Policy on Protection of Personal Information


Principles of Protection of Personal Information

Principles of Protection of Personal Information RISE NEXT Corporation (hereafter referred to as "the Company") aims to be a mail order site that satisfies customers by providing good products at lower prices and the best possible service in mail order sales. We are aware of our social responsibility as a mail-order company, and consider the proper protection and management of personal information and privacy entrusted to us by our customers and others to be of the utmost importance.

Therefore, all of our employees and all other persons involved in our company recognize the importance of protecting personal information, and we are committed to building a system that allows our customers to use the services we provide with peace of mind by protecting the personal information we collect, and to providing our customers with even greater reliability and peace of mind.

In addition, we will comply with laws and regulations regarding personal information and strive to appropriately manage and maintain personal information.

Personal Information Protection Policy

    • 1. acquisition of personal information
    • When we acquire personal information from our mail order customers, we will inform them of the purpose of use and contact information for inquiries, and obtain their consent before acquiring their personal information within an appropriate scope.

    • 2. use of personal information
    • When acquiring personal information, we will disclose the purpose of use in advance and use the information within the scope of that purpose. Except as permitted by the Personal Information Protection Law and other laws and regulations, the Company will not use personal information for purposes other than those necessary to achieve those purposes without the consent of the relevant individual, and will take measures to prevent use of personal information for purposes other than those for which it was collected by limiting access to personal information and controlling the period of availability of such information.

    • 3. Prevention and Correction of Leakage, Loss, or Damage of Personal Information
    • The Company shall take necessary and appropriate measures to prevent leakage, loss, or damage of personal information handled, and to otherwise safely manage personal information, and shall take necessary corrective measures.

    • 4. Compliance with Laws and Regulations, National Guidelines, and Other Standards Concerning Personal Information
    • With respect to personal information handled by the Company, the Company shall comply with laws and ordinances, government guidelines, and other norms regarding the protection of personal information.

    • 5. Response to Complaints and Consultations
    • We will endeavor to respond sincerely and promptly to complaints, consultations, and inquiries regarding our handling of personal information.

  • 6. Continuous Improvement of Personal Information Protection Management System
  • In order to protect personal information safely, we will continuously review and improve our management system in accordance with changes in the surrounding environment and social conditions.

RISE NEXT Co.,Ltd
President and CEO:Ikuo Tateshita
Date of enactment:April 25, 2023

Handling of Personal Information

Rise Next Corporation (hereinafter referred to as "the Company") shall handle the personal information of customers of the Company's services and other related parties (hereinafter collectively referred to as "Users, etc.") in relation to services provided by the Company including the cross-border EC platform business SaQra Mart (hereinafter referred to as "our services"), website, and other business and operations, etc. of the Company. The following policy (hereinafter referred to as the "Policy") shall apply to the handling of user information, including personal information, obtained from customers of our services and other related parties (hereinafter collectively referred to as "Users, etc.") in connection with our business, website, and other Company business operations, etc. When you provide personal information to us, please do so only after you have agreed to the following terms and conditions. The term "personal information" as used in this Policy shall be as defined in the Act on the Protection of Personal Information in Japan (hereinafter referred to as the "Personal Information Protection Act").

    • 1. Acquisition of Users' Information

1-1 Content of Users' Information to be Obtained and Method of Obtaining Information The information we collect from users, including personal information, may include the following.
(1) Information provided by users, etc. in writing, on the website, etc.
Name, date of birth, gender, occupation, and other information of the user, etc.
Users' address, telephone number, e-mail address, and other contact information
IDs and passwords related to accounts for our services
(2) Information we collect when you use our services
Referrer information/IP address information/Website browsing and activity history/Information on the use of our services/Information on communication terminals of users, etc. Server access log information
(3) Information provided by third parties
Registration information of users, etc. on linked services (including e-commerce services other than the Company's website that the Company operates) for which users, etc. have given permission for linking with the Company's services Other information provided by third parties with the consent of users, etc. or in accordance with laws and regulations
1-2 Proper acquisition of personal information
When obtaining personal information, we will comply with the Personal Information Protection Law and use appropriate means. Please note that you may not be able to use our services if you do not provide us with the necessary information, including personal information, for the provision of our services.

    • 2. Purpose of Use of Personal Information

We will use personal information obtained by us only within the scope necessary to achieve the following purposes of use. In the event that personal information is to be used for purposes other than those specified below, we will obtain the prior consent of the user. If the user is under 16 years of age, we ask that the user provide his/her personal information with the consent of his/her guardian or other legal representative.

■ Personal information of customers for our services
To ship ordered products, bill for payment, provide after-sales service, and perform other operations related to our services (including providing product manufacturers and courier companies with information necessary for the shipment of ordered products). To contact or confirm with customers the contents of their orders, delivery methods, etc. To respond to customer requests and inquiries To authenticate the identity of customers when they log in to the membership page To register and manage customers' membership information To operate and manage point services To send campaigns and gifts, and to provide information on products and services (including sending direct mailings and distributing e-mail magazines, etc.) To ask customers to provide us with opinions and impressions (including opinions and impressions of our products and services) To analyze and review our products and services for improvement or new development To conduct marketing, campaigns, and other promotional advertisements (including the distribution of targeted advertisements, etc.) for the Company or third parties To prevent and respond to acts that violate the terms of use of our services or other illegal acts
■ Personal Information of Affiliates
For payment of affiliate commissions and related business communications
■ Personal information of persons who have made inquiries to our company
To reply to such inquiries To analyze and consider ways to improve our products and services or to develop new ones In addition to the above, we will disclose the purpose of use of personal information in advance when we obtain it. In addition, except as permitted by the Personal Information Protection Law and other laws and regulations, we will not use personal information beyond the scope necessary to achieve the purpose of use without the consent of the user or other person concerned.

  • 3. Outsourcing the Handling of Personal Information

We may outsource all or part of the handling of personal information to third parties to the extent necessary to achieve the purposes stated in "2. In such cases, we will conduct a rigorous investigation of the third party and exercise necessary and appropriate supervision over the third party to ensure the safe management of the personal information entrusted to the third party.

  • 4. Provision of Users' Information to Third Parties

4-1 Provision of Personal Information to Third Parties
We will not provide personal information obtained from users to any third party without obtaining the prior consent of the user. However, this does not apply to cases in which the Personal Information Protection Law or other laws and regulations permit the Company to provide personal information to a third party without obtaining prior consent.
4-2 Provision of Personally-Related Information to Third Parties
We may provide users' personal information (defined as "personal information" under the Personal Information Protection Law), such as website browsing history and usage history of our services, to third parties. Personally Relevant Information does not include personal information that can identify an individual.
However, in the event that the third party to whom the personally identifiable information is provided is expected to use such personally identifiable information as personal information, we will confirm that the third party has obtained consent from the user in advance to use such personally identifiable information as personal information.

  • 5. Disclosure and Correction of Personal Information

Upon receiving a request for disclosure (including disclosure by providing electromagnetic records), correction, addition, deletion, suspension of use or elimination, or suspension of provision to a third party (hereinafter referred to as "disclosure, etc.") of personal information, we will promptly investigate and respond to the request in accordance with our internal rules. Please note that we will not respond to a request for Disclosure, etc. if we are unable to verify the identity of the person making such a request, or if we are under no obligation to respond to such a request based on laws and regulations.

  • 6. safety control measures

To prevent leakage, loss, or damage of personal information, and to otherwise safely manage personal information, the Company shall take the following safety management measures

(1) Establishment of basic policy
To ensure the proper handling of personal information as an organization, we have formulated a "Personal Information Protection Policy" that sets forth our basic policy regarding the protection of personal information.
(2) Establishment of Rules and Regulations for Handling Personal Information
Basic rules for information security have been established for the handling of personal information, including acquisition, use, and storage. In addition, the Company regularly evaluates and reviews such rules and the management system for information security, and works for continuous improvement.
(3) Organizational safety control measures
The Company has established an organizational structure for taking safety control measures for personal information, including appointing a chief information security officer, clarifying the departments that handle personal information, and establishing a reporting and communication system in the event of incidents such as leaks. Employees are required to handle personal information in accordance with the Basic Rules for Information Security. Means are in place to check the status of personal information handling, such as by limiting the number of employees who handle personal information according to the division of duties. We have established a procedure manual for handling incidents such as information leaks, and have a system in place to appropriately and promptly investigate, report, and take countermeasures in accordance with the manual. In accordance with the Basic Rules for Information Security, the Company conducts self-inspections and internal audits, and reports the results of such inspections, etc. In addition, the Company periodically conducts external audits by outside experts to ascertain the status of the handling of personal information, etc., and works to evaluate, review, and improve safety control measures.
(4) Personnel safety control measures
The Company shall ensure that all employees are aware of the proper handling of personal information by providing information security training, obtaining written agreements regarding confidentiality of personal information, and conducting other appropriate training on an ongoing basis.
(5) Physical safety control measures
Control of areas where personal information is handled is restricted, for example, by using security cards to keep records of entry and exit from office spaces, and by limiting access to the server room to each department. Documents and recording media containing important information, such as personal information, are kept locked in cabinets, etc., to prevent theft, etc. When destroying documents or electronic media containing or recording personal information, we employ methods that make it impossible to recover or easily recover personal information, such as incineration, melting, shredding, use of software dedicated to data deletion, or physical destruction.
(6) Technical security control measures
Access control of personal information is implemented by granting access privileges to employees within the scope necessary for business operations. Employees' IDs and passwords are used to identify and authenticate those who access personal information. Measures are taken to prevent unauthorized access from outside, such as by installing firewalls at connection points with external networks. Measures are taken to prevent the leakage of personal information when using the information system, such as encrypting the route and content of communications containing personal information and other important information, and using passwords to protect important information when it is transferred.

  • 7. About cookies

This website uses a technology called cookies.

Cookies are a mechanism that allows specific information to be temporarily stored as data in the communication device used by the customer and allows the customer to be identified based on that data each time a connection is made. Although cookies identify the computer used by the customer, the information obtained from this does not include anything that can identify the user or other individuals.
This website provides this service on the premise that cookies are used. Therefore, if you do not allow the use of cookies, you may not be able to receive some of the Services. Permission to use cookies can be set on your browser, so please check your settings as necessary.

Date of enactment: April 25, 2023