WeLearn Co., Ltd. (hereinafter referred to as "our company") provides services (hereinafter referred to as "this service") on this website. Regarding the handling of personal information acquired by, we will comply with the Act on the Protection of Personal Information, guidelines such as guidelines on the protection of personal information, and other related laws and regulations on the protection of personal information.
Article 2. Application
Article 3. Changes
Article 4. Security Management of Personal Information
Our Company shall implement appropriate organizational, physical, human and technical measures to protect personal information, and prevent leakage, loss or damage of personal information handled by the Company. We shall take necessary and appropriate measures for the safe management of personal information.
Article 5. Observance Matters Regarding the Acquisition of Personal Information, etc.
Our company will comply with the following matters regarding the acquisition, use, and provision of personal information.
Acquisition of personal information
In this service, we collect the following personal information from users.
Member registration information
This includes the name, e-mail address, credit card information, etc. of the person using this service.
- Purpose of use of personal information
Our company will not use the personal information it acquires beyond the scope necessary to achieve the purposes of use set forth below, except in cases stipulated by law or with the consent of the individual.
- (1) For identity verification and authentication services
- (2) Inquiries to this service, notification of matters necessary for the operation of this service (including by e-mail)
- (3) System maintenance and troubleshooting
- (4) To improve this service and develop quality improvements, etc
- (5) To conduct questionnaires to improve the quality of this service
- (6) To send direct mails
- (7) For research and analysis of marketing data
- (8) To understand how users access and use this service and to analyze usage status
- (9) For other purposes incidental to the above purpose of use
Provision of personal information, etc.
Personal information acquired based on the consent of the person will not be provided to a third party without the prior consent of the person. Regarding the disclosure, correction, addition or deletion of personal information or notification of the purpose of use of personal information at the request of the person, our company will do so in accordance with laws and regulations, and will respond appropriately to opinions and consultations.
Article 6. Change of purpose of use of personal information
Our company does not change the purpose of use specified in the preceding paragraph, except when the consent of the person is obtained in advance. However, to the extent that it is reasonably recognized that there is a considerable relevance to the purpose of use before the change, this does not apply if the purpose of use after the change is announced in advance and the change is made.
Article 7. Outsourcing of personal information to a third party
When outsourcing all or part of the handling of personal information to a third party, our company shall sufficiently confirm its eligibility on the premise of obtaining third-party certification such as the Privacy Mark. In order to ensure the safety management of personal information entrusted to handle, our company will conduct necessary and appropriate supervision of the entrusted person.
Article 8. Improvement and Review of Handling of Personal Information
Our company will conduct inspections regarding the handling of personal information, management systems and initiatives, and will continuously improve and review.
Article 9. Retention and retention period of information
Our company retains and stores user information for the period necessary to achieve the purpose of use or for the period specified by applicable laws and regulations. Personal information will be promptly deleted after the purpose of use has been fulfilled or after the period specified by applicable laws and regulations has expired. However, our company may retain, store and use your information to comply with our legal obligations and to protect our rights and interests.
Article 10. Notification by Email or Mobile
Our company will send notifications related to transactions related to this service or provision of this service as necessary. However, our company does our best to refrain from unwanted communications. As a general rule, our company obtains prior consent for any marketing communications our company might send.
Article 11. Matters Concerning Safety Measures
Our company will take necessary and appropriate security control measures for the management of personal information held by our company, such as prevention of loss or data leakage.
The main contents of the safety management measures for personal information are as follows.
(Establishment of rules regarding the handling of personal information)
Our company has established internal regulations regarding the handling methods, responsible persons, and persons in charge when acquiring, using, storing, providing, deleting, disposing, etc. of personal information.
(Organizational security control measures)
In addition to appointing a person in charge of personal information protection regarding the handling of personal information, clarifying the scope of personal information handled by employees who handle personal information and the personal information handled by such employees, our company has established a system for reporting and contacting the person in charge of personal information protection when our company grasps the facts or signs of violations.
Regarding the handling of personal information, our company regularly conducts self-inspections and conducts audits by other departments and external parties.
(Personnel safety management measures)
Matters concerning the confidentiality of personal information are described in internal regulations.
(Physical security control measures)
In the areas where personal information is handled, our company controls the entry and exit of employees and restricts the devices that can be accessed, and takes measures to prevent unauthorized persons from viewing personal information.
Our company is taking measures to prevent theft or loss of equipment, electronic media, documents, etc. that handle personal information, and when carrying such equipment, electronic media, etc., including movement within the office, personal information cannot be easily identified.
(Technical security control measures)
Access control is implemented to limit the scope of the database, etc., including the person in charge and the personal information to be handled.
(Ascertaining the external environment)
After understanding the systems regarding the protection of personal information in foreign countries where personal data is stored, we implement safety measures.
Article 12. Contact
WeLearn Community Customer Support