Privacy policy

Privacy policy

Based on the "PALTEK Security Basic Policy", "Act on the Protection of Personal Information", and other related laws and guidelines, we ensure information security including personal information of customers, business partners, shareholders, and employees.
Regarding the handling of personal information, we will establish an internal system to appropriately protect personal information, and establish and disseminate a procedure manual to ensure the protection of personal information for officers and employees.

1. Acquisition of personal information

(1) Case of asking for your personal information

  • Application for participation in the event   (seminar, exhibition, briefing session, etc.)
  • Product / service quotation / inquiry
  • Registration for newsletter subscription, etc.
  • Request for materials, etc.

(2) Personal information to ask

We may ask you to provide personal information such as name, address, telephone / fax number, e-mail address, company name, department name, job title, etc.

2. Purpose of use of personal information

(1) To properly provide the service requested by the customer

  • Confirmation / guidance regarding various events you have applied for
  • Quotations of various products and services received, answers to inquiries, suggestions, contacts, etc.
  • Confirmation and distribution of registered newsletter subscriptions, etc.
  • Sending of various requested materials, etc.
  • Delivery / collection of our products, etc.

(2) To meet the business needs of our customers and provide more useful information

  • Information about our products and events
  • Information on products and events handled by our subsidiaries
  • For other market research and analysis at our company

* Our subsidiaries" refer to Explorer Corpration, Wivicom Corpration, FMC Corpration and PALTEK Hong Kong Limited. "

3. Provision of personal information to a third party

(1) To properly provide the service requested by the customer

  • With the consent of the person
  • When entrusting all or part of the business related to the handling of personal information to the extent necessary to achieve the purpose of use of our company (However, in this case, we conclude a contract regarding the protection of personal information with the entrusted company, etc. Strive for proper supervision of contractors)
  • Disclosure in a state where the person cannot be identified as statistical data
  • When disclosure / provision is required by law
  • When it is necessary to protect the life, body or property of a person and it is difficult to obtain the consent of the person.
  • When it is necessary for the national government or local public bodies to cooperate in carrying out public affairs, and there is a possibility that obtaining the consent of the person will hinder the performance of the affairs.

4. Security management of personal information

We will take appropriate safety management measures systematically, physically and technically to prevent unauthorized access to personal information and loss, destruction, falsification and leakage of personal information. In addition, we will take appropriate personal safety management measures, such as striving for education and enlightenment activities to protect personal information, for officers and employees who handle personal information. In addition, we may outsource a part of the business and provide personal information to the outsourced company to the extent necessary to achieve the purpose of use. In this case, we will properly manage and supervise the contractors, including the conclusion of contracts regarding the handling of personal information with these contractors.

5. Creation and provision of anonymously processed information

(1) Creation of anonymously processed information

When creating anonymously processed information, we will take the following measures.

  • Appropriate processing such as not being able to identify a specific individual
  • Take safety management measures to prevent information leakage
  • Publish the information items included in the anonymously processed information
  • Do not collate the created anonymously processed information with other information to identify the person

(2) Provision of specific processing information

When we provide anonymously processed information to a third party, we will disclose the items of information about individuals included in the information and the method of providing it, and the information will be anonymously processed information to the third party.

(3) Use of specific processing information

We may process personal information into statistical information and other information that cannot identify individuals for the purpose of improving the quality of products and services. In that case, in order to identify the person related to the personal information used to create the anonymously processed information, the Group acquires the description etc. deleted from the personal information or information on the processing method, or the anonymously processed Does not match information with other information. In addition, we will take necessary and appropriate measures regarding the handling of anonymously processed information.

6. About SSL (About security measures)

(1) Creation of anonymously processed information

The data you provide on our website is transmitted using SSL (Secure Socket Layer) encryption technology and is managed by our internal system security. When using the Internet at companies and schools, SSL may not be supported due to the firewall (security system). Please contact your Internet administrator for details.

7. About the use of cookies, etc.

(1) About cookies

A file that is temporarily stored on your computer. By saving the cookie, it becomes possible to record the site browsing information etc. from the site visitor's computer on the cookie issuer's server.

(2) Information acquired by cookies, etc.

On this site, we use cookies or similar technologies to visit websites visited by site visitors, search keywords, history of ads viewed and their clicks, browsing time, type of browser used, IP. We have acquired information such as company information that can be identified from the address and IP address (hereinafter referred to as "browsing history"). In addition, this information does not include personally identifiable information such as "name", "phone number", "email address", and "date of birth", and does not infringe on the privacy of site visitors.

(3) Purpose of use

We use the information about the browsing history of site visitors collected by cookies for the following purposes.

  • To improve the convenience of site visitors.
  • To display the most appropriate advertisement on the site of our company or a third party with which we are affiliated based on the usage status on the site.
  • To investigate the number of users and traffic on our site.
  • To improve our service.
  • To solve the technical problems of our service.
  • To propose and provide products and services to our customers.

(4) How to set cookies

Site visitors can refuse the receipt of cookies or delete the cookies once they have been received by manipulating the browser settings. Even in that case, except for some functions, it will not interfere with browsing the website. Please contact each software manufacturer for the browser setting method.

(5) About using Google Analytics

This site uses Google Analytics to understand the usage status of the site. Google Analytics uses cookies to anonymously collect information about site visitors and aggregate website trend data without identifying individual site visitors. For an overview of Google Analytics, please see the following site of Google Analytics.


8. Request for disclosure / correction / suspension / deletion

We have set up a contact point to respond to requests for disclosure, correction, suspension of use, deletion of your own personal information, and complaints regarding our handling of personal information.

Inquiries regarding personal information

9. Disclaimer

Please note that we cannot be held responsible if the password issued to the customer by the Company is leaked to a third party due to the customer's circumstances and the customer is damaged as a result.

10. Revised

In the future, we will strive for continuous improvement such as reviewing the contents of our regulations and privacy policy and the operation within our company from time to time according to the enactment, revision and abolition of laws and regulations, changes in the situation, or the result of our audit. We will revise all or part of it as necessary.