspection/maintenance of facilities, networks, etc.)There will be maintenance shutdowns (planned shutdowns) of approximately two hours per month from 1:00 AM to 3:00 AM, and unscheduled maintenance may be performed if a critical vulnerability is detected.
2Planned outage notificationConfirmation of advance notice regarding scheduled maintenance outages (including a description of the timing/method of advance notice)We will notify you via the support web page and by email to your customer representative.
3Advance notice when service provision endsConfirmation of advance notice in case of termination of service provision (including description of timing/method of advance notice)This is stated in the service terms and conditions. We will notify you at least three months before the service ends.
4What to do when service is suddenly suspendedWhether or not measures such as depositing programs and various setting data for the system environment are in placeWe always protect customer data, but in the event of a sudden service outage, we will do our best to restore the system. We ask that you back up your data at your own risk.
5Service availabilityProbability of service availability ((Planned service time - Outage time) / Planned service time) It is not publicly available.
January 2025 occupancy rate: 100%
6Disaster RecoverySystem recovery/support system in the event of a disaster Non-disruptive disaster recovery is not supported.
7Alternatives in the event of a major failureAlternative measures if early recovery is not possible No alternative methods are provided. i-Reporter devices (iPads and other devices can be used to enter data offline).
8Data format provided by alternative treatmentDescribes the definition of the data format provided in the alternative measuresCustomer data can be downloaded in CSV, XML, PDF, or Excel format via ConMas Manager, ConMas Designer, or API at the customer's own risk.
You are responsible for storing your data.
9Upgrade PolicyVersion upgrade/change management/patch management policyProduct updates are carried out several times a year. Security maintenance is carried out on scheduled maintenance days after vulnerability information is collected and evaluated. However, if a public institution notifies us that a security update must be applied immediately and it is determined that this will have an impact on service provision, we may carry out security maintenance with a separate notice.
10ReliabilityMean Time to Repair (MTTR)Average time from failure occurrence to repair completion (sum of repair time / number of failures) Not set.
11Recovery Time Objective (RTO)Target time for resuming service after an outage Not set.
 Recovery Point Objective (RPO)Target time for backup generation management to resume service provision after a failure occursWe will restore your data using backup data up until 1:00 AM on the day of restoration or 1:00 AM on the day before that. However, if the backup has not been completed by that time, we may use data up until 11:59 PM on the previous Saturday.
12Number of failuresNumber of failures that occurred in a year / Number of failures that took a long time (more than one day) to resolve in a year The number of occurrences in the past year is 0 (zero).
13System Audit StandardsMonitoring based on the system monitoring standards (monitoring content/monitoring and notification standards) It does not support system monitoring standards.
14Fault Notification ProcessContact process in case of failure (notification destination/method/route)In the event of a service outage, our staff will be notified and take action. We will notify and report the situation to the customer's registered staff via email.
15Failure notification timeThe time it takes to notify designated contacts after an anomaly is detected There are no rules, but we will notify you as soon as possible.
16Fault monitoring intervalThe time interval for collecting and aggregating failure incidentsWe are constantly monitoring it.
17Service status report/intervalService delivery status reporting method/time intervalIf a service outage occurs, we will notify you via the support website and by email to the person in charge of registration.
18Obtaining logsTypes of logs that can be provided to users (access logs, operation logs, error logs, etc.)Customer usage status of the i-Reporter system can be obtained from ConMas Manager.
As a general rule, we do not provide server system logs.
19performanceResponse timeProcessing response time It is not publicly available.
20delayDuration of delay in processing response time It is not publicly available.
21Batch Processing TimeBatch processing response time There is no batch processing.
22ScalabilityCustomizabilityItems that can be customized (changed), scope, specifications, etc., and information required for customization In principle, customization is not supported.
23External ConnectivityConnection specifications (API, development language, etc.) with existing systems and external systems such as other cloud computing servicesWe offer an optional API that allows you to use the i-Reporter system functions from external services.
24Number of simultaneous connected usersThe number of online users who can simultaneously connect and use the serviceThere is no limit to the number of simultaneous users.
25Resource limitsDisk space limit/page view limitThe storage capacity is determined at the time of contract. There is a limit to the storage capacity that can be used. (It can be increased with an additional fee.)
support
26Service hours (failure response)Time for accepting inquiries when responding to a malfunctionWe are available 24 hours a day, 365 days a year (email and inquiry form).
27Service hours (general inquiries)Hours during which inquiries are accepted for general inquiriesSupport is available 24 hours a day, 365 days a year, via the support form on our website.
Normal support hours are 9:30-18:00 on weekdays (excluding public holidays, New Year's holidays, and other company holidays).
We will review your inquiry and respond within three business days.
Data Management
28How to back upHow your data is handled, including backup details (number of backups, recovery methods, etc.), data storage location/format, and your access rights to your dataData for the entire system is backed up to a remote data center within the country on a daily, weekly, or monthly basis, but this data is not accessible to customers.
29Timing of obtaining backup data (RPO)When backing up data and ensuring dataWhen the backup finishes at 1:00 AM on the current day, the previous two days' worth of data will be backed up. If the backup has not yet finished at the time of recovery, the data will be backed up to the previous week.
30Backup data retention periodThe period for which data backup media is to be storedIt will be stored for the duration of your contract.
31Data erasure requirementsAfter service termination, the method of erasing data owned by the user, such as whether/when data will be erased, whether/when storage media will be destroyed, and data migrationAny data used in the i-Reporter system must be deleted from ConMas Manager/ConMas Designer at the customer's own responsibility.
Data across the entire infrastructure system will be deleted or destroyed in accordance with the NIST 800-88 Guidelines for Media Sanitation standard, as published by Microsoft. Physical deletion verification is not supported.
32Number of backup generationsGuaranteed number of generationsWe do not guarantee data backup. Customers are responsible for downloading and backing up data.
However, as a necessary measure for system operation, our company performs daily backups at 1:00 every day, and stores two generations of data: the current day and the previous day.
In addition, daily backup images taken on the first Sunday of each month and the first Sunday of each month are stored separately as weekly and monthly backup images.
33Encryption requirements for data protectionIs there a requirement for encryption to protect the data?The internet connection is encrypted with TLS 1.2.
34Key Management Requirements for Multi-Tenant StorageWhether there are any key management requirements for multi-tenant storage, and what those areIt is managed by a logical identifier.
35Compensation/insurance for data leakage and destructionWhether or not there is compensation/insurance in case of data leakage or destruction We are not covered by liability insurance. Our service terms and conditions state that you are responsible for managing your data. For details on compensation, please refer to the "Scope of Compensation" section of the service terms and conditions overview and the main text of the terms and conditions.
36Data portability upon terminationWhen a contract is terminated, the original data is promptly returned in its entirety or a system is in place to responsibly erase the data, eliminating the risk of data leaks to the outside.You are responsible for downloading any data used in the cloud service before canceling your subscription, and for deleting it afterwards.
We will carry out data deletion operations.
37Verification of the integrity of the deposited dataA method for verifying data integrity has been implemented, and verification reports have been reviewed.It is the customer's responsibility to verify the data content.
38Input data format restriction functionWhether or not there is a function to restrict input data formatYou can use the input data restriction function provided by i-Reporter.
Safety features
39Requirements for obtaining official certificationHow your data is handled, including backup details (number of backups, recovery methods, etc.), data storage location/format, and your access rights to your dataSeparate from customer data, server storage is backed up daily, weekly, and monthly and stored in a remote data center within Japan.
However, you do not have access to this data.
40Third-party evaluation of the applicationThird-party web application vulnerability assessmentAt least once a year, we undergo vulnerability testing by a third party, receive reports, and then evaluate and respond to those reports.
41Information handling environmentThe period for which data backup media is to be storedBackup data will be stored for the duration of your contract.
42Communication encryption levelThe encryption strength of communications to and from the systemCommunication is encrypted using SSL.
43Confirmation of information security-related matters in accounting audit reportsWhen auditing information security-related matters in accounting audit reports, the following documents will be provided to the person in charge: "Latest SAS70 Type 2 Audit Report" and "Latest No. 18 Audit Report" Not supported.
44Security measures in a multi-tenant environmentInformation isolation between different user companies, localization of the impact of failures, etc.We operate in a data area separated by contract space using a logical identifier for each customer.
45Restrictions on Data HandlersThe users who can access the user's data are limited, and the same restrictions as those stipulated by the user organization are realized.In accordance with ISO27001 certification standards, access rights are limited and the scope of access is determined for each individual.
Access within our company, including physical access, is logged and audited.
46Traceability in the event of a security incidentThe unit of ID assignment, whether the ID can be used for log searches, whether the log storage period is appropriate and whether it is provided within the period in an acceptable manner according to the needs of the user.Customers can check the access log to the i-Reporter system from ConMas Manager.
Logs can be obtained and records can be checked for the entire system at regular intervals, but customers cannot access them directly.
47Virus ScanVirus scan frequencyWe regularly check for viruses.
48Secondary storage media safety measuresBackup media etc. must always be stored in an encrypted state, all data must be completely erased and verified before disposal, and measures such as disabling USB ports and restricting data extraction must be taken.No secondary storage media is used and backups are made between data centers.
49External data storage policyAre you aware of the restrictions on data handling and use under the various legal systems in the locations where the data is stored?I understand.

Over 4,000 companies have adopted it!
No. 1 share in paperless apps

3分で分かる資料ダウンロード 現場帳票のデジタル化相談してみる