Shinko MechatroTech Co., Ltd. (hereinafter referred to as Shinko) will strive to protect the Personal Information in accordance with the Company Policy stated below with consideration of the importance of Personal Information Protection under Integrated information and communication society.
1. Establishment of Compliance Program for Personal Information Protection and continuous improvements
Shinko will educate board of directors and employees on the importance of Personal Information Protection and will establish, implement and continuously improve the Compliance Program regarding Personal Information Protection (including this statement, regulations of Personal Information Protection, other regulations and rules).
2. Collection and Usage of Personal Information
When Shinko collects personal information, Shinko will notify the purpose of usage, the place where the information is used and required items beforehand, and will handle it by the appropriate and fair method. Shinko will only use the obtained personal information within the range of the notified purpose of usage and the necessity for execution of our business, unless otherwise is required under justifiable causes such as legal obligations.
3. Provision of the Personal Information to Third Party
Shinko will not provide the obtained personal information to any third parties without prior consent from the person except the special cases where the disclosure of such information is legally obliged.
4. Request to Disclose and/or Correct Personal Information
Shinko will implement appropriate and prompt measures in accordance with laws or applicable regulations when a person requests to disclose, correct, add, delete, stop usage of his/her personal information provided to Shinko.
5. Compliance with Laws and Regulations
Shinko will comply with laws, regulations and other rules applicable to the protection of personal information held by Shinko, and maintain it appropriately in accordance with the purpose of usage. In order to accomplish this purpose, Shinko will appoint the person in charge of management, implement security measures against issues such as unauthorized access, loss, data amendment, leakage and so on.