privacy policy
privacy policy
Corporations and organizations belonging to the Shorinji Kempo Group (hereinafter referred to as "each corporation and organization") recognize the importance of personal information (information that can identify individuals) and protect personal information.In order to comply with relevant laws and related laws and regulations, and to properly collect, use and safely manage personal information, we will establish the following policy and strive to realize it.
In addition, personal information is safe andWe will conduct regular verification and strive to improve and improve so that it will be continuously protected.
1. Acquisition of personal information
Each corporation and organization acquires personal information by lawful and fair means.
2. Specification of purpose of use
The purpose of use of personal information acquired by each corporation and organization is as follows.
(1) meetingSupport for procedures necessary for carrying out various activities of the Shorinji Kempo Group, including member registration and membership fee collection
(2) Individuals necessary for managing membersCreation of personal information lists, etc.
(3) Sending documents, materials, purchased products, etc.
(4) Guidance on services provided by corporations and organizations
(5) Investigation of service usage status, etc. of each corporation and organization
Use as statistical information in a format that cannot identify individuals, such as the total number of members by gender, age, area of residence, etc.
(6) Other legitimate purposes of use within the business scope of each corporation and organization
*If you have obtained the consent of the person in advance, or if any of the items listed below apply,
Personal information may be handled beyond the scope of the above purpose of use.
① When required by law
② When it is unavoidable to avoid the current danger to the life, body or property of a person (including a corporation) and it is difficult to obtain the consent of the person.
(3) When it is difficult to obtain the consent of the person concerned when it is necessary to handle personal information beyond the scope of the purpose of use in order to promote the healthy development of children and young people.
④ In cases where it is necessary for corporations and organizations to cooperate with inquiries, etc. from investigative authorities in connection with criminal cases, etc., and obtaining the consent of the person concerned may interfere with the execution of the relevant affairs. When
3. Provision to third parties
Acquired personal information may be entrusted to a subcontractor who has an obligation of confidentiality within the scope of the purpose of use listed in this personal information protection policy.
Except for the above, personal information will not be provided to third parties without the prior consent of the individual, except in the following cases.
(1) When required by law
(2) When it is unavoidable to avoid the current danger to the life, body or property of a person (including a corporation),
When it is difficult to obtain the person's consent
(3) When it is particularly necessary to promote the healthy upbringing of children and young people, and it is difficult to obtain the consent of the individual.
(4) When it is necessary for corporations and organizations to cooperate with inquiries, etc. from investigative authorities accompanying criminal cases, etc.,
When there is a risk that obtaining the consent of the individual may interfere with the execution of the relevant affairs
4. Safety management
Each corporation and organization will endeavor to keep personal information accurate and up-to-date within the scope of the purpose of use.
Each corporation and organization will take necessary and appropriate measures to prevent leakage of personal information, loss of personal data, damage, and other safety management of personal information.
5. Disclosure, correction, suspension of use, etc.
In the event that each corporation or organization receives a request for disclosure, correction, suspension of use, etc. of personal information from the person in question, we will respond promptly within a reasonable range. If you are interested, please contact us at the contact information below.
6. Inquiries about personal information
Each corporation and organization will promptly and appropriately respond to complaints and other inquiries regarding the handling of personal information. Inquiries regarding personal information are accepted at the following contact point.
Inquiries regarding personal information
General Incorporated Association SHORINJI KEMPO UNITY
TEL: 0877-32-2577
Fax: 0877-56-6022
Mail:u-support@shorinjikempo.or.jp
7. Guidelines for the use of social media
At the Shorinji Kempo Group, from the perspective that it is important for Shorinji Kempo to be properly communicated and evaluated, the following points should be recognized by Shorinji Kempo instructors and kenshi when using social media (Note 1). , and shown to those involved in Shorinji Kempo (instructors, kenshi, etc.).
The Shorinji Kempo Group will follow these guidelines when using social media. Please note that information posted on social media by instructors, kenshi, etc. belonging to the Shorinji Kempo Group does not represent official announcements or views of the Shorinji Kempo Group. Regarding official announcements and views, information is disseminated on the Shorinji Kempo Group official website and press releases.
(Note 1) Refers to media where users share information and knowledge, such as Facebook, Twitter, LINE, and blogs.
(1) Responsibility for use
You are responsible for what you say, whether privately or anonymously. Anything you say will spread around the world in an instant, and even if you are an individual, you may be perceived as representing the organization. In addition, careless remarks may harm family and friends, so
It is necessary to follow social rules and be careful with what you say.
As a person involved in Shorinji Kempo, please be responsible and behave with moderation when using the facilities. Transmission of informationIn doing so, we will comply with the various rules of Shorinji Kempo, correctly convey the essence of Shorinji Kempo, which aims to “develop people,”・Try to protect the educational system, Shorinji Kempo names, marks and logos.
(2) Protection of personal information, etc.
We must respect the individuality of users and protect their personal information. In particular, please refrain from posting personal information that can completely identify your own or others' person, address, etc. In addition, slander leads to violation of human rights. In your remarks, please be careful not to use expressions that infringe on human rights or discrimination, or to use offensive language or behavior that identifies individuals or groups.
When disseminating information, as a person involved in Shorinji Kempo, we will strive to protect the Shorinji Kempo Group, the instructors and kenshi who support it, and strive to protect personal information. Be careful not to get caught in the
(3) Others, etc.respect for the rights of
Please respect copyrights, trademark rights, portrait rights, and other rights, and do not infringe on the property rights of other people's creative activities. Also, please be careful not to post other people's photos or information without permission.
(4) Ensuring fairness, etc.
Social media, which targets an unspecified number of people, must maintain fairness, etc. in conjunction with individual freedom of speech. Please respect the opinions of others and do not try to control or guide the discussion from your personal standpoint. Also, please do not respond to negative opinions at your own discretion, and if in doubt, do not participate in conversations or posts.
(5) Precautions when using the Internet
Since anyone can post on the Internet, there is a risk of being led to suspicious links (one-click fraud, phishing scams, etc.). There are also websites of “malicious” software such as adware and malware (Note 2). Please be aware of the credibility of the source of the information when posting.
(Note 2) Adware is software that can be used free of charge in exchange for forcibly displaying advertisements on the user's screen, and malware is unauthorized software such as computer viruses, worms, and spyware.