{"id":5327,"date":"2025-03-27T10:46:18","date_gmt":"2025-03-27T18:46:18","guid":{"rendered":"https:\/\/pocketalk.com\/?page_id=5327"},"modified":"2026-04-01T12:12:50","modified_gmt":"2026-04-01T16:12:50","slug":"sentio-white-paper","status":"publish","type":"page","link":"https:\/\/pocketalk.com\/es_es\/sentio-white-paper","title":{"rendered":"POCKETALK Sentio White Paper"},"content":{"rendered":"<h1>POCKETALK Sentio White Paper<\/h1>\n\n\n\n\n\n\n<\/p>\n<style>\n  .section-conainer {<br \/>    margin-bottom: min(4.83vw, 50px);<br \/>    width: min(94vw, 1200px);<br \/>    margin-left: auto;<br \/>    padding-top: 0 !important;<br \/>    padding-bottom: 0 !important;<br \/>    margin-right: auto;<br \/>  }<br \/>   .section-conainer img {<br \/>    display: block;<br \/>    margin-left: auto;<br \/>    margin-right: auto;<br \/>    margin-bottom: 1em;<br \/>    width: 70%;<br \/>  }<br \/>  .section-conainer a {<br \/>    color: #09f;<br \/>  }<br \/>  .section-conainer a:hover {<br \/>    color: #09f;<br \/>    text-decoration: underline;<br \/>  }<br \/>  table {<br \/>    width: 100%;<br \/>    border-top: 1px solid #e0e0e0;<br \/>    border-left: 1px solid #e0e0e0;<br \/>    margin-bottom: min(4.35vw, 18px);<br \/>  }<br \/>  table th, table td {<br \/>    border-right: 1px solid #e0e0e0;<br \/>    border-bottom: 1px solid #e0e0e0;<br \/>    padding: 1em;<br \/>    font-size: clamp(14px, 3.38vw, 16px);<br \/>  }<br \/>  table th {<br \/>    width: 22%;<br \/>    font-size: clamp(14px, 3.38vw, 16px);<br \/>    text-align: left;<br \/>    background-color: #ccc;<br \/>    color: #000;<br \/>  }<br \/>  .section-conainer ul {<br \/>    margin-left: 1.6em;<br \/>  }<br \/>  .section-conainer li {<br \/>    list-style: disc;<br \/>  }<br \/>  .section-conainer ol li {<br \/>    list-style: decimal;<br \/>  }<br \/>  .right{<br \/>    text-align: right;<br \/>  }<br \/><\/style>\n<section class=\"section-conainer\">\n<p class=\"right\">Version 1.0 (Revised: 11th March, 2025)<br \/>\nPOCKETALK<\/p>\n<h3>1.Introduction<\/h3>\n<p>This document is intended for those who are considering using or are currently using POCKETALK Sentio (hereinafter referred to as &#8220;Sentio&#8221;). It aims to provide information about our company&#8217;s (hereinafter referred to as &#8220;we&#8221;) security initiatives regarding customer personal data (hereinafter referred to as &#8220;customer data&#8221;) that we hold, and to help you understand the precautions for using Sentio safely. This document also serves as an appendix to the Terms of Use* and constitutes an agreement between us and the customer regarding the use of Sentio.<\/p>\n<h3>2.About Cloud Service Providers<\/h3>\n<p>The Sentio Cloud is developed, operated, and provided to customers by us using Google Cloud Platform (hereinafter referred to as &#8220;GCP&#8221;).<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/pocketalk.jp\/hubfs\/images\/termhub\/sentio-en-01.webp\" alt=\"\" \/><\/p>\n<p class=\"caption\">\uff1cSentio &#8211; User and System Relationship Diagram\\_Serial Code Auth\uff1e<\/p>\n<h3>3.Division of Responsibilities Between Us and Customers<\/h3>\n<p>The following diagram explains the division of responsibilities between us and customers when using Sentio.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/pocketalk.jp\/hubfs\/images\/termhub\/sentio-en-02.webp\" alt=\"\" \/><\/p>\n<p class=\"caption\">\uff1cSentio | Division of Responsibilities Between Us and Customers\uff1e<\/p>\n<h3>4.Data Storage Location<\/h3>\n<p>GCP and AWS used in Sentio are operated in the following regions:<\/p>\n<ul>\n<li>GCP\n<ul>\n<li>Region: Asia Northeast<\/li>\n<li>Multi-AZ: 2 locations within Asia<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>5.Service Level Objectives (SLO)<\/h3>\n<table>\n<tbody>\n<tr>\n<th>Service hours<\/th>\n<td>24 hours a day, 365 days a year<br \/>\n** We also monitor the service during the same time period.<\/td>\n<\/tr>\n<tr>\n<th>Service availability<\/th>\n<td>99.0%<br \/>\n**Does not include annual planned service outages<\/td>\n<\/tr>\n<tr>\n<th>Planned service outages<\/th>\n<td>2~4 times \/ year<br \/>\n** Service outages are expected to last up to 6 hours at a time.<\/td>\n<\/tr>\n<tr>\n<th>Data backup<\/th>\n<td>The DB configuration is redundant with a primary \/ secondary configuration (constantly synchronized).<br \/>\nData generation management backup is not provided.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>6.Our Safety Management Measures<\/h3>\n<p>We strive to design, build, and operate appropriate information security and data security both internally and with our business partners so that customers can use our services with peace of mind and safety.<\/p>\n<h4>Policies for Information Security<\/h4>\n<p>We have established the &#8220;Basic Information Security Policy&#8221; and &#8220;Basic Cloud Service Security Policy&#8221; as the basic policies for our information security initiatives in cloud services, and we operate our services in accordance with these policies.<\/p>\n<h4>Roles and Responsibilities for Information Security<\/h4>\n<p>We have established the &#8220;Basic Information Security Policy&#8221; and &#8220;Basic Cloud Service Security Policy&#8221; as the basic policies for our information security initiatives in cloud services, and we operate our services in accordance with these policies.<\/p>\n<h4>Communication with Relevant Authorities<\/h4>\n<p>Communication with relevant authorities is as defined in &#8220;4. Data Storage Location&#8221;.<\/p>\n<h4>Sharing and Division of Roles and Responsibilities in the Cloud Computing Environment (CLD.6.3.1)<\/h4>\n<p>The sharing and division of roles and responsibilities in the cloud computing environment are as defined in &#8220;3. Division of Responsibilities Between Us and Customers&#8221;.<\/p>\n<h4>Improving Information Security Awareness, Education, and Training<\/h4>\n<p>We promote the importance of information security throughout the company and regularly conduct necessary education and training.<\/p>\n<h4>Asset Inventory<\/h4>\n<p>We identify and appropriately manage information, other assets related to information, and assets related to information processing facilities.<\/p>\n<h4>Removal of Cloud Service Customer Assets (CLD.8.1.5)<\/h4>\n<p>The handling of customer data when a customer terminates the use of the service is described below.<\/p>\n<ul>\n<li>Customers cannot apply for service termination by themselves from the functions provided by Sentio. For customers who wish to terminate the service, please contact the following contact points.Contact Information<br \/>\nNorth American customers: <a href=\"https:\/\/pocketalk.com\/es_es\/contact-us\/\">https:\/\/pocketalk.com\/contact-us<\/a><br \/>\nEuropean customers: <a href=\"https:\/\/pocketalk.com\/en_eu\/contact-us\">https:\/\/pocketalk.com\/en_eu\/contact-us<\/a><br \/>\nAsian customers: <a href=\"https:\/\/pocketalk.link\/inquiry\">https:\/\/pocketalk.link\/inquiry<\/a><\/li>\n<li>If you need the history data of the interpretation by Sentio, please download it from Sentio at your own responsibility and store it appropriately. (However, it is necessary to turn ON the download setting of the interpretation history by the operation on Sentio. For details, please refer to the manual.)<\/li>\n<\/ul>\n<h4>Labeling Information<\/h4>\n<p>Sentio does not provide a function to label the name of customer information or terminal information because there is no registration information.<\/p>\n<h4>User Registration and Deletion<\/h4>\n<p>Sentio uses serial code authentication for service usage. Serial codes can only be issued by our company, and customers cannot issue them themselves. Please contact our company for the issuance of new serial codes.<\/p>\n<h4>Providing User Access<\/h4>\n<p>Sentio uses serial code authentication to use the service. Serial codes can only be issued by us, and customers cannot issue them by themselves. Please contact us for issuing new serial codes and deleting them.<\/p>\n<h4>Managing Privileged Access Rights<\/h4>\n<p>Sentio does not have privileged access rights.<\/p>\n<h4>Management of User Secret Credentials<\/h4>\n<p>The management of serial codes is as defined in &#8220;3. Division of Responsibilities Between Us and Customers&#8221;.<\/p>\n<h4>Restricted Access to Information<\/h4>\n<p>Sentio does not limit the information displayed or the functions available for each serial code.<br \/>\nIn addition, Sentio has a function to share the translation result with a specified shared device (hereinafter referred to as the &#8220;sharing function&#8221;). When the sharing function is used, a URL is issued, and the translation result can be viewed by accessing the URL from the shared device. The shared device can only view the translation result, and cannot re-share it. Also, the translation result is not stored on the shared device or in the cloud at all.<br \/>\nFor details, please refer to the manual.<\/p>\n<h4>Use of Privileged Utility Programs<\/h4>\n<p>Sentio does not provide utility programs such as APIs that bypass security procedures and enable the use of various service functions. For privileged utility programs necessary for service provision in our company, we strictly limit users, confirm the validity of use in advance, acquire logs, and conduct reviews.<\/p>\n<h4>Separation in Virtual Computing Environment (CLD.9.5.1)<\/h4>\n<p>It operates in a multi-tenant environment and controls access to other tenants.<\/p>\n<h4>Fortification of Virtual Machines (CLD.9.5.2)<\/h4>\n<p>All virtualized environments to be constructed restrict ports and protocols to block unauthorized access. In principle, vulnerability diagnosis and penetration tests by a third-party organization are conducted once a year.<\/p>\n<h4>Policy on the Use of Management Measures by Encryption<\/h4>\n<p>Data stored on the device is encrypted using AES, with key management handled within browser storage. Communication is encrypted using SSL\/TLS (supporting TLS 1.2) communication.<\/p>\n<h4>Change Management Procedure<\/h4>\n<p>When updating or performing regular maintenance of the services provided, we will notify you in advance by email.<\/p>\n<h4>Capacity\/Ability Management<\/h4>\n<p>In order to provide stable service, we monitor the resources of each server and increase capacity as needed.<\/p>\n<h4>Security of Operations of Business Administrators (CLD.12.1.5)<\/h4>\n<p>The operation method and security setting operation of Sentio are explained in the manual.<br \/>\nIn our operation business, the cloud environment is managed separately for staging and production, and access is permitted only to limited business personnel. Access to and operations performed on the production environment are stored in the audit log. This access restriction is managed by GCP&#8217;s IAM, and IAM user inventory is regularly performed and managed appropriately.<\/p>\n<h4>Information Backup<\/h4>\n<p>The DB configuration is redundant with a primary\/secondary configuration (constantly synchronized).<br \/>\nSince we do not store any data about customers, we do not back up data by generation.<\/p>\n<h4>Event Log Acquisition<\/h4>\n<p>Sentio does not provide a function for customers to acquire event logs by themselves, but we acquire and store appropriate logs (for 90 days) necessary for service maintenance and management.<br \/>\nIf an important incident occurs and log information etc. is required for the purpose of actual investigation, we will conduct an investigation from the access log for the past 90 days according to the customer&#8217;s inquiry, so please contact <a href=\"mailto:privacy@pocketalk.com\">privacy@pocketalk.com<\/a>.<\/p>\n<h4>Clock Synchronization<\/h4>\n<p>Sentio synchronizes time (UTC) by unifying with the internal NTP server provided by GCP.<\/p>\n<h4>Cloud Service Monitoring (CLD.12.4.5)<\/h4>\n<p>We monitor the resource status related to the system such as CPU, memory, and disk usage rate.<br \/>\nWe also monitor the service to see if the Sentio web application is operating normally.<\/p>\n<h4>Management of Technical Vulnerabilities<\/h4>\n<p>We collect vulnerability information, and if it becomes necessary to respond within the scope of our responsibility, we will implement countermeasures in regular or emergency maintenance.<br \/>\nMaintenance information will be notified by email.<br \/>\nIn order to ensure even greater security, we establish security requirements at the time of development design, and perform not only in-house testing but also vulnerability diagnosis and penetration testing by third-party organizations before release.<\/p>\n<h4>Network Separation<\/h4>\n<p>Access to Sentio is done through the Internet line.<br \/>\nIn our maintenance and operation business for the production environment, we appropriately manage authority with GCP&#8217;s IAM, and permit access after application and approval. In addition, access to the production environment and operations performed are managed by storing them as audit logs.<\/p>\n<h4>Analysis and Specification of Information Security Requirements<\/h4>\n<p>We maintain and provide the information security required by customers under the Basic Information Security Policy and the Basic Cloud Service Security Policy.<br \/>\nAs the specifications of the information security functions mainly considered by customers, this document describes the following items.<\/p>\n<ul>\n<li>Access restriction function (restriction of access to information, fortification of virtual machines)<\/li>\n<li>Communication encryption function (policy on the use of management measures by encryption)<\/li>\n<li>Backup function (information backup)<\/li>\n<\/ul>\n<h4>Policy for Security-Conscious Development<\/h4>\n<p>As a security-conscious development policy, we address security risks and vulnerabilities from the development stage, and conduct vulnerability diagnosis and penetration testing by third parties at the time of release.<\/p>\n<h4>Security Handling in Supplier Agreement<\/h4>\n<p>The roles and responsibilities in Sentio are defined in the Terms of Use* and services are provided. Regarding the responsibility demarcation point of this service, please refer to &#8220;3. Division of Responsibilities Between Us and Customers&#8221;.<\/p>\n<h4>ICT Supply Chain<\/h4>\n<p>We grasp the information security level of the cloud service provider used by our company, and confirm that it is consistent with our information security.<br \/>\nSentio is operated with GCP as a cloud service provider.<br \/>\nFor the compliance status of GCP, please refer to the following.<br \/>\n<a href=\"https:\/\/cloud.google.com\/compliance\">https:\/\/cloud.google.com\/compliance<\/a><\/p>\n<h4>Responsibilities and Procedures<\/h4>\n<p>If a security incident (data loss, long-term system shutdown, etc.) that has a significant impact on Sentio users occurs, we will notify you by email within 72 hours in principle. For inquiries regarding security incidents, please contact <a href=\"mailto:privacy@pocketalk.com\">privacy@pocketalk.com<\/a>.<\/p>\n<h4>Reporting of Information Security Events<\/h4>\n<p>We will notify customers by email.<br \/>\nFor individual inquiries, please contact <a href=\"mailto:privacy@pocketalk.com\">privacy@pocketalk.com<\/a>.<\/p>\n<h4>Collection of Evidence<\/h4>\n<p>If a legitimate disclosure request based on law is made, such as a disclosure request from a court, customer data may be disclosed to the relevant organization without customer&#8217;s consent. If an important incident occurs to the customer and log information etc. is required for the purpose of actual investigation, we will conduct an investigation from the access log for the past 90 days according to the customer&#8217;s inquiry, so please contact <a href=\"mailto:privacy@pocketalk.com\">privacy@pocketalk.com<\/a>.<\/p>\n<h4>Identification of Applicable Laws and Contractual Requirements<\/h4>\n<p>The &#8220;governing law&#8221; applicable to the use of Sentio is &#8220;Japanese law&#8221;.<br \/>\nWe strive to legally comply with various laws and regulations related to Sentio operation in accordance with the related laws and regulations management guidelines.<\/p>\n<h4>Intellectual Property Rights<\/h4>\n<p>Intellectual property rights are defined in the Terms of Use*.<\/p>\n<h4>Protection of Records<\/h4>\n<p>For details on protection of records, please refer to &#8220;Event Log Acquisition&#8221;.<\/p>\n<h4>Regulation on Encryption Function<\/h4>\n<p>For the use of encryption, please refer to &#8220;Policy on the Use of Management Measures by Encryption&#8221;.<br \/>\nSentio does not utilize encryption technology subject to export regulations.<\/p>\n<h4>Independent Review of Information Security<\/h4>\n<p>We conduct internal audits and management reviews to maintain and improve information security.<\/p>\n<\/section>\n<div><strong>Terms of Use*<\/strong><br \/>\nPlease refer to the latest Terms of Use available:<\/div>\n<ul>\n<li>For people based in North America: <span draggable=\"true\"><a href=\"https:\/\/pocketalk.com\/es_es\/general-terms-of-use-na\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/pocketalk.com\/general-terms-of-use-na<\/a><\/span><\/li>\n<li>For people based in any other country outside of North America: <span draggable=\"true\"><a href=\"https:\/\/pocketalk.link\/tou\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/pocketalk.link\/tou<\/a><\/span><\/li>\n<\/ul>\n<p>","protected":false},"excerpt":{"rendered":"POCKETALK Sentio White Paper","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full-skinny.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5327","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/pages\/5327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/comments?post=5327"}],"version-history":[{"count":0,"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/pages\/5327\/revisions"}],"wp:attachment":[{"href":"https:\/\/pocketalk.com\/es_es\/wp-json\/wp\/v2\/media?parent=5327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}