Privacy Policy

Justsystem's privacy policy

Since July 2002, we have been authorized as a certified organization, to use the privacy mark, which certifies that we are a business organization properly handling Personal Information in compliance with JISQ15001, "Requirements for Personal Information Protection Management System."

プライバシーマーク

Privacy Policy

Kyotaro Sekinada
President & CEO

JustSystems Corporation (hereafter “the Company”) obtains and uses various information including personal information as part of its software business, service business and for other business purposes. The Company regards the safe and correct handling of this personal information as an important responsibility as a business operator. Accordingly, the Company undertakes the following initiatives and makes every effort to appropriately protect personal information.

  1. The Company has established regulations concerning the handling of information which can be used to identify a specific individual (hereafter “personal information”), and has developed an organizational structure designed to protect personal information.
  2. When personal information is obtained from the individual to whom it relates, the information is only obtained within the necessary scope after the individual has been informed of the purpose of use and information the individual can use to contact the Company with complaints or consultation.
  3. The Company takes appropriate measures to ensure that personal information is not used, disclosed to third parties or provided to third parties beyond the extent needed to achieve the purpose of use, without the consent of the individual concerned.
  4. The Company implements measures to maintain personal information in an accurate and up-to-date form, and to prevent or redress the unauthorized access, loss, destruction, manipulation, leakage or other circumstances affecting personal information.
  5. When the Company entrusts an external party with the processing of personal information, it requires the external party to conclude a contract preventing the leakage or sub-provision of the information, and engages in appropriate management.
  6. When entrusted with personal information from another party, the Company ensures strict management of the information and only uses it within the scope stipulated by agreement.
  7. When fielding a request regarding personal information such as confirmation or correction, the Company will respond promptly and to a reasonable extent upon such request to one of the Company’s points of contact.
  8. The Company will comply with laws, regulations, government-stipulated guidelines and other requirements concerning the personal information it possesses and make efforts to maintain and continually improve its personal information protection management system.

Established November 20, 2001
Revised October 1, 2007
Revised July 28, 2008

  • Please contact the Company with inquiries concerning the personal information protection policy using the following web form (Japanese Only).

The Purpose of Use of Personal Information

  1. When the Company has obtained personal information directly from the individual concerned either in writing or through its website, except when the purpose of use is clear judging from the situation of the acquisition and when specification of the purpose of use is not required by law, the Company will disclose the purpose of use each time. The main purposes of use for personal information as part of the Company’s business operations are as follows.
    • Proposing, selling or providing products, services or support to customers
    • Providing information on the products, services, events, etc. of the Company or a Company partner
    • Responding to inquiries or requests from customers
    • Requesting cooperation in questionnaires or the evaluation monitoring of products and services
    • Running campaigns and sending related gifts
    • Dispatching Company product documentation, catalogs and other publications
    • Making contact in connection with the fulfillment of contractual obligations or transactions
  2. When personal information is obtained directly from an individual by means other than in writing or via the Internet, such as over the telephone, or when the information is obtained via public information or a third party, the purposes of use will be as follows, except when the purpose of use is clear judging from the situation of the circumstances of the acquisition and when notification and publication of the purpose of use is not required by law.
    1. Personal information of the officers and employees belonging to a corporation or other group
      • To contact the officers or employees in question (proposals, requests, etc.)
      • To engage in business talks with the group or fulfill contractual obligations
      • To respond to inquiries or request regarding Company products or services, etc.
    2. Personal information of shareholders
      Check here for information about how the personal information of shareholders is handled (Japanese Only).
    3. Personal information of applicants for employment
      Check here for information about how the personal information of applicants for employment is handled (Japanese Only).
    4. Personal information received from the Japan Data Communications Association as a business
      operator taking part in the Anti-Spam Consulation Center
      Research and development for spam control
    5. Personal information entrusted by business partners for handling
      Provision, management and maintenance of storage services and solution services utilizing Internet data centers
    6. Information acquired from telephone books, commercially available name lists and other public information (securities reports, official gazette, websites, etc.)
      • Providing information on the products, services, events, etc. of the Company or a Company partner
      • Dispatching Company product documentation, catalogs and other publications
  3. Obtaining personal related information

    We may use the following personal related information obtained from third parties for purposes such as measuring the effectiveness of our advertising campaigns and promotions by linking it to personally identifiable information properly managed by us.

    • Information received by using affiliate marketing (the date and time a user clicked our advertisements, referring URL, and device types and operating systems used)
  4. When personal information is used beyond the extent necessary to achieve the purpose of use, as a general rule, the Company will obtain consent from the concerned individual regarding the revised purpose of use and other matters. However, this will not apply when any of the following apply.
    • When required by law
    • When it is necessary to protect the life, body or property of a person, and it is difficult to obtain the consent of the individual concerned
    • When it is particularly necessary to improve public health or promote the sound development of a juvenile, and it is difficult to obtain the consent of the individual concerned
    • Wen it is necessary to cooperate with a government agency, a local government or a personh entrusted by such a body to execute the affairs provided for in laws and regulations, where obtaining consent from the individual concerned may impede the execution of those affairs
  5. On the handling of personal information that includes credit card information, the purpose for obtaining credit card information from customers of the Company (cardholder names, card numbers, expiry dates), the name of the party obtaining the credit information, recipients of the information and the retention period are as follows.
    1. Purpose of use
      To carry out payment processing for purchased products and services when the customer wishes to use credit card payment, and to respond to inquiries concerning such payments
    2. Party obtaining the information
      JustSystems Corporation
    3. Recipients of the information
      The credit card company used by the customer when making the credit card payment
    4. Retention period
      Seven years from the end of the contract or purpose of use related to the use of Company services and the end of business operations related to the usage

Provision of Personal Information to Third Parties

The Company will manage the personal information obtained from customers appropriately, and will not provide the information to third parties, except in the following cases.

  • When the individual concerned has provided consent
  • When the information is public information about the officers or shareholders of a cooperation or other group, and the individual concerned has been notified about provision of the information to third parties in advance, or the provision has been publicly announced in advance
  • When all or part of the handling of the personal information is entrusted within the extent required to achieve the specified purpose of use
  • When the personal information is provided in connection with the succession of business due to a company merger or other reasons, and the personal information in question is handled within the bounds of the purpose of use in place prior to the succession
  • When the personal information is jointly used between specific parties after the procedures required by law and regulations have been undertaken
  • When required by law
  • When it is necessary to protect the life, body or property of a person, and it is difficult to obtain the consent of the individual concerned
  • When it is particularly necessary to improve public health or promote the sound development of a juvenile, and it is difficult to obtain the consent of the individual concerned
  • When it is necessary to cooperate with a government agency, a local government or a person entrusted by such a body to execute the affairs provided for in laws and regulations, where obtaining consent from the individual concerned may impede the execution of those affairs

About the Joint Use of Personal Information
When the Company engages in joint business activities with specific business operators, the necessary personal information of a customer may be used on a joint basis with those business operators. However, in such cases, the individual concerned will be notified of matters including the purpose of use in advance, or those matters will be publicly announced in advance. In addition, to ensure the safe management of the information, the Company will conclude agreements concerning the joint usage of personal information and implement appropriate management.

The Voluntary Basis on Which Customers Provide their Personal Information

Customers provide their personal information to the Company on a voluntary basis. When a customer is unable to provide the personal information required for the Company to achieve the purpose of use, the Company may not be able to provide various services appropriately.

Procedures to Comply with Requests for Disclosure, etc.

Based on JIS Q 15001, the Company follows the procedures established in the following items to response to requests for notification of purpose of use, disclosure, amendment, addition, deletion, cessation of use, erasure or cessation of provision to third parties (hereafter “requests for disclosure, etc.”) from individuals whose personal information is subject to disclosure or their proxies.
Also note that when a customer using the products or services of the Company wishes to make inquiries about or make changes to registered information after identifying the service concerned, irrespective of the procedures outlined below, the Company will respond to the extent possible through the inquiry contact points provided for each service. (However, please note in advance that depending on the nature of the customer’s request and the service, a customer may be asked to go through the procedures outlined below.)

  1. Address for submission of requests for disclosure, etc.
    Please mail requests for disclosure, etc. to the following address after attaching the necessary documents to the designated application form and enclosing the processing fee. In addition, please mark the envelope in red with the text “Contains Disclosure, etc. Request.”
    Personal Information Handling Desk
    JustSystems Corporation
    Shinjuku Oak Tower
    Nishi-Shinjuku 6-8-1, Shinjuku-ku, Tokyo, 163-6017 Japan
  2. 「Documents (forms) to be submitted along with requests for disclosure, etc.
    When making a request for disclosure, etc., download the following application form (A), fill out the designated items, and mail the application form along with the documents for identification (B).
  3. Requests for disclosure, etc. made by a proxy
    When the person making a request for disclosure, etc. is a proxy, in addition to the documentation described above, the following documents (A, B or C) should also be enclosed.
    • When the proxy is a person with parental authority, or the guardian of a minor
      • A copy of the family register (in the case of a proxy with parental authority, a health insurance certificate on which the individual concerned is listed as a dependent also suffices)
    • When the proxy is an assistant, curator, guardian of an adult or voluntary guardian
      • Certificate of Guardianship - 1 copy
    • When a proxy is consigned
      • Letter of Proxy (affixed with a registered seal) - 1 copy
      • Certificate of Seal-Impression of the individual concerned - 1 copy
  4. Processing fees for requests for disclosure, etc. and how the fees are collected
    The following amount is collected for each application only when a request for notification of disclosure or the purpose of use is made (including costs of registered mail for replies from the Company)
    1,000 yen
    Please enclose postage stamps for the amount of 1,000 yen together with the application documents.
    • If the processing fee is insufficient, or if no processing fee is enclosed, you will be notified to that effect, and if payment is not made by the designated due date, the Company will respond as if no request for disclosure was made.
  5. How the Company responds to requests for disclosure, etc.
    The Company will respond in writing to the address listed in the application form submitted by the applicant.
  6. Purpose of use of personal information acquired in relation to a request for disclosure, etc.
    Personal information acquired in connection with a request for disclosure, etc. will be handled only to the extent required to respond to the request for disclosure, etc. Submitted documents will be retained for a period of two years after completion of the respond to the request for disclosure, etc. and disposed of thereafter.
    Grounds for Non-disclosure of Personal Information Subject to Disclosure
    In the following cases, the Company will not disclose the requested information. When a non-disclosure decision has been made, the Company will provide a notification to this effect, including an explanation of the grounds for doing so. Also note that even in the event of non-disclosure, processing fees will not be returned.
    • When the individual concerned cannot be identified, such as when the address listed on the application form, the address listed on documents for personal identification and the address registered with the Company do not match
    • When the proxy cannot be confirmed in the event an application is made by proxy
    • When the proxy cannot be confirmed in the event an application is made by proxy
    • When the subject to a request for disclosure does not constitute “personal information subject to disclosure”
    • When disclosure may harm the life, body, property or other rights or interests of the individual concerned or a third party
    • When disclosing the information could notably impede the proper implementation of the Company’s business
    • When disclosing the information would violate other laws or regulations

Contact for Inquiries

For inquiries, complaints or other matters concerning the handling of personal information, please contact the inquiries desk for the service to which your personal information was directly provided.
If you are unsure of who to contact to make your inquiry, the Company also accepts inquiries through the following.

By web form:
Please lodge an inquiry with the Personal Information Handling Desk here (Japanese Only).

By mail:
Personal Information Handling Desk
JustSystems Corporation
Shinjuku Oak Tower
Nishi-Shinjuku 6-8-1, Shinjuku-ku, Tokyo, 163-6017 Japan

Visiting the company directly:
Please note that submissions cannot be made by visiting the Company directly. Thank you for your understanding.
Also note that communications addressed to ISHIKAWA Hideki, the Company’s Personal Information Protection Officer, are also accepted through the above contact points.

Name of “Authorized Personal Information Protection Organization” the Company belongs to and the address for complaint submissions At present, the Company belongs to no authorized personal information protection organization.

About Cookies

Our website uses a technology called 'cookies' for the following purposes.

  • For us, our technology advertising partners, or other business partners to send information to your browser
  • To use third-party advertising delivery services

About SSL

The Company’s websites support SSL to protect the personal information of customers. By using a web browser that supports this security feature, the personal information entered by a customer such as their name, address or telephone number is encrypted before being sent or received. This removes any fear that a third party could eavesdrop on your information even if the transmitted data is intercepted.
When using a web browser that does not support SSL, you may be unable to access Company websites, or unable to enter information.

What is Secure Socket Layer (SSL)?
SSL is a security feature that encrypts information before it is transmitted over the Internet. As the SSL feature itself is continually improved, updating to the latest version of your web browser software is recommended.

  • Please note that for some services, there are restrictions on the browser versions that can be used.

You can check whether security functions in your browser are active through your browser’s interface. If the key icon displayed at the bottom of the browser is in a locked position, it means that the security feature is enabled, and you can use the website with peace of mind. However, depending on the webpage configuration, even if the security feature is enabled, the key icon may not be shown as locked.

Customer Access Logs and Histories

For the Company website and mass-distributed emails, the Company records information on access and opened emails in the form of access logs (access histories).
Access logs comprise the domain name and IP address of the person who accessed the site or opened the email, the type of browser that was being used, the date and time of access, the originating URL (if the Company website was accessed via a search site, this will include the keyword the customer entered into the relevant search site), whether the email message was opened, and so on.
Generally, however, these access logs do not contain information that could be used to identify an individual.
While these access logs are primarily used to improve the service of the website and mass-distributed emails, for maintenance and administration, and for performing statistical analysis, they may also be used to provide accurate information tailored to customers (for example, the automatic selection and display of information pre-determined by the Company based on the keywords a customer has entered into a search site).
Some of the pages on Company websites are installed with an access log collection and analysis service that uses web beacons and cookies provided by a service provider.
In these cases, web beacons are embedded in pages to send access information to the service provider’s log collection and analysis server, and when a customer views a relevant page, an anonymous access log is recorded on the service provider’s server linked from the web beacon, and at the same time, a cookie linked with the web beacon is sent to the customer’s computer. The linking of web beacons and cookies can be prevented by disabling the cookie feature in your browser, but doing so may render all or part of services unavailable.

For services used after a customer has registered their personal information with the Company in advance, access logs collected using cookies, web beacons and the like are recorded and referenced in a way that links them to the personal information of customer that the Company possesses, but these kinds of access logs are handled appropriately in accordance with the Company’s privacy policy as part of personal information. When the Company links access logs with personal information to use for purposes other than those listed below, it will specify the purpose of use to customers in advance for each service.

  • To provide customers with notifications about service usage and other information
  • To respond to inquiries from customers
  • To register and manage the personal information of customers
  • The reasons listed under “Provision of Personal Information to Third Parties” above
  • About Access to External Servers
    The use of services, purchasing, requests for information and other activities on a Company website may constitute an affiliate advertising event, and in such cases, a web beacon specified by an advertising firm or other party may be embedded on a Company webpage.
    When a customer has viewed a relevant page, an access of an external server managed by the advertising firm or other party will occur at the same time.
    However, in general the log of the access in question will only be used anonymously to identify via which site a customer arrived at the page.
    Also note that access logs of such external servers are managed under the responsibility of the advertising firms or other parties concerned, and the Company has no right whatsoever to view or use these logs.

    What is a Web Beacon?
    A web beacon is a small transparent image embedded in a website or HTML-based email message. When a customer has viewed a website or HTML-based email message with an embedded web beacon, information about the view event is recorded on the web server side.

About this Page

The Company is not responsible for the standards or particulars of how privacy information is handled on the websites of other companies linked from Company websites.
In an effort to better protect the personal information of customers or in connection with the establishment or amendment of related laws and regulations, the Company may make changes to this privacy policy.
Customers are therefore encouraged to periodically check its contents. Changes to the content of the privacy policy will take effect from February 4, 2015, the date the page was posted to the Japanese website.
This personal information protection policy is pursuant to the laws of Japan.