Personal information protection system
1. We have created and maintain a system designed to properly protect user information. We have also established a compliance program, which is continually implemented and updated, that requires board members and employees to protect personal information.
Managing personal information security
2. We are careful that users’ personal information is managed securely when acquiring, using, storing and canceling/deleting said information, and we ensure that the information will not be leaked nor wrongly accessed.
Clarifying the purpose of use
3. When acquiring personal information, we clarify its intended purpose of use along with who has access to it, and then either inform or publicly disclose said purpose of use to the user. We will not use your personal information for any purpose outside the scope of that required to fulfill the specified purpose of use.
Information sharing, disclosure and management
4. As a rule, we do not share personal information with third parties. However, in the circumstances listed hereafter, personal information may be shared with or disclosed to a third party. In these circumstances, we impose on the third party the same responsibility of appropriately handling the information as we are subject to.
- If permission has been granted by the user If the information is to be shared with a separate entity with which we have a confidentiality agreement and when required to fulfill the JX Holdings Group’s objectives
- If personal information is to be shared with a specific entity, such as a company, and when this has been publicly disclosed or the user has been informed of such
- If the information must be shared or disclosed for legal reasons
- If a national institution or other public organization requests the information to prevent physical or financial danger to the user or another third party
Handling of inquires and requests for the disclosure, change, or stoppage of use of personal information
5. If a user contacts us about the handling of their personal information or requests that we disclose, change, or stop using their personal information, we will handle their inquiry or request quickly and properly after first verifying their identity.