Contact Us
Contact via Email Form
*Fields marked with * (required) must be filled out.
*For any changes or cancellations after submitting your data, please call the store directly.
*Fields marked with * (required) must be filled out.
*For any changes or cancellations after submitting your data, please call the store directly.
Dear Valued Customers
"Regarding the Handling of Personal Information"
ACCEA Co., Ltd.
We would like to explain how we handle personal information as follows.
1. Purpose of Use of Collected Personal Information
Collected Personal Information | Purpose of Use |
---|---|
Personal Information Collected for Information Processing Services |
|
Personal Information of Employees and Staff |
|
Recruitment Information |
|
Inquiries |
|
We will clearly state the purpose of use when obtaining personal information from our customers and will use the information only within the scope of that stated purpose. We will not use the personal information obtained from customers for any purpose other than those explicitly specified.
2. Scope of Personal Information Provided
Address, name, telephone number, mobile number, fax number, company name, department name, job title, email address, date of information collection, business name, and photographs.
3. Matters Concerning Requests from the Individual for Notification of Purpose of Use, Disclosure, Disclosure of Records of Third-Party Provision, Correction, Addition or Deletion of Content, Suspension of Use, Erasure, and Suspension of Provision to Third Parties (hereinafter referred to as “Disclosure, etc.”)
(1) Concerning Disclosure, etc. of Personal Information
When requesting disclosure, etc. of personal information subject to disclosure held by our company, we will verify the identity of the requester and/or their authorized representative.
For details on the procedures and steps to make a request, please contact the inquiry office listed below. Please note that fees specified by our company may apply.
(2) Personal Information Subject to Disclosure and Purpose of Use Held by Our Company
Personal Information Subject to Disclosure: The personal information obtained as listed in Section 2 above.
Purpose of Use of Personal Information Subject to Disclosure: As stated in the purposes of use listed in Section 1 above.
(3) Inquiries, Complaints, Deletion, and Consultations Regarding Personal Information
We will respond to inquiries, complaints, deletion requests, and consultations regarding personal information.
Please contact the appropriate representative at the contact information provided below.
(4) Contact Information for Inquiries Regarding Personal Information
Company Name: ACCEA Co., Ltd.
Address: 9F Kojimachi Central Building, 2-2-4 Kojimachi, Chiyoda-ku, Tokyo
E-mail: privacy@accea.co.jp
4. Handling of Credit Card Information
The purpose for which we obtain credit card information from our customers, as well as the name of the entity collecting the information, the recipient of the information, and the retention period, are as follows:
(1) Purpose of Use
To process payments for products and services provided by our company.
(2) Entity Collecting the Information
ACCEA Co., Ltd.
(3) Recipient
Payment service providers and payment processing agencies corresponding to the payment method selected by the customer at the time of settlement.
(4) Retention Period
The information is provided to payment service providers and processing agencies; it is not stored by our company.
5. Information Collection on Our Website
(1) We use "reCAPTCHA," a spam protection tool provided by Google. While you are on our site, reCAPTCHA collects anonymized data such as your behavior and hardware/software information. This data is used for improving reCAPTCHA and for general security purposes. The use of Google reCAPTCHA is subject to Google’s Privacy Policy and Terms of Service.
(2) We use "Google Analytics," a web analytics tool provided by Google. Google Analytics uses cookies to collect traffic data. You can prevent this data from being collected by disabling cookies in your browser settings.
Google Privacy Policy:
https://policies.google.com/privacy?hl=en
Google Analytics Terms of Service:
https://marketingplatform.google.com/about/analytics/terms/us/
https://policies.google.com/technologies/partner-sites?hl=en
Google Analytics Opt-Out Browser Add-on:
https://tools.google.com/dlpage/gaoptout?hl=en
6. Outsourcing of Provided Personal Information
Within the scope of the "Purpose of Use" described in Section 1 above (information processing service operations), we may outsource the handling of personal information. However, we do not disclose or provide personal information to third parties.
(1) Purpose of Outsourcing
Outsourcing is carried out for the purpose of information processing service operations. It is also used to provide better services to our customers as part of our business operations.
(2) Items of Personal Information to Be Entrusted
The personal information entrusted pertains to that obtained during the course of outsourced information processing services.
*Address, name, phone number, mobile number, fax number, company name, department name, job title, email address, date of information acquisition, business name, and photographs.
Any additional items of personal information to be provided will be explained individually for each request.
(3) About the Entrusted Parties
The entrusted parties are those involved in our outsourced information processing services. Before entrusting personal information, we conduct a thorough review of each party’s security measures and only proceed after signing a personal information handling agreement with parties capable of appropriate management. Furthermore, even after the agreement is concluded, we regularly audit the entrusted parties to ensure the security of the information and maintain a high standard of safety.
(4) Regarding Contracts
All entrusted parties and our company enter into formal contracts to ensure the secure management of personal information.
7. Voluntariness of Providing Personal Information
Providing the personal information listed in section 2 is voluntary. However, please note that if you choose not to provide the requested information, we may be unable to offer the services you have requested.
8. Public Announcement Regarding Retained Personal Data
We implement the following security control measures for the personal data entrusted to us by individuals.
(1) Establishment of Basic Policy
In accordance with the Act on the Protection of Personal Information, we have established a "Personal Information Protection Policy" to ensure the proper management of personal data.
(2) Establishment of Rules Regarding the Handling of Personal Data
For each stage of personal data handling—acquisition, use, storage, provision, deletion, and disposal—our Personal Information Protection Management System, developed in accordance with the above basic policy, defines and operates procedures, responsible personnel, persons in charge, and their respective duties.
(3) Organizational Security Control Measures
・As part of our personal information protection management system, we clarify the personnel who handle personal data and the scope of the data they handle. We have established a reporting and communication structure to inform responsible parties when any facts or signs of legal or regulatory violations are discovered.
・In accordance with laws and internal regulations, we conduct regular inspections to ensure that personal data is handled and managed appropriately, and we continuously work to improve our operations.
・Through internal audits and external audits by third-party organizations, we regularly assess compliance with internal rules and policies. If any issues requiring correction or improvement are identified, we take appropriate remedial actions.
(4) Personnel Security Control Measures
To raise awareness of the importance of personal information protection, we provide training to all our employees on the handling of personal data. Employees are also required to sign a confidentiality agreement regarding personal data after being informed of its contents.
(5) Physical Security Control Measures
In areas where personal data is handled, we implement access control for employees and restrictions on devices brought into the area, and take measures to prevent unauthorized personnel from viewing personal data.
We also take precautions to prevent theft or loss of equipment, electronic media, and documents that handle personal data.
When such devices or media are carried inside or outside the company, we ensure that personal data cannot be easily exposed.
(6) Technical Security Control Measures
We implement access control to limit the scope of authorized personnel and restrict access to personal information databases. In addition, we have implemented systems to protect the information systems handling personal data from unauthorized external access and malicious software.
(7) Understanding of External Environments
We implement security control measures based on an understanding of the personal data protection systems in the countries where personal data is handled.