JP/EN

 

Foresight in sight

Nihon Unisys

Personal Information Protection

Revised: December 13, 2016
The "Privacy mark" is a mark granted to companies that develop and maintain arrangements for appropriate protection of personal information.

Basic Policy of Personal Information Protection for Nihon Unisys

Formulation: October 22, 2004
Latest revision: June 29, 2011

Nihon Unisys, Ltd.
Representative Director, President & CEO Akiyoshi Hiraoka
Nihon Unisys, Ltd. (hereinafter referred to as "the Company") will enable customers to create value through information system services and other business activities, and, as a good corporate citizen, also contribute to the continuing development of society.
The Company recognizes the significance of appropriate handling and protection of personal information. Recognizing a company’s social responsibility, we stipulate the basic policy of personal information protection below, we will have executives and regular employees of our group companies fully understand and adhere to it, and we will promote corporate activities by emphasizing compliance with laws and regulations.
  1. We respect laws/ordinances, guidelines and other regulations enacted by the Japanese government about the handling of personal information. Also, we will appoint a "Chief Privacy Officer", in order to manage the appropriate handling of personal information.
  2. We will acquire the limited personal information that is necessary for our business by lawful and fair means. We will do so after providing an explicit explanation of the purpose of how we will use it and a contact for the persons.
  3. We will utilize the acquired personal information within the scope of specified purposes of utilization. The acquired personal information will not be utilized for purposes other than those specified, nor provided or disclosed to a third party without the person's consent, except where legally required. We will take measures accordingly. Also, in a case where we provide or disclose personal information to a third party by obtaining consent from the person concerned, we will take measures to ensure that the third party will appropriately manage it.
  4. We will take necessary and appropriate security measures in order to prevent leakage, loss or damage of the personal information that we hold. In the case of any of these issues arising, we will identify the causes and take corrective measures without delay.
  5. In a case where we entrust any third parties to handle personal information for our business, we will conclude an appropriate contract with the trustees and perform guidance and management to ensure that they will take reasonable security measures.
  6. We will establish, implement and maintain a management system about personal information protection. Also, we will continue to review and enhance it.
  7. We have established a section that deals with requests, inquiries, complaints or applications for consultation from the persons about the disclosure, correction, or deletion of their own personal information. Responses will be made appropriately and promptly.
[Contact for receiving inquiries concerning personal information handling]
Nihon Unisys, Ltd.
Secretariat for the Committee for Promotion of Personal Information Protection
1-1-1, Toyosu, Koto-ku
Tokyo 135-8560 Japan
Tel: 03-5546-4111 (switchboard number)

Personal Information Handling

Nihon Unisys, Ltd
Chief Privacy Officer
Corporate Officer Shinobu Sasao

Purposes of Acquiring and Utilizing Personal Information

Personal information is acquired and utilized by appropriate means pursuant to the Act on the Protection of Personal Information and the Personal Information Protection Management Systems - Requirements (JIS Q 15001:2006) by the Japanese Industrial Standards, among others. The Company utilizes the personal information that we acquire and retain for the below purposes. In a case where there is a need for utilizing personal information other than that which has been notified in advance, except for a case where the utilization is recognized as an exception pursuant to the Act on the Protection of Personal Information among others, we will obtain consent of the person again to utilize such information. Also, in a case where a person under 16 years of age or unable to understand right from wrong provides his/her personal information to us, his/her statutory representative, among others, needs to provide consent.
1. In a case where we acquire such personal information concerning a person in the form of a written document directly from the person, the Company utilizes the personal information for the purposes below.
We explicitly show to the person fixed items such as the purpose of utilization by written documents (including a record made by an electronic method and a magnetic method) each time in advance, except for the cases below.

ⅰ. Cases in which the acquisition of personal information is urgently required for the protection of the life, body, or property of an individual. Or, cases in which it is required and in which it is difficult to obtain the consent of the person

ⅱ. Cases in which the life, body, property, or other rights or interests of the person or a third party are likely to be harmed

ⅲ. Cases in which the rights or legitimate interests of the Company are likely to be harmed

ⅳ. Cases in which it is necessary to cooperate with a state organ or a local government in executing the affairs prescribed by laws and regulations and in which notifying the person of the purpose of utilization or publicly announcing it, or obtaining the consent of the person are likely to impede the execution of the affairs

ⅴ. Cases in which it is considered that the purpose of utilization is clear in consideration of the circumstances of the acquisition

ⅵ. Cases in which the acquisition of personal information is based on laws and regulations

ⅶ. Cases in which the acquisition of personal information is specially necessary for improving public health or promoting the sound growth of children and in which it is difficult to obtain the consent of the person
2. In a case where we acquire personal information directly from the person by means other than written document, and in a case where we instead indirectly acquire it in the public domain or from a third party, the Company utilizes and keeps the personal information for the purposes below.
a. Personal information of customer
  • Propose, sell, and provide products, services and supports
  • Introduce products and services dealt in by the Company and our group companies
  • Introduce events among others (various kinds of seminar and exhibition) held (hosted, co-hosted, or co-sponsored) by the Company and our group companies
  • Registration of the utilization of services provided by the Company and our group companies
  • Ship printed publications such as "Club Unisys"
  • Communicate, negotiate business, hold meeting, and implement contract with customer
  • Respond to inquiry or request from customer
  • Management of implementation of training
  • Conduct various kinds of questionnaires
b. Personal information of business partner
  • Communicate, negotiate business, hold meeting, and implement contract with business partner
  • Respond to inquiry or request from business partner
c. Personal information of stockholders
  • Enforce rights and fulfill obligations pursuant to Corporate Law among others
  • Extend various kinds of facilities
  • Implement various kinds of measures for shareholders to facilitate smooth relationship between them and the Company
  • Manage shareholders pursuant to laws and ordinances
d. Personal information of employee applicants / former employees of the Company
  • Provision of information to, communication with and notification of applicants
  • Acceptance procedure
  • Personnel management for former employees pursuant to internal regulations as stipulated by law (including employee welfare matters)
  • Provision of Company information, provision and/or distribution of information regarding social activities if necessary and other such kinds of management for former employees
e. Others
  • Personal information that is acquired in public domain (gadgets, websites, commercially available books and name lists among others) and from a third party
    In order to introduce products, services and events (various kinds of seminars and exhibitions) of the Company and our group companies and implement various kinds of questionnaires
  • Personal information that the Company was entrusted to handle when implementing a project
    In order to execute a contract with an entrusting party concerning system development, consultation, system support, and training
  • Telephone-record information
    In order to ensure the accuracy of telephone conversation and appropriately address to it
  • Logs and images recorded when entering and exiting the facilities of the Company
    In order to manage security for preventing crime and disaster among others
  • Use purposes that were announced to the person and agreed to by him/her in advance
The Company utilizes personal information for the below key businesses.
Provision of consultation service, IT solution, outsourcing service, support service, system related service, human resource development service and e-learning service, and sale of computer system (hardware and software), among others

Entrustment of Handling and Joint Utilization of Personal Information

1. Entrustment of handling
When the Company entrusts all or part of business to a trustee, we may entrust the handling of personal information to the trustee within the necessary scope for achieving the purpose of utilization. In this case, we select and assign the trustee that meets the standards stipulated by us, and ensure secure management of personal information by concluding an agreement concerning the handling of the personal information and appropriately managing and supervising the trustee.
2. Joint utilization
We may share with our group companies personal information of customers among others (name of person, name of company, name of department, telephone number, fax number, and e-mail address among others) that is needed when jointly performing business activities with our group companies. In this case, we advise the persons of the purpose of utilization in advance. Also, we appropriately manage the personal information pursuant to a treaty concerning the joint utilization of personal information concluded between us and our group companies in order to securely manage the personal information.

Provision and Disclosure of Personal Information to a Third Party

As a rule, the Company does not provide, nor disclose to a third party the personal information that we have acquired, without obtaining consent of the person, except the below cases. In a case where we provide or disclose it to a third party by obtaining consent of the person, we take appropriate measures that the third party, which we provide or disclose the personal information to should protect the personal information.
ⅰ. Cases in which the provision and disclosure of personal information is based on laws and regulations
ⅱ. Cases in which the provision and disclosure of personal information is necessary for the protection of the life, body, or property of an individual and in which it is difficult to obtain the consent of the person
ⅲ. Cases in which the provision and disclosure of personal information is specially necessary for improving public health or promoting the sound growth of children, and in which it is difficult to obtain the consent of the person
ⅳ. Cases in which it is necessary to cooperate with a state organ, a local government, or an individual or a business operator entrusted by either of the former two in executing the affairs prescribed by laws and regulations and in which obtaining the consent of the person might impede the execution of the affairs.
ⅴ. Cases in which the Company acquired the personal information of a person by obtaining the consent from the person to our forwarding the information
ⅵ. Cases in which the Company has made prior notifications to our executives and shareholders concerning fixed items including a transfer of their open personal information to a third party

Procedure to Request Disclosure, etc.

Please refer to the above "Procedure to Request Disclosure, etc." when the person or his or her representative requests "notification of the purpose of utilization, disclosure, correction, addition or deletion, utilization discontinuation or erasure or discontinuation of provision to a third party (hereinafter referred to as 'disclosure, etc.')", concerning the "personal information subject for disclosure" that we hold. We will respond within a reasonable period of time and scope after confirming their identity.

Contact for Inquiry and Complaint Concerning Personal Information

Please notify each contact section for solutions and services which the personal information was directly provided to, as regards inquiry, complaint, or consultation concerning the handling of personal information. If the contact section is not known, advise the below. The Company will respond after confirming the content.
  • Name:Nihon Unisys, Ltd.
  • FAO:Secretariat for the Committee for Promotion of Personal Information Protection
  • Address:1-1-1, Toyosu, Koto-ku, Tokyo 135-8560 Japan
  • Tel: 03-5546-4111 (switchboard number)
    Call or send a mail to the above, or use the inquiry form below.

"Authorized Personal Information Protection Organization" which the Company Belongs to and Contact Organization for Complaint Resolution

  • Name: Japan Institute for Promotion of Digital Economy and Community: JIPDEC
  • FAO: Personal Information Protection Consultation Service Office
  • Address: 12F Roppongi First Building, 1-9-9, Roppongi, Minato-ku, Tokyo 106-0032, Japan
  • Tel: 03-5860-7565 Toll Free: 0120-700-779
    [Please note that this is not the contact information for inquiries related to the Company's products/services.]

Protection of Personal Information on the Website of the Company

As a rule, any persons can access the website of the Company without disclosing their personal information at all. However, they are kindly requested to understand in advance that if they do not provide their personal information, there are some contents and services that are not available to them.

Secure Socket Layer, SSL for Preventing Tapping during Transmission

The personal information that is provided when making inquiries and applications is encrypted and protected by Secure Socket Layer SSL. If a browser that does not respond to SSL is utilized, the access to the website of the Company or the entry of information may not be possible.

Cookies and Web Beacons as well as Access Logs

Cookies and web beacons are utilized and access logs are recorded in some pages of the company’s website.
These functions are used for the purposes listed below:
- Understanding behaviors of users of the website and measuring effects of advertisements; and
- Solving issues that may occur in the website.
* Cookie:
Function that can save the trouble of re-entry or display optimum contents for the sake of our users by storing their information in a browser. Our users can set their browsers in order to reject cookies or receive an alert when receiving cookies. However, in that case, they are kindly requested to note that they may not be able to use all or part of services of website pages.
* Web beacon:
Technology that enables collecting statistics concerning the use rate of specific website page by understanding access status by visitors from their PC (often referred to as "Clear GIF")
* Access log:
Access logs mean sets of records that indicate visitors’ accesses such as URLs, IP addresses and domain names as captured through the use of cookies and web beacons.
There are cases where the company confirms access logs that represent histories of behaviors of users who click URLs described in promotional e-mails. Furthermore, the company refers the access logs to personal information of customers that it keeps. Any information obtained as a result of this operation will be used for the purposes described previously.

Link to Other Websites

The Company is not involved in contents of any other websites that are linked to our own. Please note that we are not in a position to take responsibility for handling and ensuring security of personal information in those websites.
TOP