Privacy policy

Privacy policy

MabuhayTech Corporation (hereinafter referred to as the Company) is committed to appropriately managing personal information obtained from customers, etc. in various operations, including contract business related to software development, as well as the personal information of our employees. Recognizing that it is an important social responsibility, we have established the following policy regarding the protection of personal information, and strive to ensure that all officers and employees are fully aware of this policy, and strive to protect personal information.

Newly established on September 1, 2023Representative Director and CEO Tsuyoshi Goto

signiture

Article 1 (Management of personal information)

Our company has established a system to appropriately protect and manage personal information, and has established internal regulations regarding the proper acquisition, use, and provision of personal information. I will comply with this.

Article 2 (Acquisition and use of personal information)

When acquiring and using personal information, our company will clarify the purpose of use and use the information to the extent necessary to achieve the specified purpose of use. We handle personal information appropriately and take measures to prevent its use for other purposes..

Article 3 (Provision of personal information)

Our company will not provide or disclose personal information to any third party other than to whom we have received prior consent from the individual..

Article 4 (Outsourcing of personal information)

Acquired personal information may be outsourced to external parties for purposes such as sending direct mail and processing information.. When outsourcing, we will select a business operator whose level of protection of personal information meets the safety measures standards set by our company, and will appropriately manage and supervise the business..

Article 5 (Security Measures for Personal Information)

We will implement appropriate safety measures against risks such as unauthorized access to personal information, loss, damage, falsification, and leakage of personal information. If it is determined that improvement is necessary, we will promptly correct it..

Article 6 (Response to complaints and consultations about personal information)

We will establish a response desk and respond appropriately to complaints and consultations from individuals regarding the handling of personal information..

Article 7 (Compliance with laws and regulations)

We will comply with laws and regulations regarding the handling of personal information, guidelines established by the government, and other norms..

Article 8 (Continuous improvement of personal information protection management system)

In order to appropriately maintain personal information protection, we will establish a personal information protection management system and regularly audit the operational status. and strive for continuous improvement..

Publication matters based on the "Act on the Protection of Personal Information"

"Act on the Protection of Personal Information" (hereinafter referred to as the "Act"). ), we would like to announce the following matters..

Name, address, and representative name of business entity handling personal information

Business name: MabuhayTech Corporation

Address: Unit 10-A Cyber One Condominium Office , Eastwood Cyber ​​Park, Bagumbayan, Quezon City, 1110 Metro Manila, Philippines

Name of representative: Tsuyoshi Goto

Personal information protection manager

Personal information protection manager: Tsuyoshi Goto

  1. Matters regarding publication of purpose of use of personal information

    (1) We will announce the purpose of use of personal information held by our company as follows.. (Article 18, Paragraph 1 of the Law) Personal information acquired through contracted work For implementation of contracted work related to software development Personal information acquired through recruitment recruitment For recruitment selection management. For sending materials, event announcements, contacting interview dates, etc. Personal information acquired during employment. For employment management of employees (including retired employees). )

    (2) Purpose of use of entrusted personal information (Article 18, Paragraph 1 of the Act, Article 23, Paragraph 4, Item 1 of the Act) Currently, the use of entrusted personal information is there is no.

    (3) Acquisition through merger, company spin-off, or business succession (Article 23, Paragraph 4, Item 2 of the Act) Currently, there is no acquisition of personal information through merger, company spin-off, or business succession.

    (4) Matters regarding joint use (Article 23, Paragraph 4, Item 3 of the Law, Article 23, Paragraph 5 of the Law) Acquisition regarding joint use is as follows..

    • Information regarding products and services provided by GIG INNOVATION Co., Ltd. (including sending emails, newsletters, direct mail, etc.)
    • Held by GIG INNOVATION Co., Ltd. (sponsored/co-sponsored)
    • Provided by GIG INNOVATION Co., Ltd. Information on various events such as seminars, exhibitions, information sessions, etc. (including sending e-mails, e-mail newsletters, direct mail, etc.) Reception of participation registration and communication necessary for the operation of various events
  2. Matters concerning personal information that should be made known to the person concerned (Article 24, Paragraph 1 of the Act)

    The purpose of use of our company's "personal information" is as follows.

    Personal information acquired in software development business

    For billing and payment processing

    For various communications necessary for business Only for contract preparation and execution, engineer information To provide to customers

    Personal information acquired during recruitment recruitment

    For recruitment selection management

    For sending materials, event announcements, contacting interview dates, etc.

    Employment Personal information acquired in

    For employment management of employees (including retired employees)

  3. Matters concerning the publication of the purpose of use of personal information subject to disclosure

    Matters concerning the publication of the purpose of use of personal information subject to disclosure.

    Personal information obtained during recruitment.

    For recruitment selection management.

    For sending materials, event announcements, notification of interview dates, etc.

    Personal information obtained during employment.

    For employment management of employees (including retired employees)

  4. Regarding requests for disclosure, correction, deletion, and suspension of use of personal information

    ➀ Application procedure

    Disclosure, correction, deletion, and suspension of use of personal information held by our company When making a request, we will confirm that you are the person in question or on his or her behalf.. For requests for disclosure, etc., please apply to the address below.. We will send you the prescribed application form by mail.

    MabuhayTech Corporation

    Unit 10-A Cyber One Condominium Office , Eastwood Cyber ​​Park, Bagumbayan, Quezon City, 1110 Metro Manila, Philippines

    Email Address

    info@mabuhaytech.com

    ➁ Required documents when making a request

    When making a request, please make a copy of one of the following documents and submit it so that we can confirm your identity.

    • My number card
    • Driver's license
    • Passport
    • Residence card
    • Insured identification card such as health insurance, national health insurance, etc.
    • Alien Registration Certificate If you are a person, please submit the following documents.

    ● If the person making the request is a legal representative: Please submit the following documents (a) and (b).

    (a)Documents for confirming power of attorney

    • If the person has parental authority: A copy of the person's registration document
    • If the person is an adult ward: An adult ward Certificate of registered information to prove that you are a guardian

    (b) Documents to confirm that you are a legal representative Same as the identity verification documents specified above (My number card, driver's license, passport, health insurance) (certificate, etc.)

    ● If you are acting as a proxy, please submit the following documents a), b), and c).

    (a)One letter of attorney specifying that the person in question is delegating the request for disclosure, etc. to an agent

    (b) One copy of the person's seal registration certificate

    (c) Authorization One document to prove that you are the person receiving the request (same as the identification document specified above)

    ➂ Fee for "request for disclosure, etc." and how to collect it

    A fixed amount money order issued by Japan Post of 1,000 yen is required for each item.. Please enclose the prescribed application form and apply. *A fee of 1,000 yen will be charged only when notification is made in response to a request for disclosure.

    ➃ "Purpose of use" of personal information obtained in connection with a request for disclosure, etc.

    Personal information obtained in connection with a request for disclosure, etc. shall be used only to the extent necessary for the request for disclosure, etc. shall handle. Submitted documents will be retained for one year after we have responded to your request for disclosure, etc., and will then be safely destroyed.

    ➄ Regarding non-disclosure

    In the following cases, information will not be disclosed.. If we decide not to disclose information, we will notify you of the decision and reason.

    • If the identity of the applicant cannot be confirmed, such as when there is a discrepancy between the contents of the application form and the information written on the document for identity verification.
    • If the authority of representation cannot be confirmed when applying by a representative.
    • If the prescribed application documents are incomplete.
    • In cases where there is a risk of harming the life, body, property, or other rights and interests of the person or a third party.
    • If it violates other laws and regulations
  5. Purpose of use when personal information is obtained through methods other than direct writing

    Our company may obtain personal information through methods other than direct writing. In that case, the purpose of use of personal information is as follows.

    Personal information when entrusted with work When our company is entrusted with work, the personal information entrusted to us will be used for information processing work at the outsourced company. will do

  6. Details of the personal information handling system and measures taken

    (1) Formulation of basic policy

    In order to ensure proper handling of retained personal data, We have established a "Personal Information Protection Policy" regarding "Compliance" and "Counter for questions and complaints handling" etc.

    (2) Establishment of regulations regarding the handling of personal data

    We have established personal information protection regulations regarding its duties, etc.

    (3) Organizational safety management measures

    ➀ In addition to appointing a person responsible for handling retained personal data, employees who handle retained personal data and retained personal data handled by such employees. We have clarified the scope of this and have established a system for reporting to the person in charge in the event that we become aware of any facts or signs of violation of laws or handling regulations.

    ➁ We regularly conduct self-inspections regarding the handling status of retained personal data, and conduct audits by other departments and external parties.

    (4) Personnel safety management measures

    ➀ We provide regular training to employees on matters to be noted regarding the handling of retained personal data.

    ➁ Matters regarding confidentiality of retained personal data are stated in the employment regulations.

    (5) Physical safety control measures

    ➀ In areas where retained personal data is handled, control the entry and exit of employees and restrict the equipment brought in, and those who do not have authority We have taken measures to prevent the viewing of personal data held by.

    ➁ Take measures to prevent the theft or loss of equipment, electronic media, documents, etc. that handle retained personal data, and ensure that such equipment, electronic media, etc. are easily transported, including when moving within the workplace. We have taken measures to ensure that personal data held by the Company is not disclosed.

    (6) Technical safety management measures

    ➀ Access control is implemented to limit the scope of personnel and personal information databases handled.

    ➁ We have introduced a mechanism to protect information systems that handle retained personal data from unauthorized access from outside or unauthorized software.

Security policy on website

This site implements the following security measures to protect user's personal information.

  1. About SSL

    This site uses SSL (Secure Sockets Layer) encryption technology on pages where users enter personal information so that users can input it with peace of mind.. With SSL, the data you enter is encrypted on your computer and then sent through the network to the computer where you are registering. *SSL is a technology that prevents data theft or tampering by third parties by encrypting and authenticating communications between browsers and WWW servers.

  2. About access logs

    When a user accesses this site, this information may be stored as an access log on the web server of this site.. Access logs include the domain name of the person accessing the site, the type of browser used, the date and time of access, etc., but do not include information that can identify individuals.

  3. Regarding unauthorized access

    This site takes every possible measure to protect information on the site, including installing a firewall to prevent unauthorized access from outside.

  4. About vulnerabilities

    This site performs appropriate inspections and measures when developing web applications.

If you have any questions regarding the above, please contact us below.

MabuhayTech Corporation

Unit 10-A Cyber One Condominium Office , Eastwood Cyber ​​Park, Bagumbayan, Quezon City, 1110 Metro Manila, Philippines

Email Address

info@mabuhaytech.com