CyberStep Inc. (hereinafter referred to as 'the Company')
Respects the privacy of all users (including testers in the case of beta testing) of the online entertainment service 'Catch' (hereinafter referred to as 'the Service') provided by the Company.
The company considers the protection of user personal information to be an important responsibility.
Therefore, the company will operate the website for the Service (hereinafter referred to as 'the Website')
- 1. Definition of Personal Information
- Personal information refers to information that can identify users, such as names, addresses, contact details (phone numbers, email addresses, etc.).
Typically, users can use this website without disclosing any personal information.
- 2. Compliance with Laws and Regulations
- The company will comply with relevant laws and regulations regarding the protection of personal information when handling your personal information.
- 3. Internal Organization
- The company will establish a structure for compliance with personal information protection by formulating internal regulations and necessary rules for each business related to the handling of personal information and systems.
This will involve setting up administrators for each department and organizing a framework to ensure adherence to personal information protection.
- 4. Purposes for the Use of Personal Information
- The company may use the personal information collected from users for the following purposes:
When collecting personal information from users on this website,
the company will only use it for the purposes presented at the time of collection and will not obtain it through falsehood or any other improper means.
- To respond to inquiries from users.
- To provide information about the service products and services to users.
- To gather feedback from users about the services.
- To create statistical data about the usage trends of services on the website.
- To send prizes or products to users.
- 5. Supervision of Contractors
- In utilizing the personal information collected from users, the company may disclose such information to third parties within the scope of legitimate use.
However, when disclosing personal information to business contractors, the company will obligate the business contractors to manage the personal information securely,
such as by entering into confidentiality agreements with the business contractors, and the company will supervise them accordingly.
- 6. Restrictions on Third-Party Provision
- Except for the following cases, the company will not provide the personal information collected from users to third parties.
- When the company have obtained the consent of the users themselves, who are the subjects of the information.
- When disclosure is required by laws or regulations.
- When it is necessary to protect the life, body, or property of a person and obtaining the consent of the individual is difficult.
- When it is particularly necessary for the improvement of public health or the promotion of sound upbringing of children, and obtaining the consent of the individual is difficult.
- When it is necessary to cooperate with a government agency or local public entity, or a person entrusted by them, in performing duties stipulated by laws and regulations, and obtaining the consent of the individual may hinder the performance of such duties.
- 7. Disclosure, Correction, and Deletion of Personal Information
- If users themselves request disclosure, correction, deletion, or other actions regarding their own information,
the company will promptly respond to such requests based on the prescribed procedures, after confirming that the request is made by the user themselves.
- 8. Security Management and Employee Supervision
- The company will take appropriate measures to prevent the leakage, loss, or damage of personal information collected from users and ensure the secure management of other personal information.
Additionally, when allowing employees to handle personal information, the company will provide necessary and appropriate supervision
to ensure the secure management of personal information.
- 9. Continuous Improvement of Activities
- The company will continuously review and improve the activities mentioned in points 1 to 8 above.
- 10. Contents Regarding External Services