The company shall recognize the importance of protecting personal in an advanced information and
communications society and strive to protect personal information based on the following policies.
The company shall acquire personal information through legal and fair methods.
The company shall use personal information within the scope of the usage methods presented during the acquisition of personal information as needed to carry out operations.
Should the company jointly use personal information with a third party or entrust a third party with the handling of personal information, the company shall strictly investigate the corresponding third party first and supervise it appropriately to ensure confidentiality.
Excluding instances stipulated by law, the company shall not provide personal information to a third party without prior approval from the individual.
The company shall maintain the accuracy of personal information and manage it safely.
In order to prevent the loss, destruction, falsification, or leakage of personal information, the company shall carry out appropriate information security measures against illicit access, computer viruses, and other corresponding behavior.
The company shall not leak personal information by taking it out and sending it externally.
Should the company receive a request for the disclosure, revision, suspension of use, or deletion of personal information from the individual who this personal information belongs to and is confirmed to have the rights to this request, the company shall promptly comply with this request without objection.
To add, please reach out to the company’s personal information distribution list of firstname.lastname@example.org should you have any questions or concerns about the company’s handling of personal information.
The company shall appoint a Personal Information Protection Manager and carry out appropriate management of personal information.
The company shall train its officers and employees on methods of protecting and appropriately managing personal information and be thorough about the appropriate handling of personal information during through daily operations.
In order to carry out these policies, the company shall formulate a Personal Information Protection Compliance Program (these policies, the “Regulations to Prevent the Leakage of Confidential Information,” the “Personal Information Management Manual,” and other rules and regulations), notify employees of the company and other related parties of the program to ensure strict compliance, maintain it, and regularly improve it.