- Privacy Policy
-
aex inc. (hereinafter "AEX") recognizes the importance of personal information protection. We comply with the "Act on the Protection of Personal Information" and related laws and regulations (hereinafter "laws"), and handle the personal information provided by customers appropriately, striving to protect customer privacy.
Personal information refers to information that can identify a specific individual, such as address, name, phone number, and email address (including information that can easily be matched with other information to identify a specific individual) as well as information designated as personal information by law.
We clarify the manager responsible for personal information and manage it appropriately.
We will not use or provide personal information beyond the scope necessary to achieve the purposes agreed upon by the individual. We will also take measures to ensure this.
We comply with laws, other norms, and guidelines related to personal information protection.
To protect personal information, we prevent and address unauthorized access, loss, destruction, alteration, and leakage of the information, ensuring its safe storage and management.
If we outsource the processing of personal information, we will select contractors who meet sufficient personal information protection standards according to selection criteria.
For complaints and consultations regarding our handling of personal information, please contact the following address. - Inquiries
-
The personal information provided by customers can be requested by the customer for purposes such as disclosure, correction, addition, deletion, suspension of use, erasure, and suspension of provision to third parties, as stipulated by law. Please make requests in writing with the following details and include proof of identity (a copy of a driver’s license or passport). Send the request by mail to the address below. After verifying the content of the request, we will respond appropriately according to the law.
For other inquiries and complaints regarding our handling of personal information, please contact the address below.
Content of inquiry (confirmation, correction, deletion, etc. If correcting, please specify the correction details)
Date and method of providing the information
Your contact details (address, name)
Mailing Address:
aex inc.
Crystal Tower 36F,
1-2-27 Shiromi, Chuo-ku, Osaka 540-6036, Japan - Basic Policy on Proper Handling of Specific Personal Information
- aex inc. (hereinafter "AEX") promises to pay utmost attention to securing security from the perspective of user privacy protection. The Company will adhere to the following policies regarding security maintenance for our internal production computers, networks, the environment including them, public servers, and all related staff. If a security threat arises, we promise to minimize the impact and damage swiftly. We will always gather the latest information on security for internet services and make necessary changes to current operations without delay.
- Acquisition and Collection of Personal Data
- Both public and non-public company servers operate in a secure data center under a contract with a reliable provider, accessible only by specific administrators. Firewalls are in place to maintain security against unauthorized internet access, blocking communication requests other than HTTP (and HTTPS). Even if the firewall is breached, stringent password management prevents unauthorized access to the server.
- Access Logs
- When users access our site, the information is stored as access logs on the web server of this site. Access logs include the domain name, IP address, type of browser used, access date and time, but do not contain personal information such as names or email addresses. These data are used solely for website maintenance, management, and statistical/analytical purposes, and never for other purposes. We are not responsible for the personal information handling standards or content on other companies' sites linked from this site.
- Response to Security Threats
- Our contracted servers undergo annual security vulnerability checks. If vulnerabilities are found, they are promptly addressed. When a security threat arises, we strive to accurately understand the situation and respond calmly. If the threat exceeds expectations, we prioritize security protection by disconnecting the system from the internet and suspending services to eliminate the threat. Once the threat is eliminated and services are resumed, we will publicly disclose and report the occurrence of the security threat without concealing it.
Page Top