Privacy Policy
Ⅰ.Privacy Policy Ⅰ.Privacy Policy
________ (hereinafter referred to as “our company”) shall comply with laws and regulations and other norms regarding the protection of personal information, establish a voluntary system and rules, and We declare that we will carry out and maintain In order to carry out this declaration, we have established internal regulations regarding the protection of personal information, made them known to our employees (including executives, employees with employment relationships and temporary staff, etc.) and other related parties, and implemented them. We will continue to improve and maintain. In order to prevent the loss, damage, falsification and leakage of personal information, we have established internal regulations regarding the safety management of information systems, and will implement appropriate information security measures such as countermeasures against unauthorized access and computer viruses. . The basic principles of personal information protection at our company are as follows. (1) Prohibition of illicit collection Personal information shall be collected by lawful and fair means, and collection by illicit means is prohibited. (2) Prohibition of use other than the intended purpose When using personal information, it shall be handled within the scope of the purpose of use, and use beyond the scope of the purpose is prohibited. (3) Ensuring safety When handling personal information, we pay attention to safety management and prohibit input/output, storage, transportation, transmission, and disposal in a state where safety cannot be ensured. (4) Prohibition of provision to third parties It is prohibited to provide personal information to third parties without the consent of the person beyond the scope stipulated by laws and regulations. When entrusting personal information to a third party in connection with outsourcing work, or when using personal information jointly with a third party, we will conclude a necessary contract with the third party, and other We will take legally required measures. (5) Respect for the rights of the person Recognizing that the person who is the subject of personal information has the right to request disclosure, correction, suspension of use, etc. of his/her own personal information, We will respond to requests in accordance with the procedures stipulated by laws and regulations. ________ (hereinafter referred to as “our company”) shall comply with laws and regulations and other norms regarding the protection of personal information, establish a voluntary system and rules, and We declare that we will carry out and maintain In order to carry out this declaration, we have established internal regulations regarding the protection of personal information, made them known to our employees (including executives, employees with employment relationships and temporary staff, etc.) and other related parties, and implemented them. We will continue to improve and maintain. In order to prevent the loss, damage, falsification and leakage of personal information, we have established internal regulations regarding the safety management of information systems, and will implement appropriate information security measures such as countermeasures against unauthorized access and computer viruses. . The basic principles of personal information protection at our company are as follows. (1) Prohibition of illicit collection Personal information shall be collected by lawful and fair means, and collection by illicit means is prohibited. (2) Prohibition of use other than the intended purpose When using personal information, it shall be handled within the scope of the purpose of use, and use beyond the scope of the purpose is prohibited. (3) Ensuring safety When handling personal information, we pay attention to safety management and prohibit input/output, storage, transportation, transmission, and disposal in a state where safety cannot be ensured. (4) Prohibition of provision to third parties It is prohibited to provide personal information to third parties without the consent of the person beyond the scope stipulated by laws and regulations. When entrusting personal information to a third party in connection with outsourcing work, or when using personal information jointly with a third party, we will conclude a necessary contract with the third party, and other We will take legally required measures. (5) Respect for the rights of the person Recognizing that the person who is the subject of personal information has the right to request disclosure, correction, suspension of use, etc. of his/her own personal information, We will respond to requests in accordance with the procedures stipulated by laws and regulations.
II. Security control measures II. Security control measures
Formulation of basic policy In order to ensure the proper handling of personal data, we have formulated this basic policy regarding "compliance with relevant laws and regulations, guidelines, etc." and "point of contact for inquiries and complaints." Establishment of rules related to the handling of personal data We have established personal information protection rules for each stage of acquisition, use, storage, provision, deletion, disposal, etc., regarding the handling method, responsible person, person in charge, and their duties, etc. Organizational security control measures In addition to appointing a person responsible for handling personal data, clarifying the scope of personal data handled by employees who handle personal data and the extent of personal data handled by such employees, Or, we have established a system for reporting and contacting the person in charge in the event that a symptom is detected. In addition, we regularly conduct self-inspections regarding the handling of personal data, and audits are conducted by other departments. Personal security control measures Matters concerning the confidentiality of personal data are described in the rules of employment, and regular training is provided to employees regarding points to note regarding the handling of personal data. Physical security control measuresIn areas where personal data is handled, we control the entry and exit of employees and restrict the equipment they bring in, as well as implement measures to prevent unauthorized persons from viewing personal data. Take measures to prevent theft or loss of equipment, electronic media, documents, etc. that handle personal data, and when carrying such equipment, electronic media, etc., including movement within the office, personal data cannot be easily identified. We are taking measures to We implement technical security control measures to limit the scope of personal information databases, etc. handled by the person in charge and the scope of handling personal information databases, etc., by implementing access control, and introducing a mechanism to protect information systems that handle personal data from unauthorized external access or unauthorized software. increase. Formulation of basic policy In order to ensure the proper handling of personal data, we have formulated this basic policy regarding "compliance with relevant laws and regulations, guidelines, etc." and "point of contact for inquiries and complaints." Establishment of rules related to the handling of personal data We have established personal information protection rules for each stage of acquisition, use, storage, provision, deletion, disposal, etc., regarding the handling method, responsible person, person in charge, and their duties, etc. Organizational security control measures In addition to appointing a person responsible for handling personal data, clarifying the scope of personal data handled by employees who handle personal data and the extent of personal data handled by such employees, Or, we have established a system for reporting and contacting the person in charge in the event that a symptom is detected. In addition, we regularly conduct self-inspections regarding the handling of personal data, and audits are conducted by other departments. Personal security control measures Matters concerning the confidentiality of personal data are described in the rules of employment, and regular training is provided to employees regarding points to note regarding the handling of personal data. Physical security control measuresIn areas where personal data is handled, we control the entry and exit of employees and restrict the equipment they bring in, as well as implement measures to prevent unauthorized persons from viewing personal data. Take measures to prevent theft or loss of equipment, electronic media, documents, etc. that handle personal data, and when carrying such equipment, electronic media, etc., including movement within the office, personal data cannot be easily identified. We are taking measures to We implement technical security control measures to limit the scope of personal information databases, etc. handled by the person in charge and the scope of handling personal information databases, etc., by implementing access control, and introducing a mechanism to protect information systems that handle personal data from unauthorized external access or unauthorized software. increase.
III. Acquisition Matters III. Acquisition Matters
When acquiring personal information, we will clearly indicate the purpose of use, and with the consent of the customer, we will acquire it by lawful and fair means within the scope necessary to achieve the purpose of use specified in advance. If it becomes necessary to use personal information beyond the scope of the purpose, we will contact (notify) the customer to that effect and obtain their consent. In addition, we do not market products or services to children and we do not knowingly collect personal information from children. If you are under the age of 18, we will handle your personal information only after confirming and consenting to you and obtaining the consent of your guardian. When acquiring personal information, we will clearly indicate the purpose of use, and with the consent of the customer, we will acquire it by lawful and fair means within the scope necessary to achieve the purpose of use specified in advance. If it becomes necessary to use personal information beyond the scope of the purpose, we will contact (notify) the customer to that effect and obtain their consent. In addition, we do not market products or services to children and we do not knowingly collect personal information from children. If you are under the age of 18, we will handle your personal information only after confirming and consenting to you and obtaining the consent of your guardian.
IV. Matters concerning purpose of use IV. Matters concerning purpose of use
We will use the acquired personal information for the following purposes. Provision of services to customers Contacting customers for the purpose of confirming reservation details, etc. Guidance and confirmation related to shipment of products, payment and settlement, and other transactions, etc. Guidance, advertisement, and Implementation of advertisements and questionnaires Grasping, improvement and development of the usage status of facilities, products and services of the Company and its partners Improvement of the Company's website and its services and products Other business laws, regulations or administrative authorities incidental or related to the above purpose of use Responses based on notifications and guidance, etc. We will use the acquired personal information for the following purposes. Provision of services to customers Contacting customers for the purpose of confirming reservation details, etc. Guidance and confirmation related to shipment of products, payment and settlement, and other transactions, etc. Guidance, advertisement, and Implementation of advertisements and questionnaires Grasping, improvement and development of the usage status of facilities, products and services of the Company and its partners Improvement of the Company's website and its services and products Other business laws, regulations or administrative authorities incidental or related to the above purpose of use Responses based on notifications and guidance, etc.
V. Provision to Third Parties V. Provision to Third Parties
We will not provide or disclose personal information in our possession to any third party without the consent of the customer, except as permitted by law. We will not provide or disclose personal information in our possession to any third party without the consent of the customer, except as permitted by law.
Ⅵ. Matters concerning consignment Ⅵ. Matters concerning consignment
When entrusting all or part of our business to the extent necessary to achieve the purpose of use described in III, we will properly sign a contract that includes the confidentiality management and supervision of personal information. manage and supervise When entrusting all or part of our business to the extent necessary to achieve the purpose of use described in III, we will properly sign a contract that includes the confidentiality management and supervision of personal information. manage and supervise
VII. Matters concerning use VII. Matters concerning use
We may use the personal information we hold within the scope necessary to achieve the purposes described in IV. Personal information to be jointly used will be managed responsibly by our personal information protection manager. Inquiries about details will be handled at the contact point IX below. Items of personal information to be jointly used Address, name, company name, telephone number, e-mail address, credit card information, flight information, and other information necessary for providing services to customers Security (2) Reservation and provision of pick-up service (3) Room cleaning (4) Payment (5) Reservation work (6) Other work incidental or related to the above purpose of use Person responsible for management of personal information _______ ______ ______ We may use the personal information we hold within the scope necessary to achieve the purposes described in IV. Personal information to be jointly used will be managed responsibly by our personal information protection manager. Inquiries about details will be handled at the contact point IX below. Items of personal information to be jointly used Address, name, company name, telephone number, e-mail address, credit card information, flight information, and other information necessary for providing services to customers Security (2) Reservation and provision of pick-up service (3) Room cleaning (4) Payment (5) Reservation work (6) Other work incidental or related to the above purpose of use Person responsible for management of personal information _______ ______ ______
Ⅷ. Handling of personal information on our website Ⅷ. Handling of personal information on our website
We will store personal information received from customers on our website only as a record of the provision of the service you have applied for, and will delete it after a certain period of time. In addition, as a safety measure, we are responding as follows. To ensure the safety of personal information, we take reasonable safety measures from both management, operation and system aspects to prevent unauthorized access, loss, destruction, falsification, leakage, etc. We use encrypted communication using SSL (Secure Sockets Layer) for sending and receiving personal information to and from our website via the Internet. Information collection on our website As information collection on our website, information using "cookies (a technology that saves usage history etc. sent and received on the web in the customer's browser)" and access records to our website ( We collect access logs), but we do not use them for any purpose other than statistical processing to improve the operation and service of our website and investigation of causes such as unauthorized access. If you do not wish to accept cookies, you may refuse cookies by changing your internet browser settings. We will store personal information received from customers on our website only as a record of the provision of the service you have applied for, and will delete it after a certain period of time. In addition, as a safety measure, we are responding as follows. To ensure the safety of personal information, we take reasonable safety measures from both management, operation and system aspects to prevent unauthorized access, loss, destruction, falsification, leakage, etc. We use encrypted communication using SSL (Secure Sockets Layer) for sending and receiving personal information to and from our website via the Internet. Information collection on our website As information collection on our website, information using "cookies (a technology that saves usage history etc. sent and received on the web in the customer's browser)" and access records to our website ( We collect access logs), but we do not use them for any purpose other than statistical processing to improve the operation and service of our website and investigation of causes such as unauthorized access. If you do not wish to accept cookies, you may refuse cookies by changing your internet browser settings.
Ⅸ. Inquiries regarding personal information Ⅸ. Inquiries regarding personal information
For inquiries regarding personal information, please contact the following. Each hotel representative number For inquiries regarding personal information, please contact the following. Each hotel representative number
X. Changes to handling details X. Changes to handling details
The contents of this guide are subject to change without notice due to changes in laws and regulations, changes in social conventions, and other reasons. _______, 2022 The contents of this guide are subject to change without notice due to changes in laws and regulations, changes in social conventions, and other reasons. _______, 2022