top of page

PRIVACY POLICY


Radius Windshields Japan (hereafter, “our company”) pays the utmost attention to the protection of our customers' personal information and has implemented the following measures.

  1. We have appointed a manager to handle personal information and ensure that it is managed appropriately.

  2. When we obtain personal information from customers, we clearly state the purpose of use and obtain only the personal information that is necessary.

  3. We will not transfer, provide or disclose any personal information obtained from customers to any third party other than the company with the customer's consent. (However, there may be cases where we provide personal information to public institutions in cases of official disclosure requests related to criminal investigations, or to debt transfer destinations in cases of debt collection.

  4. Notwithstanding the above 3., we may provide your address, name, telephone number, etc. to our affiliated companies, manufacturers, and distributors in order to provide support for products in response to inquiries from customers regarding products and services.

  5. We may contact you by various means of communication when providing you with various services. You can have us stop or resume such communication by the methods separately specified by us.

  6. If you wish to inquire about or amend your personal information, please contact the relevant department at our company, and we will respond as soon as possible within reasonable limits.

  7. We will comply with all applicable laws and regulations regarding the personal information we hold, and will review and improve the measures outlined above as necessary.

  8. Once we have obtained your personal information, we will continue to manage and store it even after you stop using our services.
    If you have any questions about our privacy policy or any of our procedures, please contact us using the details below.

 

Scope of Application of the Personal Information Policy

1. Our approach to personal information is part of our Terms of Use and applies when you use our services.

2. The management of personal information provided to other companies when using their services is subject to the other company's policy on personal information. (Courier services, loan use).

 

Acquisition and Use of Information

Acquisition of Personal Information

We will obtain the information necessary to use our various services.
We will obtain the information necessary to improve our services by telephone, fax, email, web server logs, and cookies.

Purposes of use of personal information

1. Communication with customers
We use this information to confirm orders, provide estimates, and respond to inquiries.

2. Delivery of products
We use this information when outsourcing to a shipping company when shipping products.

3. Marketing research
We use this information to obtain the statistical information necessary to improve our services.

4. Sales management
We use this information for support services such as repairs and warranties based on purchase history.

5. Distribution and sending of questionnaires and announcements
We use this information to send questionnaires to customers, announcements, email newsletters, and catalogs.

6. Identity verification
We use this information to verify that the person making an inquiry is the customer themselves.

7. Payment
We use this information to bill for the purchase of products.

8. Dispute resolution
We use this information to resolve disputes when they arise.

Details of personal information to be obtained

1. Name (phonetic)


2. Postal code

3. Address

4. Telephone number

5. Fax number

6. Mobile phone number

7. Email address

8. Date of birth

9. Gender

10. Information obtained through website access (IP address, browser information, time of visit)

 

Disclosure of personal information

We do not sell or rent personal information to third parties.

In the following cases, we may provide personal information to third parties.

  1. When the customer has given consent to the provision of information.

  2. In the event that we receive a court order or judgment to disclose information based on the Act on the Limitation of Liability for Damages of Specified Telecommunications Service Providers and on the Disclosure of Sender Information (Act No. 137 of November 30, 2001), or order, or if we receive a formal inquiry from a public organization such as the police based on laws that stipulate investigative authority, such as the Code of Criminal Procedure (Act No. 131 of July 10, 1948).

  3. In cases where a user violates laws, terms of use, guidelines, etc. in relation to the use of the services we provide, and it is deemed necessary to protect the rights, property, services, etc. of a third party or our company, and it is difficult to obtain the consent of the person in question.

  4. In cases where there is an imminent danger to a person's life, body, or property, and there is an urgent need to do so, and it is difficult to obtain the person's consent.

 

About Cookies
  1. We may store and access our cookies on your computer.

  2. We may store and access cookies on your computer on other company sites that display advertisements distributed by our company. In this case, cookies will be used in accordance with our privacy policy.

  3. We use web beacons on our site and in connection with our products and services to reference our cookies.

 

Security Policy

We are committed to providing reliable and secure information services to our customers, and we are also committed to maintaining the trust of our customers. In accordance with the following policies, we are working to ensure information security.

Establishment of an information security management system

Our company will maintain and manage an information security committee as an information security promotion system, and implement information security measures.

  • Assignment of information security management personnel
    Responsibility and implementation of information security activities.

  • Security Management Office
    Formulation of regulations and maintenance of activities related to information security.

  • System Management Office
    Management of all computer equipment, network environments, peripheral devices and application software held by the company.

  • Internal auditor
    Audits to ensure that information security management is being effectively implemented and maintained.

 

Thorough implementation of internal company regulations and education regarding information security

Our company will maintain internal regulations based on our information security policy. We will also clearly state our policy on the handling of not only personal information but also all information assets, and ensure that all employees receive ongoing security education and training.

 

A system with thorough information security measures

We have established an information security management system and operate a system with thorough information security measures to prevent unauthorized access, leakage, tampering, loss, destruction, and obstruction of use of information assets.

bottom of page