- 1. Basic Policy
PIONEER CORPORATION (hereinafter referred to as "Pioneer, "we",
"us" or "our") recognize that the protection of personal information is a serious
social responsibility imposed on us and the Pioneer Group, and is an indispensable
requirement for earning the trust of society and promoting our corporate activities.
We will give due consideration to the appropriate management and use of personal
information and implement the following measures.
-
2.
Compliance with Laws and Regulations Related to
Personal Information and Privacy
Pioneer complies with applicable laws and regulations, guidelines established by the
government, and other norms regarding personal information and privacy (hereinafter
referred to as "Applicable Privacy Law").
-
3.
Collection and use of personal information handled
by Pioneer
Except as required by law, Pioneer acquires and uses personal information within the
scope of the purpose of use listed in Article 4 "Purpose of Use and Scope of
Collection." In addition, if the personal information is used beyond these purposes,
the purpose of use will be separately notified or announced to the person at the
time of acquisition.
For clarity, when acquiring personal information other than the type indicated in
Article 4 "Purpose of Use and Scope of Collection," Pioneer will notify or announce
the purpose of use in advance and, if necessary, obtain consent for the acquisition
and use, etc.
- 4. Purpose of Use and Scope of Collection
-
4-1.
Types of Personal Information to be Acquired and Purpose of Use
- (1) Information about Customers
-
(a)
Registration of individual customers who use Pioneer
Group products (hereinafter referred to as the
"Products"), and provision and operation of websites and
applications, etc. provided by Pioneer (hereinafter
referred to as the "Services")
-
・
To register as a user for the Services
-
・
To provide, operate, improve, and enhance the
Services
-
・
For after-sales service related to the Products
and Services
-
・
For registration based on application for e-mail
newsletter
-
・
To provide information by e-mail newsletters,
etc. and respond inquiries concerning the
Products and Services, seminars, workshops,
lectures, and roundtable discussions
(hereinafter collectively referred to as
"Events"), campaigns, questionnaires, etc.
-
・
To analyze, improve, and enhance the contents of
e-mail newsletters, etc.
-
・
To plan, develop, evaluate, improve, and enhance
the Products and Services
-
・
For analysis, survey, and research of the
Products and Services
-
・
To solve operational problems related to the
Products and Services
-
・
To provide personal information to a third party
for the purpose and in the manner specified in
Article 5 "Provision of Personal Information to
Third Parties"
- (b)Management of Events
-
・
To provide information on Events, campaigns,
etc., and to accept applications, selection,
etc.
-
・
To contact and respond to inquiries by e-mail,
telephone, etc. regarding Events
-
・
To analyze and improve Events
-
・
To provide personal information to sponsors,
etc. in relation to Events sponsored by Pioneer
-
・
To provide information on the Products and
Services, Events, campaigns, questionnaires,
etc., and to respond to inquiries
-
・
To analyze, improve, and enhance the contents of
e-mail newsletters, etc.
- (2) Information related to our business
-
(a)
Recruitment activities
To respond to those who wish to join Pioneer or who view
information provided by us regarding the acceptance of
applications, selection, acceptance/rejection,
employment procedures, etc., and other necessary
measures such as the formulation of our future
recruitment plans
-
(b)
Management of the officers and employees of Pioneer, and
other persons who are required for employment management
and payment records (hereinafter referred to as
"Officers and Employees"), and their families
For the operation of employment management and measures
necessary for legal and our personnel management, etc.
-
- [Usage example]
-
・
Execution of operations related to
employment management and personnel
management (working management,
transfers, secondments, transfers,
promotions, retirements, dismissals,
appraisals, disciplinary action,
emergency communications, etc.)
-
・
Execution of operations related to wage
management (salary, bonus, retirement
allowance, corporate pension, expense
management, etc.)
-
・
Execution of duties related to social
insurance
-
・
Execution of duties related to taxation
(income tax, resident tax, etc.)
-
・
Execution of operation related to
education
-
・
Execution of duties related to insurance
and safety management
-
・
Execution of operations related to
welfare, health and safety, health
management, etc.
-
・
Execution of operations related to
access control (creation of entry and
exit cards, acquisition of entry and
exit logs, etc.)
-
・
Testing, verification, etc. of the
Products and Services
-
・
Recruitment and participation in
volunteer and social contribution
activities
-
・
Planning and implementation of in-house
questionnaires
-
・
Operations related to or incidental to
the above
-
*
In the event that the information is to
be used
beyond the above examples, the purpose
of use
will be notified to Officers and
Employees as
necessary.
- (c)Guidance to Shareholders
-
・
To exercise rights and fulfill obligations under
the Companies Act and related laws
-
・
To implement various measures aimed at
facilitating the relationship between
shareholders and us
-
・
To manage the information of shareholders, such
as creating a register of shareholders by
prescribed standards based on various laws and
regulations
-
・
To respond to inquiries and requests from
shareholders
-
(d)
Business operations between business partners and us
-
・
For exchanging business cards and business
communication
-
・
To contact by e-mail, telephone, etc. regarding
consultation and confirmation of transaction
details, etc.
-
・
For accounting processing, credit management,
contract conclusion, and performance
confirmation with business partners
-
・
To install and send promotional materials,
pamphlets, and other mailings
-
・
To send seasonal greetings, etc.
-
・
To provide information by e-mail, telephone,
etc. regarding the Products and Services,
Events, campaigns, questionnaires, etc., and to
respond to inquiries
-
(e)
Management of employees of our partner companies, etc.
-
・
To conclude contracts with partner companies and
confirm their performance
-
・
For work requests or instructions to employees
of partner companies, etc., work management, and
employment management
-
・
To confirm the skills possessed by employees of
partner companies, etc.
-
・
For security management
-
・
To protect confidential information, etc.
-
・
To respond based on the Act on Outsourcing and
related laws
-
(f)
Responding to visits to our facilities
-
・
To receive visitors and to intercede with our
staff
-
・
For facility management (use of surveillance
cameras, etc.) for the purpose of crime
prevention
-
(g)
Other persons who have made inquiries to us
-
・
To contact by e-mail, telephone, etc. in
response to inquiries
-
・
To verify the identity of the person who made
the inquiry
-
・
To contact by e-mail, telephone, or other means
when we conduct various types of research
requests
-
・
To provide the results of statistical processing
and analysis of data that cannot be used to
identify individuals when responding to
investigation based on laws, and regulations and
survey requests inquired about, and when
publishing on our website or Events
-
Pioneer will acquire personal information appropriately in accordance
with the consent of the person or the provider, or laws and regulations
by the following methods.
-
・
Acquisition information entered by the person in the
Products and Services
-
・
Collection a prescribed document to be filled out by the
person
-
・
Acquisition information from the services provided by third
parties based on your own operation of the Products and
Services
-
・
Acquisition information when you operate, use, or browse the
Products and Services
-
・
Acquisition information directly from the person in question
by exchanging business cards at Events
-
4-3.
Personal information handled by us based on consignment from business
partners
Pioneer may conduct various operations that involve the acquisition, use,
disposal, etc. of personal information (sponsorship, research, analysis,
etc. for commissioned projects and collaborations) based on consignments
from business partners. In this case, we will handle personal information to
the extent necessary for the performance of the relevant business.
- 5. Provision of Personal Information to Third
Parties
Pioneer will not provide personal information to third parties without the prior
consent of the person, except in the following cases.
-
-
・
When it is necessary to protect the life, body, or property of an
individual and it is difficult to obtain the consent of the person
-
・
When it is particularly necessary for the improvement of public
health or the promotion of the sound development of children, and it
is difficult to obtain the consent of the person
-
・
When cooperating with a national agency, a local government, or an
individual or entity entrusted by either of the foregoing in
executing the affairs prescribed by laws and regulations, and
obtaining the consent of the person is likely to interfere with the
execution of the affairs
-
・
When the person explicitly requests disclosure or provision to a
third party
-
・
When a court, public prosecutor's office, police, or other
organization with equivalent authority requests disclosure of
personal information based on proper procedures
-
・
When personal information is provided in connection with the
succession of business due to merger or other reasons, and it is
handled within the scope of the purpose of use before the succession
-
・
When providing or disclosing information to a subcontractor to the
extent necessary to achieve the purpose of use
-
*
In the event that personal information is provided to a third party
for reasons other than those specified above, we will notify the
person in question of the information to be provided and the purpose
of the provision, and will execute the provision only after consent
is obtained.
-
6. Joint Use
Pioneer may share personal information as follows.
If we share personal information beyond the scope listed below, we will notify
or announce it in advance.
-
(1)
Purpose of use of personal information to be shared
To achieve the purpose of use specified in Article 4
"Purpose of Use and Scope of Collection"
- (2) Information to be shared
Personal information stipulated in Article 4 "Purpose of
Use and Scope of Collection"
- (3) How to obtain
The method specified in Article 4-2 “How to acquisition"
-
(4) Joint users
Pioneer Group companies subject to our consolidated financial
statements(Consolidated subsidiaries and equity-method affiliates)
Group Companies
-
(5)
Responsible for the management of personal
information to be shared
Shiro Yahara
President and CEO
PIONEER CORPORATION
Bunkyo Green Court, 2-28-8, Honkomagome, Bunkyo-ku, Tokyo, 113-0021, Japan
- 7. Handling of Personal Information of
Minors
Pioneer will not acquire or use personal information of people under the age of 16
without the consent of a parent or guardian. In the unlikely event that you find
that a minor has provided us with personal information without the consent of a
parent or guardian, please contact us immediately.
- 8. Use of Cookies, etc.
Pioneer use cookies, beacons, and other similar files (hereinafter collectively
referred to as "cookies"). Cookies allow us to provide you with more relevant
services and content. For more information, please see the link below.
Cookie Policy
- 9. Security Control Measures
Pioneer take the following measures to safely manage the personal information we
receive.
- (1) Organizational Security Control Measures
-
(a)
Clarification of procedures for handling personal
information
We have established rules for the safe and appropriate handling
of personal information when viewing, using, storing, disposing,
returning, etc., and our Officers and Employees are conducting
their business in accordance with these rules.
-
(b)
Internal Regulations on Information Security, etc.
In order to ensure the proper use and safety management of
information entrusted to us in the course of transactions, we
appoint "Chief Information Security Officer" and "Personal
Information Protection Officer" and other various related
management managers, and maintain and improve the information
security management process, implement information security
management, grasp the status of management, and implement
corrective measures.
-
(c)
System for Crisis Management and Incident Response
In preparation for that an unforeseen situation related to the
management of information assets occurs or is likely to occur,
we have established an organizational structure to accurately
grasp the situation without delay and in accordance with the
procedures stipulated in the internal regulations, and to make
appropriate decisions and responses.
-
(d)
Supervision of subcontractors
We may outsource all or part of the handling of personal
information to the extent necessary to achieve the purpose of
use set forth in Article 4 "Purpose of Use and Scope of
Collection." In that case, we will strictly select a contractor
and properly supervise the handling of personal information.
- (2) Personnel Security Control Measures
-
(a)
Submission of a written pledge
Our Officers and Employees conduct their business after
submitting a written pledge of confidentiality regarding
confidential information (including personal information).
- (b)Education of Employees, etc.
Through e-learning on personal information and information
security, we strive to promote understanding of the importance
of protecting personal information, requests under Applicable
Privacy Law, management systems, handling rules, and measures to
be taken in the event of violations.
- (3) Physical Security Control Measures
- (a)Access control
We physically manage access to information assets and prevent
unauthorized intrusion into our workplaces through methods such
as dividing the inside of workplaces and restricting entry by
locking, monitoring, recording entry and exit, etc., depending
on the division.
- (b) Deletion and Disposal of Information
When deleting or disposing of confidential information and
information and communications equipment that stores
confidential information, we employ incineration, melting,
shredding, data deletion software, and other irretrievable
means.
- (4) Technical security control measures
- (a)Permissions
In the use of information systems, the number of Officers and
Employees to whom access authority should be granted is
minimized in light of business needs, and only those who have
authority can use the information system or applications. In
addition, we have established a security policy for each
information system, and access is controlled not only to the
server, but also to each folder, file, database data, etc.
- (b)Management of ID, PW, etc. authentication
We use ID and password authentication and, if necessary,
biometric authentication to confirm that access is by the
officer or employee who has access authority. In addition, the
success and failure of authentication are recorded and stored.
- (c)Network Management
We use firewalls, routers, and other settings to protect
networks and information systems from unauthorized access, and
we manage communications to monitor potential unauthorized
access from the outside.
- (d)Measures against unauthorized access
In order to prevent the theft, loss, falsification, and
destruction of information due to unauthorized access, we have
established a management system for information and information
systems, and have appropriately constructed access control to
areas where personal information is handled, a mechanism to
protect against unauthorized access from the outside, and a
mechanism to protect against unauthorized software.
- (5) Understanding the external environment
In the event that we transfer or store personal information outside
Japan, we will refer to the information published by the Personal
Information Protection Commission to understand the system for the
protection of personal information in the foreign country, and will
manage safety and take other measures in accordance with Applicable
Privacy Law.
As a side note, information on the legal systems of other countries and
regions published by the Personal Information Protection Commission is
available at the following link.
Personal
Information Protection Commission
*
You will be redirected to the website of the Personal Information Protection Commission.
*
This website is out of our management, and available only in Japanese.
-
10.
Disclosure and Correction of Personal Information
If Pioneer receives a request for disclosure or correction of personal data held by
us from the person or his/her agent, we will respond to the request without delay
and to the extent required by law.
If you wish to submit a request, please contact us using the form set forth in
Article 11 "Contact for Inquiries and Complaints."
- 11. Contact for Inquiries and Complaints
If you have any inquiries or comments regarding the handling of
personal information, please use the form below.
Inquiry Form for the
Handling of Personal Information
- 12. Continuous Review and Improvement
Pioneer will continuously review and improve our efforts to protect personal
information in response to revisions to Applicable Privacy Law and changes in the
social environment.
- 13. Revisions to the Policy
Pioneer may change the contents of this policy. In the event of
any changes, the revised policy will be posted on our website.
-
14.
Name of Business Operator Handling Personal Information
Shiro Yahara
President and CEO
Bunkyo Green Court, 2-28-8, Honkomagome, Bunkyo-ku, Tokyo, 113-0021, Japan