Personal Information Protection Policy
Effective Date: April 1, 2006
Last Update: May 1, 2024
LITALICO Inc.Fumihiro Yamaguchi, Representative Director
LITALICO Inc.
Kota Fukazawa, Representative Director
LITALICO Partners Inc.
This Personal Information Protection Policy shall be governed, interpreted, and applied by the laws of Japan and Japanese Industrial Standards (JIS). In the event of any inconsistency or discrepancy between the Japanese version and any translated version, the Japanese version shall prevail.
Personal Information Protection Policy
* Conobie was transferred to NTT DOCOMO, Inc. on April 1, 2019. Please see here for the privacy policy of NTT DOCOMO, Inc.
1. Basic Principles Concerning Appropriate Collection, Use, Provision, etc. of Personal Information
- (A) Principles for the direct acquisition of personal information
- In a case where the Company will directly acquire any personal information from the customer, we will collect them by explicitly disclosing the purpose of the acquisition in advance.
- (B) Principles for the use and provision of personal information
- In a case where the Company will use personal information, such information will only be used or provided (including taking any measures required therefor) within the scope of the purpose that has been clearly indicated in advance.
2. Method for Appropriate Handling of Personal Information
To secure the accuracy and safety of personal information, the Company will take measures such as managing access to personal information, restricting the methods to take out personal information, and preventing unauthorized access from the outside. The Company will also implement safety measures and rectification/prevention measures that are considered technically and organizationally reasonable, against any loss, damage, falsification, leakage, etc. of personal information.
3. Compliance with Laws and Regulations, etc.
For performing a business that handles personal information, the Company will comply with the laws and regulations regarding personal information, as well as the "Required Matters for Personal Information Protection Management System (JIS Q15001)", etc. The Company will also take sufficient care of personal information handling in accordance with the required matters set forth in the Company's personal information protection management system.
4. Continuous Improvement of Personal Information Management System
The Company will implement and comply with the Personal Information Protection Management System by placing a person responsible for managing each unit that handles personal information. Furthermore, the Company will endeavor to continuously improve the Personal Information Protection Management System by referring to the report for audits conducted regularly, as well as other materials.
5. Respecting Individual Rights
The Company respects individual rights concerning personal information.If the customer wishes to confirm about its personal information via inquiry for complaint or consultation, the Company will respond within a reasonable period and an accepted scope, as long as we can confirm that the inquiring customer and the customer who is identifiable by such information are the same person. Furthermore, if there is any error or change to the customer's personal information, the Company will promptly make a correction or deletion within a reasonable term upon request by the customer, as long as we can confirm that the inquiring customer and the and the customer identifiable by such information are the same person
LITALICO Inc.
(Fumihiro Yamaguchi, Representative Director)
Complaint and consultation desk regarding personal information
Appellation of the accredited personal information protection organization and where to lodge a petition for resolving a complaint for LITALICO
Partners, Inc.: Complaint and Consultation Desk for Personal Information, Japan Institute for Promotion of Digital Economy and Community
Contact: Roppongi First Building, 9-9 Roppongi 1-chome, Minato-ku, Tokyo 106-0032
Tel: 0120-700-779
Based on the request from the customer, the Company will respond to a request for notice of purpose of use, disclosure, correction, addition or deletion, cessation of use, erasure, and cessation of provision to a third party, of the personal data held by the Company, and request for disclosure of records of third-party provision ("Disclosure, Etc.").
For the contact desk responding to the Disclosure, Etc., please see below:
LITALICO Inc. (Fumihiro Yamaguchi, Representative Director)
LITALICO Partners Inc. (Kota Fukazawa, Representative Director)
Personal Information Protection Manager: Chairperson of the Information Security Committee
Contact: 15F, Nakameguro GT Tower, 1-1, Kamimeguro 2-chome, Meguro-ku, Tokyo
FAX:03-5704-7356
Purpose of Use of Personal Information
a) To respond to inquiries;
b) To provide information and suggest the service, such as by sending reference materials;
c) To provide the service;
d) To adjust schedules for explanatory meetings, facility tours, trial enrollment, etc.;
e) To conduct the applied explanatory meeting, facility tour, and trial enrollment;
f) To respond to the consultations it received;
g) To provide various information about the recruiting activities;
h) To select candidates subject to recruitment screening;
i) To conduct recruitment screening (interviews and exams, and selection of a department to be assigned to);
j) To make an inquiry to the applicant for recruitment;
k) To send documents related to hiring and job offer;
l) To respond to media interviews, and
m) To conduct liaison concerning the above, etc.
Complaint and Consultation Desk for Personal Information,
Japan Institute for Promotion of Digital Economy and Community
Contact: Roppongi First Building, 9-9 Roppongi 1-chome, Minato-ku, Tokyo 106-0032
TEL:0120-700-779
Procedures to Respond to Requests for Notice of Purpose of Use, Disclosure, Correction, Addition, Deletion, Cessation of Use, Erasure, and Cessation of Provision of the Personal Data Held by the Company, and Request for Disclosure of Records of Third-Party Provision (collectively, a "request for disclosure or other handling")
LITALICO, Inc. (Fumihiro Yamaguchi, Representative Director)
LITALICO Partner Inc. (Kota Fukazawa, Representative Director)
Personal Information Protection Manager: Chairperson of the Information Security Committee
Contact: 15F, Nakameguro GT Tower, 1-1, Kamimeguro 2-chome, Meguro-ku, Tokyo
FAX:03-5704-7356
E-mail:
Format for documents to be submitted at the time of making a request for Disclosure, Etc., and other forms wherein a request for Disclosure Etc. may be made;
The request for Disclosure, Etc. from a principal or an agent will be received by submitting a demand for personal information disclosure, etc. to the contact desk.
The Company will receive the demand for Disclosure, Etc. by either one of (i) the customer visiting the company and directly submitting it to the desk, (ii) submission via postal mail, (iii) submission via facsimile, or (iv) online submission, such as transmission by e-mail. Please note that in principle, we do not accept demands made by a telephone call to the contact desk.
If any sensitive personal information is contained in the document submitted by a principal, the document may be accepted by redacting that information with black ink.
Please see the following confirmation method.
<1. Method for identity confirmation>
In principle, the method for the principal's identity confirmation for demand for Disclosure, Etc. will be as follows.
However, if the principal requests to use a method other than the following method for identity confirmation, the contact desk can do so if it determines that the alternative method is appropriate for confirming identity.
(1) In a case the principal visits the contact desk
The contact desk will perform identity confirmation by requesting to present a driver's license, passport, My Number card with photograph, health insurance card, residence card, or the original of a special permanent resident certificate (or a copy, in an emergency or unavoidable circumstance).
(2) In a case the demand is submitted by postal mail or facsimile
Identity confirmation will be performed by either one of the following methods. However, if the principal requests to use a method other than the following method for identity confirmation, the contact desk can do so if it determines that the alternative method is appropriate for confirming identity.
<2. Method of confirmation in the case of a demand by an agent>
If the demand for Disclosure, Etc. is submitted by an agent, the confirmation of the principal's identity, identification of the agent, and the confirmation of the agent's authority will be conducted by following methods in principle. However, if the agent requests to use a method other than the following method for the confirmation of the principal's identity, identification of the agent, and the confirmation of the agent's authority, the contact desk can do so if it determines that the alternative method is appropriate for those confirmations.
(1) In a case the principal visits the contact desk
The confirmation method stated in 1.1 will apply mutatis mutandis to the confirmation of the identity of the principal and the agent.
For the agent's authority, if the agent is the legal representative of a minor, then the confirmation will be conducted by requesting to present a certified copy of a family register. If the agent is a legal representative of an adult ward, then the confirmation will be conducted by requesting to present a copy of a written ruling for the commencement of guardianship.
If the agent is a voluntary agent, then the confirmation will be conducted by requesting to present a power of attorney or the principal's seal registration certificate. However, if the agent is an attorney-at-law, judicial scrivener, certified administrative procedures legal specialist, or any other person who is qualified to become an agent based on an entrustment in the course of their duties ("Qualified Person"), then confirmation will be conducted by requesting to present a material that certifies such qualification (such as the registered number, or seal registration certificate of their official seal).
(2) In a case the demand is submitted by postal mail or facsimile
The confirmation method stated in 1.2. a) will apply mutatis mutandis to the confirmation of the identity of the principal and the agent (however, a copy of a resident record is unnecessary for the agent).
For the agent's authority, if the agent is the legal representative of a minor, then the confirmation will be conducted by requesting to send, via postal mail, a certified copy of a family register. If the agent is a legal representative of an adult ward, then the confirmation will be conducted by requesting to send, via postal mail, a copy of a written ruling for the commencement of guardianship.
If the agent is a voluntary agent, then the confirmation will be conducted by requesting to send, via postal mail, a power of attorney or the principal's seal registration certificate. However, if the agent is a Qualified Person, then confirmation will be conducted by requesting to send, via postal mail, a material that certifies such qualification (such as the registered number, or seal registration certificate of their official seal).
The fees for the principal to make a demand for Disclosure, Etc. are determined as follows:
1) Fees for the notice of the purpose of use will be 1,000 yen per notice of the purpose of use.
2) Fees for a disclosure request will be 1,000 yen per one disclosure request.
3) Fees are unnecessary for request demands other than 1) and 2) above.
We will collect fees by cash sent by registered mail or a bank transfer to a financial institution, after the written notice for the demand for Disclosure, Etc. has been received [by the person making a request.
Safety Management Measures for Personal Data
- (1) Formulation of basic policy
The Company has formulated the Personal Information Protection Policy to handle personal information properly in an organized manner. - (2) Development of disciplines concerning the handling of personal information
The Company will take sufficient security measures, including the establishment of handling rules concerning safety management and the establishment of a practice system, for managing the safety of personal data handled by the Company (for the individual number and specific personal information, please see "10. Handling of Individual Number and Specific Personal Information" below, preventing its leaking, loss or damage. If any problem occurs, we will promptly take appropriate rectification measures. - (3) Organized safety management measures
The Company has established and operated the Personal Information Protection Management System. We will ensure our employees' compliance with the handling rules regarding the safety management of personal information, and conduct, in conjunction with this, internal audits for the status of such compliance. In addition, we have also established a structure to respond to the leakage, etc. of personal information. - (4) Personnel safety management measures
The Company regularly provides educational training to our employees for the handling of personal information. We have obtained a pledge for securing confidentiality (including personal information) from our employees. - (5) Physical safety management measures
The Company implements management of entry to and exit from the area where the information system for handling personal information is controlled, and physical protection for the prevention of theft of machines, etc. handling personal information. When we dispose of a device or electronic media that contains personal information, we destroy the data therein. - (6) Technical safety management measures
When the Company's employee accesses the personal information, the identification and authorization of the employee is conducted, and the access authority is managed under the principle of least privilege. We also conduct an encryption of network communication that contains personal information, and an encryption of the storage where personal information is kept. In addition, we have adopted a system to protect information system and devise handling personal information from unauthorized access or unauthorized software. - (7) Understanding of external environment
The Company may use a cloud service for the storage of personal data, and we conduct safety management measures by understanding the personal information protection systems in the following countries. Name of a country where the cloud service provider is located: · The United States of America Name of a country where the server for saving personal data is located · The United States of America * Please note that some of the cloud services have not disclosed the country where their servers for saving data are located, and that therefore we cannot specify it.
Joint Use
(A) Purpose of Joint Use
The Company will jointly use the personal data within the scope of the purpose of use we indicated when we initially acquired personal information, and for the following purposes of joint use:
- (1) To establish and operate a client management platform that is common to the joint users (referring to a person who is included in the "Scope of Joint Users" stated below), and to perform other operation management services;
- (2) To conduct data collaboration between services provided by the Company and the company within the scope of joint use, and provide and operate those services;
- (3) To provide information about the products and services, etc. handled by the Company and the partner company to the customers, and to provide those products and services to the customers or make a decision for such provision;
- (4) To conduct various analysis works for the enhancement of the values added for the customers, such as data analysis and data processing;
- (5) To conduct research for the enhancement of the quality of our support, service development, and any other business that is beneficial for the enhancement of additional value; and
- (6) To respond to inquiries by the customers.
(B) Details of Personal Information to be Used Jointly
Among each of the following data acquired by the Company, the information necessary for the achievement of the purpose of use stated above [are as follows] (except individual numbers and specific personal information):
- (1) Contents provided by the customer by application forms and various inquiries;
- (2) Information acquired during an inquiry, provision of services, or other course of transaction; Name, address, telephone number, email address, gender, date of birth, history of the use of service, billing history, contents of consultation and response from our Company, record of support and instruction, etc. given during the use of the service (including medical history, outpatient history, history of hospital visits, etc. that became clear by entry in forms, at the commencement of the use of the service, and during the use of the service), other information necessary for the provision, operation and management of the facility services, pseudonymized data, access log, etc.
(C) Scope of Joint Users
The scope of joint use will be limited to the consolidated target company disclosed on the website (https://litalico.co.jp/) and the securities report of LITALICO Inc., and the affiliate of LITALICO Inc., defined under the corporate accounting standards, etc. (Reference: As of September 30, 2024, the following nine companies are the joint users. This may change in the future depending on the increase or decrease of the scope of consolidation, etc. of LITALICO, Inc.)
- (1) LITALICO Inc.
- (2) LITALICO Partners Inc.
- (3) LITALICO LIFE Inc.
- (4) Plus One Solutions Inc.
- (5) nCS Inc.
- (6) Amu Inc.
- (7) HumanGrow Inc.
- (8) VISIT Inc.
- (9) Developmental Disability Center of Nebraska, LLC
(D) Person Responsible for the Joint Use
LITALICO Inc. (Fumihiro Yamaguchi, Representative Director)
Contact: 1-1, Kamimeguro 2-chome, Meguro-ku, Tokyo
E-mail:privacy@litalico.co.jp
Use of the Browsing History, Activity Log, Etc.
(*1) About Cookie
- Cookie is a function that saves, as a file on the customer's computer, the browsing log and entries made by them when they use a website. This allows the website operator to identify the customer the next time they access the same website by using the Cookie information, and customize the displayed contents for each customer. The customer may limit or allow the use of Cookie by changing their browser settings. The setting method varies depending on your browser, so please confirm by checking your browser's "Help" menu. Please note that some of the items on the Website may not be available if you do not allow the use of Cookie. The Website may show advertisements that are delivered by a third party. With this, the third party may acquire and use the Cookie information of the customer who visited the Website. The Cookie information acquired by the third party will be handled following the third party's privacy policy. The customer may visit the opt-out page, etc. on the third party's website, and cease the third party's use of the Cookie information to deliver advertisements.
- Please note that if you do not allow the use of Cookie, you may be restricted to use certain Internet services, such as being unable to receive services that require authentication.
(*2) About advertising ID
An advertising ID is a character string added in smartphone and tablet applications, for differentiation to display an advertisement that matches the customer's curiosity and interest (behavioral targeting advertising). Advertising ID identifies the device and enables the record of matters such as the customer activity in the application and the type of advertisement viewed by the customer. Advertising ID is called IDFA in iOS and AdID in Android, and the customer may reset (re-number) or cease the transmission of them by itself.
(*3) About access log
An access log is a situation of access to a webpage or an application. This includes, for example, IP address, browser, information about the viewed device, URL of the webpage, visited time, referrer (information of the webpage that a person was on right before they were sent to another page using a link), device's advertising ID, OS version, and screen name of the application.
Acquisition of Access Log and Delivery of Advertisement by a Third Party
The Company uses services provided by a third party to analyze the usage situation of the Website and deliver advertisements within the website operated by a third party. For these uses of services, each service provider collects the access log of our Website by using Cookie, etc. Please refer to the following URLs for each service provider's policy for handling information acquired via Cookie, etc. (privacy statements), and the method for invalidating the use of Cookie, etc. (opt-out).