top of page

Information security basic policy

We have established the "Information Security Basic Policy" as follows, and will work to continuously maintain and improve information security.

・ Clarify responsibilities regarding information security and establish a system for taking information security measures.

-Identify information security risks from the perspectives of confidentiality, integrity, and availability, and implement security measures.

・ We will comply with information security laws, national guidelines, and other norms.

・ Maintenance of information security management system We will carry out regular inspections of the operational status and make continuous improvements and reviews.

・ We will raise awareness of information security .


privacy policy

1. Handling of personal information [Compliance with laws and regulations] Personal information (referred to as the prescribed personal information under the Law Concerning the Protection of Personal Information (Act No. 57 of 2003, hereinafter referred to as the "Personal Information Protection Law")).

We will handle it in accordance with relevant laws and regulations such as the Personal Information Protection Law and this privacy policy.
[Purpose of use] Personal information will be acquired by fair and appropriate means, and the purpose of use will be notified or announced individually before use.
[Provided to a third party] Personal information will not be disclosed or provided to a third party without the consent of the person. However, this does not apply if there are reasons for exclusion stipulated by law.

2. Safety management measures

We will take necessary measures to prevent the leakage, loss or damage of the collected information and other appropriate management of the collected information.


This privacy policy will be reviewed and revised as necessary.

If there is a change in the handling of personal information that has already been acquired due to the revision of this privacy policy, we will follow the procedures prescribed by the Personal Information Protection Law.

bottom of page