Narayui, hereby establishes the following stipulations pertaining to the handling of private information in the possession of Narayui, based upon Japan’s Private Information Protection Law and related laws and ordinances, the guidelines and policies determined by Japanese government ministries pertaining to these said laws and ordinances, and private information protection management rules and other designations determined by Narayui.
Narayui hereby sets forth the following basic policy pertaining to the handling of private information.
(1) Private information acquired by Narayui shall be used for the purpose of supplying products, services, , while notice shall be given of the use purposes at the time of acquisition.
Specific use examples include the following types of cases.
Private information in the possession of Narayui shall be used only by Narayui. This stipulation shall not apply, however, in the following cases.
There may be cases of shared use of private information by the Narayui for the purpose of supplying products, services and delivery etc.
(1) With regard to private information in the possession of Narayui, parties wishing to be notified of the use purpose, or that wish to disclose, correct, make additions to, delete, terminate the use of or erase the contents of the information, halt the supply of data or take other actions are requested to direct such requests to Narayui
(1) Narayui shall manage and store private information under a strict control system, making every possible effort to strengthen the level of security to ensure that the information of the parties in question is not lost, destroyed, falsified or divulged to third parties.
(2) When being supplied with private information, Narayui shall take precautions against illicit access by third parties by encrypting information through the Secure Sockets Layer (SSL) scheme or other means, in striving to maintain safety within a rational sphere.
(3) Narayui shall not assume responsibility in the rare event of damages suffered by the parties in question or third parties as a result of illicit actions by hackers or others that exceed the sphere of the security measures in force.