PRIVACY POLICY
Privacy Policy
THANKS AI Corporation (hereinafter referred to as the “Company”) shall comply with all laws associated with the following Privacy Policy
and properly handle customers’ personal information.
- 1. Handling of personal information
- The Company’s privacy policy applies to any use of the Company’s services, including users’ viewing the Company’s web site.
Furthermore, personal information that is acquired when users use the Company’s services shall be managed in accordance with the Company’s privacy policy. - 2. Collection of Personal Information
- The Company automatically acquires personal information when a user views the Company’s web site or inputs personal information to make an inquiry, consultation, etc. The user’s IP address and cookie information, pages the user views, the user’s operating environment, etc. are automatically acquired by the company through the user’s browser and stored on the Company’s server. Personal information requested by the Company shall be limited to what is necessary to use the Company’s services.
- 3. Purpose of Use of Personal Information
- The Company collects personal information for the following purposes.
- To enhance the products that the Company handles and services it provides through its operations, and provide better services to customers.
- To provide information to users on special services and news.
- To contact the user as necessary, such as to respond to an inquiry.
- To conduct marketing surveys and other investigations of users’ status and operating environment and develop better web sites. - 4. Provision of Personal Information to Third Parties
- Except in the cases below,
the Company shall neither disclose nor provide personal information to any third parties.
- The user consents to the disclosure or sharing of the information.
- The disclosure or sharing of the information is determined to be necessary to provide the product of service that the customer requests.
- A company contracted by the Company in order to provide the user with a product or service needs the information.
(Companies contracted with this work shall not use personal information provided by the Company for purposes beyond those stipulated above.)
- The Company receives a formal legal inquiry from a public institution such as a court or the police.
- The user’s actions are determined to violate the terms of use or guidelines, etc. and it is determined necessary to protect the Company’s rights, assets, services, etc.
- There is an urgent need due to imminent danger to human life, body, or property. - 5.Safety Management Measures
-
In order to prevent and modify unauthorized access to personal information and leakage,loss or damage of personal information, we will establish regulations within our company and strive for safety measures. To achieve the above objectives, we are taking the following measures:
(1) To properly handle personal information and personal data, formulate basic policies for implementing each countermeasure stipulated by laws and guidelines.
(2) Formulate various regulations that stipulate each countermeasure such as acquisition, use, storage, provision, deletion, disposal, etc., and the person in charge and role.
(3) Take organizational security control measures such as appointing a responsible person, clarifying employees who handle personal data and the scope of personal data to be handled, establishing a reporting communication system to the responsible person in case facts or signs of violations of laws and regulations are grasped, periodically inspecting the handling status.
(4) Take personnel security control measures such as describing matters related to confidentiality of personal data in the rules of employment, conducting regular training on points to note regarding the handling of personal data.
(5) Take physical security measures such as employee entry/exit management, restrictions on carry-on equipment, and restrictions and management on taking out devices, electronic media, and documents that handle personal data to prevent theft, loss, etc.
(6) Take technical safety control measures such as the introduction of systems to protect the information systems that handle personal data from unauthorized external access or unauthorized software.