Privacy Policy
"Y-TEC CORPORATION" (hereafter "Company"), regarding handling of personal information of its customers and employees (hereafter "personal information"), shall continuously revise its internal regulations and organization that implements those regulations, and promote improvements and appropriate management. Personal information includes personally identifiable information.
- Collection, Provision, and Utilization of Personal Information
- The Company esteems the individual rights concerning personal information, and shall therefore expressly clarify the purpose of collection, utilization, and provision of the personal information, and manage such information appropriately at our responsibility.
- Disclosure and Provision to the Third Party
- Except otherwise explicitly specified as below, the Company shall not provide personal information to third parties without the prior consent of individuals concerned.
- If the disclosure or provision is required under the specified laws and regulations.
- In the event of an emergency, in order to protect human life or human rights.
- Corrective and Preventive Measures for Personal Information.
- The Company shall provide measures to protect personal information from unauthorized access, loss, destruction, alteration, or divulgation both systematically and organizationally.
- Modification and Deletion of Personal Information
- When the disclosure, correction, deletion, discontinuation of use regarding the personal information the Company has is requested by individuals concerned, the Company shall respond rapidly within reasonable time and appropriate scope.
- Establishment and Continuous Improvement of Compliance Program
- The Company shall handle personal information properly and safely, and review and improve the compliance as needed.
- About SSL
- SSL (Secure Sockets Layer) is a communication technology (communication protocol) that encrypts data sent and received on the Internet.
This website uses SSL to protect important data such as personal information from unauthorized interception, alteration, or spoofing.