Privacy Policy

Introduction

We see our corporate mission as "Contributing to society through our business activities," and in order to deliver satisfaction to our customers and provide convenient, useful, and high-quality products and services, we make appropriate use of the personal information that we obtain.

We have established a Personal Information Protection Policy and conduct the following measures in order to protect and maintain personal information, and to guard against the risk of leakage, loss or falsification, etc.

Definition of personal information to be protected

The personal information protected by the Company is that stipulated in the Act on the Protection of Personal Information.

Acquisition of personal information

The Company acquires personal information by lawful and fair means.

Purposes of use

 1. The Company handles personal information within the scope of the following purposes of use.

  (i) To fulfill contractual obligations and requests with customers and suppliers. 

   - Notifications regarding the execution of our business operations, delivery of products and services, or sending forms and vouchers

   - Notifications regarding business negotiations, meetings, etc.

   - Consultations regarding contracts

  (ii) To provide information about our services, products, etc.

   - Information on new products, services and events, etc.

   - Latest information on the Company and related events (exhibitions, etc.)

  (iii) For recruitment activities

   - Contact points and information provision related to recruitment activities

  (iv) To comply with regulatory obligations

   - Providing information and sending materials to shareholders and investors

   - Employment management of the Company's executive officers, employees, temporary employees, etc.

  (v) To improve the Company's services and manage risks

   - Requests for customer satisfaction surveys, etc.

   - Notifications regarding compliance-related investigations and reports, etc.

   - Maintaining records of visitors, communications, calls, and other inquiries.

 2. In the following cases, personal information may be handled beyond the scope of the purposes of use specified in the preceding paragraph.

   - Where the consent from the individual in question has been obtained

   - Where the information is to be used in a form where the individual cannot be identified (statistical data, etc.)

   - Where permitted by laws, regulations or guidelines

Measures for security management

The Company handles personal information appropriately and manages it securely in order to prevent leakage, loss, damage, etc. of personal information.  

 1. Organizational security management measures

  (i) To ensure the proper use and management of personal information within the Company, a personal information protection manager is appointed as the responsible staff member.

  (ii) Committees are established to maintain internal regulations, implement safety measures, provide education and training, and confirm compliance with regulations, etc.

  (iii) Members of the above committees are appointed as managers in their respective departments, and provide guidance to ensure that the relevant departments handle personal information in accordance with internal regulations, etc.

  (iv) To guard against incidents such as the leakage of personal information, a system has been established for reporting to the personal information protection manager.

 2. Staff security management measures 

  (i) The Company provides education and training on the handling of personal information, as appropriate.

  (ii) It is clearly stated in the Company's work regulations that any and all information learned in the course of work, including personal information, must be kept confidential.

 3. Physical security control measures 

  (i) The Company has established controlled areas for storing personal information, for which access requires the use of an IC card, and exit and entry logs are kept.

  (ii) PC login requires a password or biometric authentication.

  (iii) When personal information is deleted or destroyed, it is rendered into a state where it cannot be easily restored.

 4. Technical security management measures 

  (i) Access to folders storing personal information are controlled so that only authorized persons have access.

  (ii) Systems have been introduced to protect against unauthorized external access and unauthorized software.

Provision of information to third parties

The Company does not provide personal data to third parties for any reason other than the following.

 1. Where consent has been given.

 2. When it is necessary in order to provide products, services, etc. to customers within the scope of the purposes of use.

 3. Where the information is to be used jointly within the Group.

  (i) Items of personal data that may be used jointly:

     Address, name, telephone number, fax number, email address, date of birth, sex, 

     company name, address, telephone number, fax number, email address, affiliation, title, evaluation information, transaction information

  (ii) Purposes of use:

     As specified in this Policy.

  (iii) Manager:

     General Affairs Unit, General Affairs & Human Resources Dept., Business Management Division, Takashima & Co., Ltd.

 4. Where provision of personal data is stipulated by law.

Procedures for disclosure, deletion, suspension of use, and erasure

Please see "Responding to Requests for Disclosure, etc."

For inquiries and complaints, contact:

Personal Information Consultation Service, General Affairs Unit, General Affairs & Human Resources Dept., Takashima & Co., Ltd.

Tel: 81-3-5217-7600  Hours: 9:00 to 17:00 (JST) (Excluding weekends, public holidays and year end/ new year holidays)

Email: privacy@ta.tak.co.jp

About SSL Security

Our website supports "SSL" to protect customers' personal information. SSL is an abbreviation for "Secure Socket Layer," which is a communication method that allows encrypted transmission and reception between a web server and a web browser.

By using a browser that supports security functions, personal information entered by the customer, such as name, address, or telephone number, is automatically encrypted and then sent or received, so that, even in the unlikely event that the transmitted data are intercepted by a third party, there is no need to worry about the contents being stolen.

About Cookies

We use cookies and other technologies (hereinafter referred to as "Cookies") for such purposes as improving our services to our customers and delivering advertisements promoting our products.

A Cookie is a small data file that stores usage history and input content transmitted between the Internet browsing software (browser) and the server as a file on your computer when you use a web page.