{"url":"https://security.nekotricolor.com/entry/meti-protection-of-confidential-information-handbook","height":"190","title":"METI\u300c\u79d8\u5bc6\u60c5\u5831\u306e\u4fdd\u8b77\u30cf\u30f3\u30c9\u30d6\u30c3\u30af\uff5e\u4f01\u696d\u4fa1\u5024\u5411\u4e0a\u306b\u5411\u3051\u3066\uff5e \u300d\u30e1\u30e2","published":"2016-02-09 19:39:00","image_url":null,"provider_url":"https://hatena.blog","author_name":"nekotricolor","provider_name":"Hatena Blog","description":"2016\u5e742\u67088\u65e5\u306b\u7d4c\u6e08\u7523\u696d\u7701\u304b\u3089\u516c\u958b\u3055\u308c\u307e\u3057\u305f\u3002\u79d8\u5bc6\u60c5\u5831\u306e\u4fdd\u8b77\u30cf\u30f3\u30c9\u30d6\u30c3\u30af\uff5e\u4f01\u696d\u4fa1\u5024\u5411\u4e0a\u306b\u5411\u3051\u3066\uff5e\u672c\u6587\u306b\u51fa\u3066\u304f\u308b\u53c2\u8003\u8cc7\u6599\u3092\u307e\u3068\u3081\u305f\u3082\u306e\u3082\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002 \u69cb\u6210 \u7b2c\uff11\u7ae0 \u76ee\u7684\u53ca\u3073\u5168\u4f53\u69cb\u6210 \uff11\uff0d\uff11 \u76ee\u7684\u53ca\u3073\u7559\u610f\u70b9\u7b49 \uff11\uff0d\uff12 \u672c\u66f8\u306e\u5168\u4f53\u69cb\u6210 \uff11\uff0d\uff13 \u672c\u66f8\u306e\u4f7f\u3044\u65b9 \u30b3\u30e9\u30e0\u2460 \u672c\u66f8\u3092\u3069\u306e\u3088\u3046\u306b\u4f7f\u3048\u3070\u3044\u3044\u306e\uff1f \u7b2c\uff12\u7ae0 \u4fdd\u6709\u3059\u308b\u60c5\u5831\u306e\u628a\u63e1\u30fb\u8a55\u4fa1\u3001\u79d8\u5bc6\u60c5\u5831\u306e\u6c7a\u5b9a \uff12\uff0d\uff11 \u4f01\u696d\u304c\u4fdd\u6709\u3059\u308b\u60c5\u5831\u306e\u8a55\u4fa1 \uff08\uff11\uff09\u4f01\u696d\u304c\u4fdd\u6709\u3059\u308b\u60c5\u5831\u306e\u5168\u4f53\u50cf\u306e\u628a\u63e1 \uff08\uff12\uff09\u4fdd\u6709\u3059\u308b\u60c5\u5831\u306e\u8a55\u4fa1 \uff12\uff0d\uff12 \u79d8\u5bc6\u60c5\u5831\u306e\u6c7a\u5b9a \uff08\uff11\uff09\u79d8\u5bc6\u60c5\u5831\u306e\u6c7a\u5b9a\u306b\u5f53\u305f\u3063\u3066\u8003\u616e\u3059\u3079\u304d\u89b3\u70b9\u306e\u30a4\u30e1\u30fc\u30b8 \u7b2c\uff13\u7ae0 \u79d8\u5bc6\u60c5\u5831\u306e\u5206\u985e\u3001\u60c5\u5831\u6f0f\u3048\u3044\u5bfe\u7b56\u306e\u9078\u629e\u53ca\u3073\u305d\u306e\u30eb\u30fc\u30eb\u5316 \uff13\uff0d\u2026","categories":["\u6587\u66f8\u30e1\u30e2"],"blog_url":"https://security.nekotricolor.com/","author_url":"https://blog.hatena.ne.jp/nekotricolor/","version":"1.0","type":"rich","blog_title":"\u30c8\u30ea\u30b3\u30ed\u30fc\u30eb\u306a\u732b/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","width":"100%","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity.nekotricolor.com%2Fentry%2Fmeti-protection-of-confidential-information-handbook\" title=\"METI\u300c\u79d8\u5bc6\u60c5\u5831\u306e\u4fdd\u8b77\u30cf\u30f3\u30c9\u30d6\u30c3\u30af\uff5e\u4f01\u696d\u4fa1\u5024\u5411\u4e0a\u306b\u5411\u3051\u3066\uff5e \u300d\u30e1\u30e2 - \u30c8\u30ea\u30b3\u30ed\u30fc\u30eb\u306a\u732b/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}