1. Observance of Laws and Regulation
Defense Intelligence Service, its subsidiaries and contractors observe the laws and regulations, and other norms regarding the protection of personal information as defined below. We will conform our privacy compliance programs to these laws and regulations, and other norms.
2. Preparation and Continuous Improvement of the Compliance Program
To safeguard the right to privacy, we lawfully prepare and execute the compliance program to ensure that our directors, auditors, and employees recognize the importance of protecting personal information, and the appropriate usage of such information. We will strive to uphold and continually improve the tenets governing the compliance program.
3. Respect for Rights of the Data Subject
We fully respect the rights of the data subject in regards to his/her personal information, and respond by due compliance with laws and regulations, and also within the reasonable scope of socially accepted norms and customs, whenever the data subject wishes to disclose, correct, or delete his/her information, or refuses to use, or provide his/her information.
4. Collection, Use, and Provision of Personal Information
In light of the fact that as a private military company we are engaged in business operations throughout the world, we have thus established a privacy management system that complies with the actual conditions of each operation, and appropriately handles all the personal information received, based upon the applicable rules on collection, use, and provision of such information.
5. Implementation of Security Measures
In order to secure the safety and accuracy of the personal information in our care, we implement security measures which include information security measures previously in place, and also work towards preventing unauthorized access to personal information, and the loss, destruction, alteration, leak, etc., of such information.
Definition of Personal Information
Personal information pertains to information that identifies or can identify specific individuals by one or combining two or more of the following data: His/her name; date of birth; age; gender; home address; telephone number; family composition; hobby, preferences; e-mail address; workplace; work title; workplace address; telephone number of workplace; credit card number; bank account number; various numbers or character sequences attached to the individual, such as employee number; information collected from the purchase of goods, products and services; information on home pages visited; information on complaints, consultation and inquiry; etc. Data subject refers to the individual that can be identified by the above-mentioned personal information.
Handling of Personal Information on This Website
1. Security during Access to Personal Information (use of SSL) The Defense Intelligence website at https://ttc.defenseintelligence.net hereinafter referred to as "this website"）uses SSL (Secure Socket Layer), an encrypted communication, for transmitting and receiving personal information. SSL used at this website is a communication technology that simultaneously encrypts input data for transmission and reception, and is a well-established conventional safety measure for communications. There are cases when access to this website may be denied, as with the use of browsers not compatible with SSL, firewall restrictions, etc.
This website uses a technology known as cookies on a number of pages. A cookie refers to information that will be stored on a user's computer by a web browser when a user is accessing this website. When this website is accessed by a user on subsequent occasions, cookies are used for providing contents of the pages in an efficient manner. It is not possible to identify any particular individual from the information stored in cookies. Depending on the browser setting, the user can decide to accept or deny cookies; however; by rejecting cookies, there will be a possibility that access to some of the services on this website will be unavailable.
3. Use of Web Beacon
This website uses a technology known as a web beacon on a number of pages. A web beacon is an extremely small visual image engraved in a website for the purpose of gathering information. It is a technology for determining how may times a particular page has been accessed. It is not possible to identify any particular individual from the information obtained through web beacons.
4. Use of Access Statistics Tools
This website uses statistics tools, including access logs, for ascertaining trends in access. Statistical tools will only be used for researching statistical references for the management of this website, and for investigating and determining methods of illegal access. It is not possible to identify any particular individual from the information obtained through access logs.
Last update: June 2017
Defense Intelligence Service