１．Collection of Personal Information
As the designated administrator, we will collect personal information through lawful and fair means.
２．Use of Personal Information
As the designated administrator, we will use personal information within the scope of the stated purposes at the time of collection and to the extent necessary for the performance of our duties. In the event of joint use of personal information with a third party or entrusting the handling of personal information to a third party, we will conduct a thorough investigation of the said third party and provide appropriate supervision to ensure the confidentiality of the information.
３．Third-Party Provision of Personal Information
As the designated administrator, we will ensure the accuracy of personal information and manage it securely. We will take appropriate information security measures to prevent unauthorized access, computer viruses, and other risks that may lead to the loss, destruction, alteration, or leakage of personal information. We will make efforts to prevent the leakage of personal information through measures such as preventing the unauthorized removal or external transmission of information.
4．Disclosure, Correction, Suspension of Use, and Erasure of Personal Information
As the designated administrator, we recognize that individuals have the right to request the disclosure, correction, suspension of use, or erasure of their own personal information. We will promptly respond to such requests in accordance with applicable laws and prescribed procedures. We have established a contact point for inquiries, consultations, and complaints regarding personal information and will address them accordingly.
5．Organization and Structure
As the designated administrator, we have appointed a personal information protection manager to ensure the appropriate management of personal information. We provide education and training to our employees on the protection and proper management of personal information, and we strive to ensure the appropriate handling of personal information in our daily operations.
6．Development, Implementation, Maintenance, and Improvement of Personal Information Protection Compliance Program
To execute this policy, the designated administrator has developed a Personal Information Protection Compliance Program (including this policy, “Personal Information Protection Regulations,” and other relevant rules). The program is communicated, implemented, and maintained among the designated administrator’s employees and other stakeholders. Continuous improvements are made as necessary.