Privacy Policy

  1. 1. Basic Policy

    PIONEER CORPORATION (hereinafter referred to as "Pioneer, "we", "us" or "our") recognize that the protection of personal information is a serious social responsibility imposed on us and the Pioneer Group, and is an indispensable requirement for earning the trust of society and promoting our corporate activities. We will give due consideration to the appropriate management and use of personal information and implement the following measures.

  2. 2.
     Compliance with Laws and Regulations Related to Personal Information and Privacy

    Pioneer complies with applicable laws and regulations, guidelines established by the government, and other norms regarding personal information and privacy (hereinafter referred to as "Applicable Privacy Law").

  3. 3.
     Collection and use of personal information handled by Pioneer

    Except as required by law, Pioneer acquires and uses personal information within the scope of the purpose of use listed in Article 4 "Purpose of Use and Scope of Collection." In addition, if the personal information is used beyond these purposes, the purpose of use will be separately notified or announced to the person at the time of acquisition.

    For clarity, when acquiring personal information other than the type indicated in Article 4 "Purpose of Use and Scope of Collection," Pioneer will notify or announce the purpose of use in advance and, if necessary, obtain consent for the acquisition and use, etc.

  4. 4. Purpose of Use and Scope of Collection
    • 4-1.
       Types of Personal Information to be Acquired and Purpose of Use
      1. (1) Information about Customers
        1. (a)
          Registration of individual customers who use Pioneer Group products (hereinafter referred to as the "Products"), and provision and operation of websites and applications, etc. provided by Pioneer (hereinafter referred to as the "Services")
          • To register as a user for the Services
          • To provide, operate, improve, and enhance the Services
          • For after-sales service related to the Products and Services
          • For registration based on application for e-mail newsletter
          • To provide information by e-mail newsletters, etc. and respond inquiries concerning the Products and Services, seminars, workshops, lectures, and roundtable discussions (hereinafter collectively referred to as "Events"), campaigns, questionnaires, etc.
          • To analyze, improve, and enhance the contents of e-mail newsletters, etc.
          • To plan, develop, evaluate, improve, and enhance the Products and Services
          • For analysis, survey, and research of the Products and Services
          • To solve operational problems related to the Products and Services
          • To provide personal information to a third party for the purpose and in the manner specified in Article 5 "Provision of Personal Information to Third Parties"
        2. (b)Management of Events
          • To provide information on Events, campaigns, etc., and to accept applications, selection, etc.
          • To contact and respond to inquiries by e-mail, telephone, etc. regarding Events
          • To analyze and improve Events
          • To provide personal information to sponsors, etc. in relation to Events sponsored by Pioneer
          • To provide information on the Products and Services, Events, campaigns, questionnaires, etc., and to respond to inquiries
          • To analyze, improve, and enhance the contents of e-mail newsletters, etc.
      2. (2) Information related to our business
        • (a)
          Recruitment activities
          To respond to those who wish to join Pioneer or who view information provided by us regarding the acceptance of applications, selection, acceptance/rejection, employment procedures, etc., and other necessary measures such as the formulation of our future recruitment plans
        • (b)
          Management of the officers and employees of Pioneer, and other persons who are required for employment management and payment records (hereinafter referred to as "Officers and Employees"), and their families
          For the operation of employment management and measures necessary for legal and our personnel management, etc.
            • [Usage example]
            • Execution of operations related to employment management and personnel management (working management, transfers, secondments, transfers, promotions, retirements, dismissals, appraisals, disciplinary action, emergency communications, etc.)
            • Execution of operations related to wage management (salary, bonus, retirement allowance, corporate pension, expense management, etc.)
            • Execution of duties related to social insurance
            • Execution of duties related to taxation (income tax, resident tax, etc.)
            • Execution of operation related to education
            • Execution of duties related to insurance and safety management
            • Execution of operations related to welfare, health and safety, health management, etc.
            • Execution of operations related to access control (creation of entry and exit cards, acquisition of entry and exit logs, etc.)
            • Testing, verification, etc. of the Products and Services
            • Recruitment and participation in volunteer and social contribution activities
            • Planning and implementation of in-house questionnaires
            • Operations related to or incidental to the above
            • *
              In the event that the information is to be used beyond the above examples, the purpose of use will be notified to Officers and Employees as necessary.
        • (c)Guidance to Shareholders
          • To exercise rights and fulfill obligations under the Companies Act and related laws
          • To implement various measures aimed at facilitating the relationship between shareholders and us
          • To manage the information of shareholders, such as creating a register of shareholders by prescribed standards based on various laws and regulations
          • To respond to inquiries and requests from shareholders
        • (d)
          Business operations between business partners and us
          • For exchanging business cards and business communication
          • To contact by e-mail, telephone, etc. regarding consultation and confirmation of transaction details, etc.
          • For accounting processing, credit management, contract conclusion, and performance confirmation with business partners
          • To install and send promotional materials, pamphlets, and other mailings
          • To send seasonal greetings, etc.
          • To provide information by e-mail, telephone, etc. regarding the Products and Services, Events, campaigns, questionnaires, etc., and to respond to inquiries
        • (e)
          Management of employees of our partner companies, etc.
          • To conclude contracts with partner companies and confirm their performance
          • For work requests or instructions to employees of partner companies, etc., work management, and employment management
          • To confirm the skills possessed by employees of partner companies, etc.
          • For security management
          • To protect confidential information, etc.
          • To respond based on the Act on Outsourcing and related laws
        • (f)
          Responding to visits to our facilities
          • To receive visitors and to intercede with our staff
          • For facility management (use of surveillance cameras, etc.) for the purpose of crime prevention
        • (g)
          Other persons who have made inquiries to us
          • To contact by e-mail, telephone, etc. in response to inquiries
          • To verify the identity of the person who made the inquiry
          • To contact by e-mail, telephone, or other means when we conduct various types of research requests
          • To provide the results of statistical processing and analysis of data that cannot be used to identify individuals when responding to investigation based on laws, and regulations and survey requests inquired about, and when publishing on our website or Events
    • 4-2.
      How to acquisition

        Pioneer will acquire personal information appropriately in accordance with the consent of the person or the provider, or laws and regulations by the following methods.

        • Acquisition information entered by the person in the Products and Services
        • Collection a prescribed document to be filled out by the person
        • Acquisition information from the services provided by third parties based on your own operation of the Products and Services
        • Acquisition information when you operate, use, or browse the Products and Services
        • Acquisition information directly from the person in question by exchanging business cards at Events
    • 4-3.
      Personal information handled by us based on consignment from business partners

      Pioneer may conduct various operations that involve the acquisition, use, disposal, etc. of personal information (sponsorship, research, analysis, etc. for commissioned projects and collaborations) based on consignments from business partners. In this case, we will handle personal information to the extent necessary for the performance of the relevant business.

  5. 5. Provision of Personal Information to Third Parties

      Pioneer will not provide personal information to third parties without the prior consent of the person, except in the following cases.

      • When required by law
      • When it is necessary to protect the life, body, or property of an individual and it is difficult to obtain the consent of the person
      • When it is particularly necessary for the improvement of public health or the promotion of the sound development of children, and it is difficult to obtain the consent of the person
      • When cooperating with a national agency, a local government, or an individual or entity entrusted by either of the foregoing in executing the affairs prescribed by laws and regulations, and obtaining the consent of the person is likely to interfere with the execution of the affairs
      • When the person explicitly requests disclosure or provision to a third party
      • When a court, public prosecutor's office, police, or other organization with equivalent authority requests disclosure of personal information based on proper procedures
      • When personal information is provided in connection with the succession of business due to merger or other reasons, and it is handled within the scope of the purpose of use before the succession
      • When providing or disclosing information to a subcontractor to the extent necessary to achieve the purpose of use
      • *
        In the event that personal information is provided to a third party for reasons other than those specified above, we will notify the person in question of the information to be provided and the purpose of the provision, and will execute the provision only after consent is obtained.
  6. 6. Joint Use

      Pioneer may share personal information as follows.
      If we share personal information beyond the scope listed below, we will notify or announce it in advance.

    • (1)
       Purpose of use of personal information to be shared

      To achieve the purpose of use specified in Article 4 "Purpose of Use and Scope of Collection"

    • (2) Information to be shared

      Personal information stipulated in Article 4 "Purpose of Use and Scope of Collection"

    • (3) How to obtain

      The method specified in Article 4-2 “How to acquisition"

    • (4) Joint users

      Pioneer Group companies subject to our consolidated financial statements(Consolidated subsidiaries and equity-method affiliates)

      Group Companies

    • (5)
       Responsible for the management of personal information to be shared

      Shiro Yahara
      President and CEO
      PIONEER CORPORATION
      Bunkyo Green Court, 2-28-8, Honkomagome, Bunkyo-ku, Tokyo, 113-0021, Japan

  7. 7. Handling of Personal Information of Minors

    Pioneer will not acquire or use personal information of people under the age of 16 without the consent of a parent or guardian. In the unlikely event that you find that a minor has provided us with personal information without the consent of a parent or guardian, please contact us immediately.

  8. 8. Use of Cookies, etc.

    Pioneer use cookies, beacons, and other similar files (hereinafter collectively referred to as "cookies"). Cookies allow us to provide you with more relevant services and content. For more information, please see the link below.

    Cookie Policy

  9. 9. Security Control Measures

    Pioneer take the following measures to safely manage the personal information we receive.

      1. (1) Organizational Security Control Measures
        • (a)
          Clarification of procedures for handling personal information

          We have established rules for the safe and appropriate handling of personal information when viewing, using, storing, disposing, returning, etc., and our Officers and Employees are conducting their business in accordance with these rules.

        • (b)
          Internal Regulations on Information Security, etc.

          In order to ensure the proper use and safety management of information entrusted to us in the course of transactions, we appoint "Chief Information Security Officer" and "Personal Information Protection Officer" and other various related management managers, and maintain and improve the information security management process, implement information security management, grasp the status of management, and implement corrective measures.

        • (c)
          System for Crisis Management and Incident Response

          In preparation for that an unforeseen situation related to the management of information assets occurs or is likely to occur, we have established an organizational structure to accurately grasp the situation without delay and in accordance with the procedures stipulated in the internal regulations, and to make appropriate decisions and responses.

        • (d)
          Supervision of subcontractors

          We may outsource all or part of the handling of personal information to the extent necessary to achieve the purpose of use set forth in Article 4 "Purpose of Use and Scope of Collection." In that case, we will strictly select a contractor and properly supervise the handling of personal information.

      2. (2) Personnel Security Control Measures
        • (a)
          Submission of a written pledge

          Our Officers and Employees conduct their business after submitting a written pledge of confidentiality regarding confidential information (including personal information).

        • (b)Education of Employees, etc.

          Through e-learning on personal information and information security, we strive to promote understanding of the importance of protecting personal information, requests under Applicable Privacy Law, management systems, handling rules, and measures to be taken in the event of violations.

      3. (3) Physical Security Control Measures
        • (a)Access control

          We physically manage access to information assets and prevent unauthorized intrusion into our workplaces through methods such as dividing the inside of workplaces and restricting entry by locking, monitoring, recording entry and exit, etc., depending on the division.

        • (b) Deletion and Disposal of Information

          When deleting or disposing of confidential information and information and communications equipment that stores confidential information, we employ incineration, melting, shredding, data deletion software, and other irretrievable means.

      4. (4) Technical security control measures
        • (a)Permissions

          In the use of information systems, the number of Officers and Employees to whom access authority should be granted is minimized in light of business needs, and only those who have authority can use the information system or applications. In addition, we have established a security policy for each information system, and access is controlled not only to the server, but also to each folder, file, database data, etc.

        • (b)Management of ID, PW, etc. authentication

          We use ID and password authentication and, if necessary, biometric authentication to confirm that access is by the officer or employee who has access authority. In addition, the success and failure of authentication are recorded and stored.

        • (c)Network Management

          We use firewalls, routers, and other settings to protect networks and information systems from unauthorized access, and we manage communications to monitor potential unauthorized access from the outside.

        • (d)Measures against unauthorized access

          In order to prevent the theft, loss, falsification, and destruction of information due to unauthorized access, we have established a management system for information and information systems, and have appropriately constructed access control to areas where personal information is handled, a mechanism to protect against unauthorized access from the outside, and a mechanism to protect against unauthorized software.

      5. (5) Understanding the external environment

        In the event that we transfer or store personal information outside Japan, we will refer to the information published by the Personal Information Protection Commission to understand the system for the protection of personal information in the foreign country, and will manage safety and take other measures in accordance with Applicable Privacy Law.
        As a side note, information on the legal systems of other countries and regions published by the Personal Information Protection Commission is available at the following link.

        Personal Information Protection Commission

        *
        You will be redirected to the website of the Personal Information Protection Commission.
        *
        This website is out of our management, and available only in Japanese.

  10. 10.
     Disclosure and Correction of Personal Information

    If Pioneer receives a request for disclosure or correction of personal data held by us from the person or his/her agent, we will respond to the request without delay and to the extent required by law.
    If you wish to submit a request, please contact us using the form set forth in Article 11 "Contact for Inquiries and Complaints."

  11. 11. Contact for Inquiries and Complaints

    If you have any inquiries or comments regarding the handling of personal information, please use the form below.

    Inquiry Form for the Handling of Personal Information

  12. 12. Continuous Review and Improvement

    Pioneer will continuously review and improve our efforts to protect personal information in response to revisions to Applicable Privacy Law and changes in the social environment.

  13. 13. Revisions to the Policy

    Pioneer may change the contents of this policy. In the event of any changes, the revised policy will be posted on our website.

  14. 14.
     Name of Business Operator Handling Personal Information

    Shiro Yahara
    President and CEO
    Bunkyo Green Court, 2-28-8, Honkomagome, Bunkyo-ku, Tokyo, 113-0021, Japan

Supplementary provisions

Revised: April 1, 2024