We are, for the personal information you provide from the user, has established a personal information protection management officer as follows, in accordance with this “About handling of personal information”, we will strive to proper handling and protection.
[Personal Information Protection Administrator] Faith, Inc. Wonderworks privacy protection committee chairman
2. Purpose of Use
Personal information provided by the user, we will collect and use only for the following purposes. Never to use the personal information other than the user’s consent without purpose.
–Provision of the service
–This site, the guide of the event news about this service
–This site, delivery of e-mail magazine about this service
–This site, providing products to the applicants accepted and the winner of the sweepstakes campaign concerning this service
–This site, delivery of advertising related to this service (it will also include if a third party becomes the advertisers.)
–This site, the questionnaire collected on this service
–This site, statistical analysis and problem-solving related to usage of this service (including the offer to a third party as statistical data.)
–This site, identification and answer at the time of the inquiry from the user about this service
–This site, correspondence of such litigation or dispute in this service
It may be entrusted to a third party all or part of the handling of personal information within the scope of the purpose of use. In this case, after you have selected the contractors that are deemed to have handled properly the personal information based on the standards set by our company, and entered into an agreement to ensure the proper handling, safety management of personal information Figure in contractors Make the necessary and appropriate supervision so that it can be.
4. third party offer and disclosure
We are, except in the case of if there is a consent of the user person in question or the following each item, we do not disclose or provide personal information to third parties.
(1)When disclosed or provided in a state that can not identify the statistical data such as the person himself
(2)If it is based on the laws and regulations
(3)Human life, even if it is necessary for the protection of the body or property, when able to obtain the consent of the person in question is difficult
(4)When it is difficult to obtain especially a case it is necessary to consent of the person in question in order to promote improvement or healthy growth of children and public health
(5)In a case where the person who received the agency or local governments or the consignment of the country it is necessary to cooperate with it to carry out the office prescribed by the laws and regulations, to interfere with the execution of the office by obtaining the consent of the person in question When there is a risk on the
5. personal information provided results that occur when you do not provide any of the
It is any user that you provide personal information. However, if no guests provide the information that is needed, you may not be able to meet to hope.
6. disclosure, correction, addition, deletion, suspension, third party provision of stop
For personal information that we held, stopping the disclosure, correction, addition, deletion, suspension, third party offer (together hereinafter referred to as the “Disclosure Request”.) If you wish to, you our offer Contact upon which it is was confirmed that the person in question, which corresponds with a reasonable period of time and ranges.
7. How to accept, counter Disclosure Request
disclosure of personal information that we held claims will be accepted in the following way. If you have any questions on the disclosure billing method, please contact us by e-mail to the following reception counter.
[To sign up by e-mail]Please apply by e-mail to the e-mail address of the following reception counter. After confirming that it is your identity by your registration information such as e-mail address, we will reply by other methods Delivery of the document.
[Reception desk]8. For the security
Form to be used in the present site, for personal information protection, it supports encrypted communication by SSL (Secure Socket Layer). However, depending on the use of the terminal, so there are times when it does not correspond to the SSL (Secure Socket Layer), please understand in advance.
9. Cookies (Cookies), for an individual identification number of the terminal
About 10. Access Log
In this site, you have to record the user of information that have been accessed in the form of the access log. The access log, domain name, other such as an IP address, include, for example, information on the individual identification number of the terminal, and of this site statistical analysis of the maintenance and usage, will be utilized to solve the problem. In addition, personal information that can identify the user to the individual identification number is not included.
Along with the revision and change of laws and guidelines regarding the handling of personal information, at our company, you might want to change the different handling was or more of content, or more.