Studio Meg Co., Ltd. (hereinafter referred to as the "Our company"), the site of our company get satisfaction by customer (hereinafter referred to as "users"), in order to provide results that are more reliable,based on nine items of following in our company perform in management and protection of security.
- Our company, all executives and employees have the awareness of information security,
we are information security protection and management of the business on the basis of a clear intention. - Our company make all information of our business activity the target of protection. In particular, customer information, sales information, we are adequate security measures for personnel and labor information.Also, each administrator, information from unauthorized disclosure and eavesdropping, will assume the responsibility to protect them from tampering.
- Our company has established a system that we plan and perform the protection and management of information security, it has been assigned a clear and specific roles and privileges.
- Our company, aims to improve the information security awareness of employees,
in order to ensure the security measures, planned manner we conduct information security education. - Our company, for all of the information assets related to the business operations,
We perform a risk assessment from the point of view of information security, plan our information security management measures according to the degree of risk we conduct. - Our company regularly conduct a review of the information security, proper maintenance of security measures, we are working to improve.
- When performing new business and service, our company is implementing plans to concrete and sufficient information security management measures.
- Our company grasp Generation of information security incidents, and can be review.
We are performing corrective and removal of accident.
Network management officer
Information security shall the following persons to manage responsibly.
Studio Meg Co., Ltd. Network management officer
Contact for information security
Contact us for information security is thank you to the following e-mail address.
Studio Meg Co., Ltd. (hereinafter referred to as the "Our company") , customers (hereinafter, "customers" that) as well as our officers deal with in business, protection of personal information to recognize that it is an important responsibility for us, in compliance with the provisions of the laws and regulations and internal regulations, in order to protect and properly manage personal information, and established the following Privacy Policy.
- Web contents oroduction (Website, Flash contents, Web program)
- System development (Sales support system, Business support system etc)
- Web hosting business
- Real estate management
1.The purpose of the Personal Information Protection Policy
Formulated the "personal information protection management system" for the protection of personal information, to improve and maintain to accomplish this together to disseminate to all employees will strive to ensure the safety and reliability of personal information.
2.Privacy Policy
Studio Meg Co., Ltd. (hereinafter referred to as the "Our company") , customers (hereinafter, "customers" that) as well as our officers deal with in business, protection of personal information to recognize that it is an important responsibility for us, in compliance with the provisions of the laws and regulations and internal regulations, in order to protect and properly manage personal information, and established the following Privacy Policy.
- Web contents oroduction(Website, Flash contents, Web program)
- System development(Sales support system, Business support system etc)
- Web hosting business
- Real estate management
3. The implementation of safety measures
Our company, in order to ensure the accuracy and security of personal information, to implement safety measures, including the information security measures, unauthorized access to personal information, loss, destruction, and strive for the prevention and correction of such tampering and leakage.
4. About compliance with the laws and regulations for the protection of personal information
Our company, for the realization of the protection of personal information, laws and regulations on the protection of personal information, will comply with the guidelines and other rules established by the country.
5. About continuous improvement of the protection of personal information management system
Through review by regular internal audits and our representatives, and strive to continuous improvement of the "Personal Information Protection Management System".
6.About inquiries of personal information
Our company, place the following contacts as "Inquiries regarding the handling of personal information."
Studio Meg Co., Ltd. Operations department
TEL:+81-6-6453-2301
FAX:+81-6-6453-2321
Mail:
7. For disclosure of personal information protection policy
This personal information protection policy publish our inside and our outside the Company's Website (http://www.studiomeg.co.jp), also publish in other media, if necessary.
January 18th, 2005
June 1th, 2006(Revision)
Studio Meg Co., Ltd.
CEO Akira Otsuka
About the rights of yourself of personal information
Our company, about personal information of target of disclosure, disclosure from the own of personal information, corrections of content, add or delete, use stop, erasure and sought to stop the offer to a third party, the window and how respond to the notification request for the purpose of use you set as follows.
1. Offer destination of the request for disclosure, etc
Studio Meg Co., Ltd. Operations department
4-5-12, Ebie, Fukushima-ku Osaka-shi, Osaka, 553-0001, Japan
Personal information protection administrator Yoshiki Shigekawa
TEL:+81-6-6453-2301
FAX:+81-6-6453-2321
Mail:
2.When you ask for the disclosure, you should be submitted writing style. Way of seeking other disclosure
Please send it to our office in writing that includes the following items by mail or E-mail.
Name, address, telephone number or E-mail address, inquiry, your contact means (mail or E-mail).
Also, please send along with the above-mentioned documents and the signature and seal of the agreement to the effect exhibit "Agreement for the provision of personal information (for the acquisition of the request for disclosure) ".
3. How to check that person to the request for disclosure is a person
The person in question will be the phone of the confirmation to the contacts that are registered in the case where there is no change to the information that has been registered in the company.
You might be asked to present (a copy of the mail or the like) the things that can verify your identity, such as a rolling license, if it is change the phone number and address and E-mail address.
4.Commission
Commission doesn't take.
Purpose of use of personal information of target of disclosure
- Personal information about our employees.
Practical use of Our various work. (Routine work, Accounting service, Other incidental to work) - Personal information about website production/system development etc.
Use objectives set at the time of acquisition of personal information.
・Information provided for the purpose of posting on the Web.
・Provided information as necessary item to use of system. - Personal information about the real estate management industry.
Real estate rental agreement/Accounting service
Purpose of use of personal information of target of disclosure
1.About Us
About each service in the SecuredMeg service, in our company, offer server/network infrastructure/application system.
About actual practical use, management company of each service will do.
Our company has undertake to maintenance of all system, but we doesn't have the authority to respond to inquiries about services.
In addition, please contact us to each operating company with regard to the disclosure request of personal information.
2.About purpose of use
Personal information acquired by each of the services to be operated by SecuredMeg Service.
It is used only in the operation of each service.
Handling in our company (use/provide/consign etc.) isn't performed.
1. About copyright
Documents, photos, illustrations, video, music, software, etc. on this site (hereinafter referred to as content), the studio Meg Co., Ltd. is protected by copyright, which a third party has to a rabbi (hereinafter, referred to you and our company) we have.
Personal or home or other, only when intended to be used within a limited range equivalent thereto, you can be replicated by such as downloading content.
Even in the case of non-duplication of the above purpose, in the case that have been shown to separate terms and conditions by the copyright owner to the individual of the content it can be utilized in accordance with the conditions.
Except in the case of the above and stipulated copyright law, without the permission of the copyright owner, it can't utilize. (Adapting the content, public transmission, etc., for any purpose and aspect)
Our company can't grant the content on this site our company or by third party copyright and the patent right and the trademark and other rights and any rights.
It doesn't guarantee regarding the contents of the content on this site.
In addition, the company doesn't assume any responsibility for the content of other sites that link from our site.
Content on this site may be changed or discontinued without notice.
2. About the use of Cookie
The Cookie are data files that come to sent from the web site on your computer, when the customer has visited again, web site can be read from your computer.
In our site, using the mechanism of Cookie in the part of the page, or omitting the time the customer enters each time, you may want to collect, such as history information of the pages you have visited. You don't get your personal information by Cookie. In addition customers will be able to reject the receipt of Cookie, but in this case, you may not be able to use part of the service provided by the site.
3. About Browsers if you use
In order to get comfortable to view and use this site, we recommend the following browsers.
【Windows】
・ Microsoft Internet Explorer 5.5/6.0
・ Netscape Navigator 6.x ~
【Macintosh】
・ Microsoft Internet Explorer 5.1/5.2
・ Netscape Navigator 6.x ~
However, depending on the customers of your environment, you may not be able to use part of the service provided by the site.
4. About SSL
This site, help customers to enter with confidence, such as personal information, we have introduced the SSL encryption technology to the page where you enter your personal information.
SSL data will flow through the network to the registration destination of the computer from being encrypted on your computer.
5. About Flash
On our site, you are using the FLASH in the part of the page. In order to view the FLASH page requires Adobe Flash Player 6 or more plug-ins.
6. JavaScript and style sheet
On this site, it uses JavaScript and style sheets. Please enable JavaScript in your browser to ensure full functionalities of our website.
7. For a link to the site
If you link to our site, please contact us beforehand in operating body of the link source site, purpose of link, URL of page of link source.
If you want to link, please to the top page of this site as a general rule.
May refuse the link.