Security is very important for automated translation services. In business translation, especially for sensitive information, if security is not robust, it can lead to information leakage. Mirai Translate has acquired international standards for information security. Our services operate in compliance with these requirements and are used by many leading financial institutions and pharmaceutical companies that require high levels of security.
* In the following, if the service name is not listed, it indicates the common specification of Mirai Translator® and the speech translation API service.
Acquisition of international standards ISO 27001 (ISMS) and 27017
Data is automatically deleted after translation is completed.
No risk of information leakage.
All translation processing, including multilingual translation, is completed on servers in Japan.
Acquired ISO 27017 certification for cloud machine translation in Japan for the first time. In conjunction with ISO 27001 (ISMS), which has also been certified, it meets the stringent security requirements and information protection requirements of financial institutions, pharmaceutical companies, and government agencies, which demand high standards. It also meets the requirements of the Ministry of Internal Affairs and Communications and can be deployed by government agencies.
* ISO 27001 (ISMS): An international standard certified by third parties that the information security system of the cloud service is being built with high security
* ISO 27017: An international standard for cloud security certification specifically for cloud services
* Reference Technical Requirements for the Implementation of Multilingual Automated Translation Systems in Government Agencies
Data is automatically deleted after translation is completed. No information is left on the server, so there is no risk of information leakage. You don’t have to worry about translated data being used for leaning of AI. In addition, ID/password, user dictionary, translation memory, profile information, and API key are encrypted, and all translation processes are operated by us on servers in Japan, providing robust security.
For multilingual translations, which are often connected to free services, Mirai Translator® uses an engine developed by our business partner Systran of France, and the speech translation API service uses NICT’s engine. Processing is completed on servers operated by Mirai Translate in Japan, so there is no need to worry about data leakage overseas.
Leveraging the strength of the NTT Group and having a European representative, we are able to comply with the GDPR (EU General Data Protection Regulation), which requires stricter procedures than Japan’s Act on the Protection of Personal Information. Safe to use even overseas (EU area).
Communication | SSL communication |
---|---|
Authentication | • ID/password authentication • IP address authentication function (selected at the time of application) • Two-factor authentication function (selected at the time of application) |
Server |
|
Secondary use of data |
We do not make any secondary use of customer translation log data to improve the accuracy of Mirai Translate services. (Clearly stated in the Terms of Service) |
Response to vulnerabilities | Periodic vulnerability testing is conducted by a third party and prompt response based on test results is taken. |
Operation | Operation in compliance with ISO 27001 and ISO 27017 security requirements |
Administrator management | Administrators who can access data are limited according to the management system defined by our Information Security Policy. |
Inquiries concerning security | Security check sheet is supported. |
Communication | SSL communication |
---|---|
Authentication | API key authentication |
Server | Limited to servers located in Japan (AWS). |
Storage of data |
|
Secondary use of data |
We do not make any secondary use of customer translation log data to improve the accuracy of Mirai Translate services. (Clearly stated in the Terms of Service) |
Response to vulnerabilities | Periodic vulnerability testing is conducted by a third party and prompt response based on test results is taken. |
Operation | Operation in compliance with ISO 27001 and ISO 27017 security requirements |
Administrator management | Administrators who can access data are limited according to the management system defined by our Information Security Policy. |