{"id":9097,"date":"2025-02-28T01:04:00","date_gmt":"2025-02-27T16:04:00","guid":{"rendered":"https:\/\/www.datasmart.co.jp\/knowledge\/?p=9097"},"modified":"2025-03-23T13:46:55","modified_gmt":"2025-03-23T04:46:55","slug":"private-data-informationsecurity","status":"publish","type":"post","link":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/","title":{"rendered":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"},"content":{"rendered":"\n<p><strong>\u643a\u5e2f\u7aef\u672b\u3082\u72d9\u308f\u308c\u308b\u6642\u4ee3<\/strong><\/p>\n\n\n\n<p>\u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3067\u6709\u540d\u306a\u30ab\u30b9\u30da\u30eb\u30b9\u30ad\u30fc\u306f\u300110\u5e74\u4ee5\u4e0a\u524d\u304b\u3089\u643a\u5e2f\u7aef\u672b\u3092\u6a19\u7684\u3068\u3057\u305f\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u8b66\u9418\u3092\u9cf4\u3089\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u3092\u306f\u3058\u3081\u3068\u3059\u308b\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u306f\u300c\u30dd\u30b1\u30c3\u30c8\u306e\u4e2d\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u300d\u3068\u3082\u8a00\u308f\u308c\u3001\u305d\u306e\u5229\u4fbf\u6027\u3068\u3068\u3082\u306b\u30ea\u30b9\u30af\u3082\u5185\u5305\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u53c2\u8003\u8a18\u4e8b<\/strong><br><a href=\"https:\/\/blog.kaspersky.co.jp\/the-perils-of-mobile-security\/1174\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u30dd\u30b1\u30c3\u30c8\u306e\u4e2d\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u304c\u62b1\u3048\u308b\u30ea\u30b9\u30af | kaspersky<\/a><\/li>\n<\/ul>\n\n\n\n<p>\u8fd1\u5e74\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u88ab\u5bb3\u304c\u3088\u308a\u9855\u5728\u5316\u3057\u3066\u3044\u307e\u3059\u3002\u305f\u3068\u3048\u30702022\u5e7410\u6708\u3001\u30a4\u30ae\u30ea\u30b9\u306e\u30ea\u30ba\u30fb\u30c8\u30e9\u30b9\u524d\u9996\u76f8\u306e\u500b\u4eba\u643a\u5e2f\u304c\u30cf\u30c3\u30ad\u30f3\u30b0\u3055\u308c\u3001\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u300cPegasus\u300d\u304c\u4f7f\u7528\u3055\u308c\u305f\u53ef\u80fd\u6027\u304c\u5831\u3058\u3089\u308c\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u53c2\u8003\u8a18\u4e8b<\/strong><br><a href=\"https:\/\/forbesjapan.com\/articles\/detail\/51543\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">\u82f1\u30c8\u30e9\u30b9\u524d\u9996\u76f8\u306e\u643a\u5e2f\u304c\u30cf\u30c3\u30ad\u30f3\u30b0\u3001\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2Pegasus\u4f7f\u7528\u304b | Forbes Japan<\/a><\/li>\n<\/ul>\n\n\n\n<p>\u65e5\u672c\u56fd\u5185\u3067\u3082\u3001\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u3092\u6a19\u7684\u306b\u3057\u305f\u653b\u6483\u304c\u8a71\u984c\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u30022023\u5e741\u6708\u306b\u306f\u3001\u300c\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u304c\u30a6\u30a4\u30eb\u30b9\u306b\u611f\u67d3\u3057\u305f\u300d\u3068\u8b66\u544a\u3059\u308b\u507d\u30e1\u30c3\u30bb\u30fc\u30b8\u304c\u5e83\u307e\u308a\u3001\u8a50\u6b3a\u88ab\u5bb3\u3092\u8a98\u767a\u3059\u308b\u30b1\u30fc\u30b9\u304c\u5897\u52a0\u3057\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u53c2\u8003\u8a18\u4e8b<\/strong><br><a href=\"https:\/\/www.itmedia.co.jp\/news\/articles\/2301\/23\/news115.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">\u30b9\u30d1\u30e0\u983b\u51fa\u3001\u7530\u820e\u306e\u6bcd\u306e\u30b9\u30de\u30db\u304b\u3089\u898b\u3064\u304b\u3063\u305f\u8b0e\u306e\u201c\u7a7a\u767d\u30a2\u30d7\u30ea\u201d\u305d\u306e\u6b63\u4f53\u3068\u5bfe\u7b56\u306f\uff1f | IT media NEWS<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\u6025\u901f\u306a\u9032\u5316\u3068\u65b0\u305f\u306a\u30ea\u30b9\u30af<\/h3>\n\n\n\n<p>\u3053\u3053\u5341\u6570\u5e74\u3067\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u6d3b\u7528\u3057\u305f\u30b5\u30fc\u30d3\u30b9\u306e\u767a\u5c55\u3068\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u306e\u9032\u6b69\u306b\u3088\u308a\u3001\u79c1\u305f\u3061\u306e\u751f\u6d3b\u306f\u5287\u7684\u306b\u5909\u5316\u3057\u307e\u3057\u305f\u3002\u7279\u306b2019\u5e74\u672b\u304b\u3089\u306e\u65b0\u578b\u30b3\u30ed\u30ca\u30a6\u30a4\u30eb\u30b9\u611f\u67d3\u75c7\u306e\u6d41\u884c\u3092\u5951\u6a5f\u306b\u3001\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30af\u3084\u30aa\u30f3\u30e9\u30a4\u30f3\u30b7\u30e7\u30c3\u30d4\u30f3\u30b0\u306a\u3069\u3001\u30c7\u30b8\u30bf\u30eb\u5316\u304c\u4e00\u5c64\u9032\u307f\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<p>\u4e00\u65b9\u3067\u3001\u3053\u306e\u5229\u4fbf\u6027\u306e\u88cf\u306b\u306f\u65b0\u305f\u306a\u30ea\u30b9\u30af\u3082\u5b58\u5728\u3057\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3001\u8a50\u6b3a\u3001\u30c7\u30fc\u30bf\u6d41\u51fa\u3068\u3044\u3063\u305f\u554f\u984c\u304c\u767a\u751f\u3057\u3084\u3059\u304f\u306a\u3063\u3066\u304a\u308a\u3001\u3053\u308c\u3089\u306b\u5099\u3048\u308b\u305f\u3081\u306e\u5bfe\u7b56\u304c\u5fc5\u8981\u3067\u3059\u3002<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\u5f0a\u793e\u306e\u53d6\u308a\u7d44\u307f<\/h3>\n\n\n\n<p>\u5f0a\u793e\u3067\u306f\u3001\u30d1\u30bd\u30b3\u30f3\u3084\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306a\u3069\u306e\u3055\u307e\u3056\u307e\u306a\u30c7\u30d0\u30a4\u30b9\u304b\u3089\u306e<strong>\u30c7\u30fc\u30bf\u5fa9\u65e7<\/strong>\u306b\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u3002\u304a\u9810\u304b\u308a\u3059\u308b\u30c7\u30fc\u30bf\u306b\u306f\u500b\u4eba\u60c5\u5831\u304c\u591a\u6570\u542b\u307e\u308c\u308b\u3053\u3068\u304c\u3042\u308a\u3001\u60c5\u5831\u4fdd\u8b77\u304c\u975e\u5e38\u306b\u91cd\u8981\u3067\u3059\u3002\u305d\u306e\u305f\u3081\u3001\u6b21\u306e\u3088\u3046\u306a\u53d6\u308a\u7d44\u307f\u3092\u884c\u3063\u3066\u3044\u307e\u3059\uff1a<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>ISO\/IEC 27001\u8a8d\u8a3c\u306e\u53d6\u5f97<\/strong><br>\u3000\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u30b7\u30b9\u30c6\u30e0(ISMS)\u306e\u56fd\u969b\u8a8d\u8a3c\u898f\u683c\u3067\u3042\u308b\u300cISO\/IEC 27001:2013 \/ JIS Q 27001:2014\u300d\u3092\u53d6\u5f97\u3057\u3001\u53b3\u683c\u306a\u7ba1\u7406\u4f53\u5236\u3092\u7dad\u6301\u3057\u3066\u3044\u307e\u3059\u3002<\/li>\n<\/ol>\n\n\n\n<p>\u73fe\u5728\u306f\u30c7\u30fc\u30bf\u6d88\u53bb\u306e\u30eb\u30fc\u30eb\u306b\u5247\u3063\u305f\u6700\u65b0\u7248\u3078\u306e\u79fb\u884c\u306e\u6e96\u5099\u3092\u9032\u3081\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u304a\u5ba2\u69d8\u306e\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u53d6\u308a\u6271\u3044\u3001\u4fe1\u983c\u3044\u305f\u3060\u3051\u308b\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\u3055\u3089\u306a\u308b\u60c5\u5831\u4fdd\u8b77\u306e\u305f\u3081\u306b<\/h3>\n\n\n\n<p>\u500b\u4eba\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u610f\u8b58\u3092\u9ad8\u3081\u308b\u3053\u3068\u3082\u91cd\u8981\u3067\u3059\u3002\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u30dd\u30a4\u30f3\u30c8\u306b\u6ce8\u610f\u3057\u3066\u3001\u30c7\u30b8\u30bf\u30eb\u6642\u4ee3\u306e\u30ea\u30b9\u30af\u306b\u5099\u3048\u307e\u3057\u3087\u3046\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u6700\u65b0\u306e\u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3092\u5c0e\u5165<\/strong><\/li>\n\n\n\n<li><strong>\u30a2\u30d7\u30ea\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u5143\u3092\u4fe1\u983c\u3067\u304d\u308b\u30b9\u30c8\u30a2\u306b\u9650\u5b9a<\/strong><\/li>\n\n\n\n<li><strong>\u4e8c\u6bb5\u968e\u8a8d\u8a3c\u3092\u7a4d\u6975\u7684\u306b\u5229\u7528<\/strong><\/li>\n\n\n\n<li><strong>\u602a\u3057\u3044\u30ea\u30f3\u30af\u3084\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u7121\u8996<\/strong><\/li>\n<\/ul>\n\n\n\n<p>\u5f0a\u793e\u306f\u3053\u308c\u304b\u3089\u3082\u3001\u304a\u5ba2\u69d8\u306e\u5927\u5207\u306a\u30c7\u30fc\u30bf\u3092\u5b88\u308b\u305f\u3081\u3001\u6280\u8853\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4e21\u9762\u3067\u30b5\u30fc\u30d3\u30b9\u3092\u5f37\u5316\u3057\u3066\u307e\u3044\u308a\u307e\u3059\u3002<\/p>\n\n\n\n<p>\u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8\u306f\u304a\u9810\u304b\u308a\u3057\u305f\u66f8\u985e\u3084\u7ba1\u7406\u4e0a\u306b\u767a\u751f\u3059\u308b\u66f8\u985e\u306f\u6eb6\u89e3\u51e6\u7406\u3092\u884c\u3063\u3066\u304a\u308a\u307e\u3059\u3002\u6a5f\u5bc6\u6027\u306e\u9ad8\u3044\u30c7\u30fc\u30bf\u306e\u5fa9\u65e7\u3067\u3042\u3063\u3066\u3082\u5bfe\u5fdc\u3059\u308b\u4f53\u5236\u3092\u6574\u3048\u3066\u304a\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u5b89\u5fc3\u3057\u3066\u304a\u4efb\u305b\u304f\u3060\u3055\u3044\u3002<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.datasmart.co.jp\/news\/230511_01.html\">ISO27001(ISMS)\u8a8d\u8a3c\u53d6\u5f97\u306e\u304a\u77e5\u3089\u305b<\/a><\/li>\n<li><a href=\"https:\/\/www.datasmart.co.jp\/faq\/security.html\">\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u30fb\u79d8\u5bc6\u4fdd\u6301\u5951\u7d04\u306b\u95a2\u3059\u308b\u3088\u304f\u3042\u308b\u3054\u8cea\u554f<\/a><\/li>\n<\/ul>\n\n\n\n<p><div class=\"button solid block orange\"><strong><br><a class=\"cta\" href=\"https:\/\/www.datasmart.co.jp\/contact\/\" target=\"_blank\" rel=\"noopener\">\u304a\u554f\u5408\u305b\u306f\u3053\u3061\u3089<\/a><\/strong><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u643a\u5e2f\u7aef\u672b\u3082\u72d9\u308f\u308c\u308b\u6642\u4ee3 \u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3067\u6709\u540d\u306a\u30ab\u30b9\u30da\u30eb\u30b9\u30ad\u30fc\u306f\u300110\u5e74\u4ee5\u4e0a\u524d\u304b\u3089\u643a\u5e2f\u7aef\u672b\u3092\u6a19\u7684\u3068\u3057\u305f\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u8b66\u9418\u3092\u9cf4\u3089\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u3092\u306f\u3058\u3081\u3068\u3059\u308b\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u306f\u300c\u30dd\u30b1\u30c3\u30c8\u306e\u4e2d\u306e\u30b3\u30f3\u30d4\u30e5\u30fc [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9277,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"zakra_sidebar_layout":"customizer","zakra_remove_content_margin":false,"zakra_sidebar":"customizer","zakra_transparent_header":"customizer","zakra_logo":0,"zakra_main_header_style":"default","zakra_menu_item_color":"","zakra_menu_item_hover_color":"","zakra_menu_item_active_color":"","zakra_menu_active_style":"","zakra_page_header":true,"footnotes":""},"categories":[89],"tags":[],"class_list":["post-9097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-column"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8\" \/>\n<meta property=\"og:description\" content=\"\u643a\u5e2f\u7aef\u672b\u3082\u72d9\u308f\u308c\u308b\u6642\u4ee3 \u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3067\u6709\u540d\u306a\u30ab\u30b9\u30da\u30eb\u30b9\u30ad\u30fc\u306f\u300110\u5e74\u4ee5\u4e0a\u524d\u304b\u3089\u643a\u5e2f\u7aef\u672b\u3092\u6a19\u7684\u3068\u3057\u305f\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u8b66\u9418\u3092\u9cf4\u3089\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u3092\u306f\u3058\u3081\u3068\u3059\u308b\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u306f\u300c\u30dd\u30b1\u30c3\u30c8\u306e\u4e2d\u306e\u30b3\u30f3\u30d4\u30e5\u30fc [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"\u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T16:04:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-23T04:46:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1450\" \/>\n\t<meta property=\"og:image:height\" content=\"739\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"datasmart\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@datasmart3\" \/>\n<meta name=\"twitter:site\" content=\"@datasmart3\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"datasmart\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/\"},\"author\":{\"name\":\"datasmart\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#\\\/schema\\\/person\\\/14bd5df5e26dca0153c161522b697a58\"},\"headline\":\"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\",\"datePublished\":\"2025-02-27T16:04:00+00:00\",\"dateModified\":\"2025-03-23T04:46:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/\"},\"wordCount\":17,\"publisher\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\",\"articleSection\":[\"\u30b3\u30e9\u30e0\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/\",\"url\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/\",\"name\":\"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\",\"datePublished\":\"2025-02-27T16:04:00+00:00\",\"dateModified\":\"2025-03-23T04:46:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\",\"contentUrl\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\",\"width\":1450,\"height\":739},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/private-data-informationsecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30c7\u30fc\u30bf\u5fa9\u65e7\uff1a\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u30b3\u30e9\u30e0\",\"item\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/category\\\/column\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#website\",\"url\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/\",\"name\":\"DATASMART KNOWLEDGE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#organization\",\"name\":\"DATASMART\",\"url\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-datasmart_logo-1.png\",\"contentUrl\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-datasmart_logo-1.png\",\"width\":1152,\"height\":734,\"caption\":\"DATASMART\"},\"image\":{\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/datasmart3\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.datasmart.co.jp\\\/knowledge\\\/#\\\/schema\\\/person\\\/14bd5df5e26dca0153c161522b697a58\",\"name\":\"datasmart\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g\",\"caption\":\"datasmart\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/","og_locale":"ja_JP","og_type":"article","og_title":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8","og_description":"\u643a\u5e2f\u7aef\u672b\u3082\u72d9\u308f\u308c\u308b\u6642\u4ee3 \u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3067\u6709\u540d\u306a\u30ab\u30b9\u30da\u30eb\u30b9\u30ad\u30fc\u306f\u300110\u5e74\u4ee5\u4e0a\u524d\u304b\u3089\u643a\u5e2f\u7aef\u672b\u3092\u6a19\u7684\u3068\u3057\u305f\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u8b66\u9418\u3092\u9cf4\u3089\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u3092\u306f\u3058\u3081\u3068\u3059\u308b\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u306f\u300c\u30dd\u30b1\u30c3\u30c8\u306e\u4e2d\u306e\u30b3\u30f3\u30d4\u30e5\u30fc [&hellip;]","og_url":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/","og_site_name":"\u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8","article_published_time":"2025-02-27T16:04:00+00:00","article_modified_time":"2025-03-23T04:46:55+00:00","og_image":[{"width":1450,"height":739,"url":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png","type":"image\/png"}],"author":"datasmart","twitter_card":"summary_large_image","twitter_creator":"@datasmart3","twitter_site":"@datasmart3","twitter_misc":{"\u57f7\u7b46\u8005":"datasmart","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#article","isPartOf":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/"},"author":{"name":"datasmart","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#\/schema\/person\/14bd5df5e26dca0153c161522b697a58"},"headline":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","datePublished":"2025-02-27T16:04:00+00:00","dateModified":"2025-03-23T04:46:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/"},"wordCount":17,"publisher":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#organization"},"image":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png","articleSection":["\u30b3\u30e9\u30e0"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/","url":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/","name":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 | \u30c7\u30fc\u30bf\u5fa9\u65e7\u30ca\u30ec\u30c3\u30b8 \u30c7\u30fc\u30bf\u30b9\u30de\u30fc\u30c8","isPartOf":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png","datePublished":"2025-02-27T16:04:00+00:00","dateModified":"2025-03-23T04:46:55+00:00","breadcrumb":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#primaryimage","url":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png","contentUrl":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2024\/12\/\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png","width":1450,"height":739},{"@type":"BreadcrumbList","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/private-data-informationsecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30c7\u30fc\u30bf\u5fa9\u65e7\uff1a\u30db\u30fc\u30e0","item":"https:\/\/www.datasmart.co.jp\/knowledge\/"},{"@type":"ListItem","position":2,"name":"\u30b3\u30e9\u30e0","item":"https:\/\/www.datasmart.co.jp\/knowledge\/category\/column\/"},{"@type":"ListItem","position":3,"name":"\u500b\u4eba\u60c5\u5831\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"}]},{"@type":"WebSite","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#website","url":"https:\/\/www.datasmart.co.jp\/knowledge\/","name":"DATASMART KNOWLEDGE","description":"","publisher":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.datasmart.co.jp\/knowledge\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#organization","name":"DATASMART","url":"https:\/\/www.datasmart.co.jp\/knowledge\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#\/schema\/logo\/image\/","url":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2021\/06\/cropped-datasmart_logo-1.png","contentUrl":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-content\/uploads\/2021\/06\/cropped-datasmart_logo-1.png","width":1152,"height":734,"caption":"DATASMART"},"image":{"@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/datasmart3"]},{"@type":"Person","@id":"https:\/\/www.datasmart.co.jp\/knowledge\/#\/schema\/person\/14bd5df5e26dca0153c161522b697a58","name":"datasmart","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cadda24a38e43bd9ec0f18981bb68f6068d29b9e0cedc521442ff20352551592?s=96&d=mm&r=g","caption":"datasmart"}}]}},"_links":{"self":[{"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/posts\/9097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/comments?post=9097"}],"version-history":[{"count":9,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/posts\/9097\/revisions"}],"predecessor-version":[{"id":10291,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/posts\/9097\/revisions\/10291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/media\/9277"}],"wp:attachment":[{"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/media?parent=9097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/categories?post=9097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.datasmart.co.jp\/knowledge\/wp-json\/wp\/v2\/tags?post=9097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}