We recognize importance of the personal information protection in the high information and communication society and try for the protection of the personal information based on the following policies.

1 About the acquisition of the personal information

We acquire personal information by legitimate fair means to win. We exhibit necessary information and use purpose in the case of the personal information acquisition beforehand.

2 About the use of the personal information

We use it in the accomplishment of duties within the use purpose that exhibited personal information in the case of the acquisition as far as it is necessary. I investigate it about the third person concerned fairly we use personal information between the third person jointly or when I entrust the third person with a privacy policy and supervise it with the contract that is reasonable to let you maintain a secret.

3 About the third person offer of the personal information

In us, it does not perform personal information to offer to the third person unless it fixes it for laws and ordinances without obtaining the person himself’s consent beforehand.

4 About the management of the personal information

We keep the accuracy of the personal information and manage this safely. We carry out unjust access and appropriate information security measures for computer viruses to prevent the loss of the personal information, destruction, manipulation and a leak. I take personal information, and we do not perform an information leak by transmitting a message to the outside.

5 Disclosure / a correction / a use stop / the elimination of the personal information

The person himself confirms that they have a right to demand disclosure / a correction / a use stop / elimination about personal information of the self, and we deal for these demands immediately. In addition, about our privacy policy, I give advice and hope and, if you have any questions, ask to have you contact it to we personal information inquiry window.

6 About an organization / the system

We appoint a personal information protection management representative and carry out the appropriate management of the personal information. We an officer, an employee and an employee (include the regular staff, a staff of contract, a staff of part-time job) I am and carry out the protection of the personal information and the training about an appropriate management method and carry out thorough appropriate handling of the personal information in the normal business routine.

7 Development / enforcement / maintenance / the improvement of the personal information protection rule

We devise a personal information protection rule and a rule and a rule to be related to to carry out this policy and common knowledge enforces this on our employee (I include the regular staff, a staff of contract, a staff of part-time job) and duties trust ahead, the others people concerned and carries it out and maintains it and improves it continuously.