top of page
k-main-ban-0120.jpg

inquiry

Inquiry type
Massage Book
Other inquiries

Privacy policy

In this article, personal information refers to the definition of personal information as defined in Article 2, Paragraph 1 of the Personal Information Protection Law.

1. The provision of local services, products, etc. (hereinafter referred to as "local services, etc.")

2. When dealing with social media and other related matters, such as cases and inquiries

5. Notify of any changes to the company's regulations and other related documents

6. When improvements are made to social media, development of new media, products, etc

8. Employment management and internal operations (including personal information of employees)

9. Handling of Handling Matters under Other Laws and Regulations such as Company Management and Company Law (Regarding Personal Information of Company Owners, New Company Contractors, etc.)

10. Create statistical data in the form of individual identification when related to social media, etc

11. Information provided by local authorities (including reports)

12. Other than the aforementioned purposes of use, pay for the following purposes

3. Change in the purpose of using personal information

When there is a reasonable correlation between the purpose of using personal information and the society, the individual (hereinafter referred to as "the individual") who is the subject of the personal information shall be the subject of the personal information. The notification is also on the public form.

4. Restrictions on the Utilization of Personal Information

Unless permitted by other laws or regulations such as the Personal Information Protection Law, the individual may obtain personal information beyond what is necessary to achieve the purpose of use with their consent. But in the next occasion, there will be no restrictions.

1. Legal basis

When it is necessary to protect a person's life and body as well as their property, it is difficult to obtain their consent

In situations where it is necessary to promote the improvement of public health and the healthy development of children, it is difficult to obtain my consent

4. When it is necessary to cooperate in carrying out legal and regulatory affairs as entrusted by local public entities or other parties, I obtain my consent. When obstacles arise in the execution of the transaction

When providing personal data related to academic research institutions, etc., it is necessary to adopt the personal data as the academic research purpose when the personal data is taken as part of the academic research purpose. Except in cases where the interests are infringed upon improperly

5. Proper acquisition of personal information

five point one

When obtaining personal information through legitimate means or other fraudulent means.

five point two

When obtaining personal information (as defined in Article 2, Paragraph 3 of the Personal Information Protection Act) without obtaining my consent in the following circumstances, consideration must be given to obtaining it.

On the occasion of the first and fourth items of the fourth item

When academic research institutions need to consider the acquisition of personal information, it is necessary to consider the acquisition of personal information for academic research purposes (when one of the purposes of obtaining personal information includes academic research purposes). Except in cases where infringement occurs (limited to cases where academic research is conducted jointly by the society and other academic research institutions).

3. When personal information needs to be taken into account, the individual, national authorities, local public entities, or other individuals designated under Article 57 (1) of the Personal Information Protection Law, the rules of the Personal Information Protection Committee shall be made public

4. In situations where I obtain personal information while visually observing or taking photos, it is clearly necessary to consider my appearance

When receiving personal information in a manner that takes into account the provision of personal information provided by a third party, in addition to the provision in clause 7.1

6. Security Management of Personal Information

When dealing with the loss, destruction, modification, and leakage of personal information, it is necessary to conduct appropriate supervision on the security management of personal information for the company's employees. When the company entrusts all or part of the collection of personal information, it is necessary to conduct appropriate supervision of the security management of personal information before the commission. The summary of the safety management measures of the company is as follows.

1. When complying with the Personal Information Protection Law and related laws and regulations, and applying them in a manner that complies with the code, etc., as indicated in item 15, it is related to the acquisition of personal data. Please question and discuss the pain you have experienced.

2. Determine the stages of acquisition, utilization, preservation, provision, removal, and disposal, as well as the methods of acquisition, responsible parties, and other tasks.

3. Set up a person responsible for the acquisition of personal data and confirm the person responsible for the acquisition of personal data through the preparation of the acquisition method. If a company violates laws, regulations, internal procedures, etc., it is necessary to establish a reporting and communication system for the responsible parties of the operating companies in the situation. In addition, the responsible party conducts regular inspections based on the personal data acquisition status.

4. In terms of personal data acquisition, necessary training should be carried out for employees. Matters related to the confidentiality of personal data are recorded in the employment rules.

5. Take measures to facilitate the viewing of personal data by employees and individuals other than myself. To prevent theft and loss of devices, electronic media, and books that are difficult to obtain from personal data, and to record books on electronic media that are also personal data. Keep the library and other storage facilities. In the case of using a personal data acquisition and intelligence system as a machine, the machine is fixed with its own equipment. In order to prevent theft and loss of machines, electronic media, and books, as mentioned above, personal data collection includes necessary measures for moving within the workplace. When the machines, electronic media, etc. are in operation, it is easy for personal data collection. Implement the measures accordingly.

6. Clarify the collection of personal data and the provider of the collection of the machine, and prevent any unauthorized collection of personal data. Import personal data from the machine to the external environment for the protection of improper equipment.

7. In cases where personal data is removed or records are discarded, including machines and electronic media, the responsible party shall be confirmed.

7. Third party provision

seven point one

When the company needs to provide personal information to a third party, except for those who have given their consent. But in the following case, it should be provided by a third party as specified above.

1. When the company entrusts a partner to provide personal information within the necessary scope for the purpose of using it, and all or part of it is collected

2. When providing personal information in conjunction with the undertaking of other businesses for the purpose of merging

3. Under the provisions of the Personal Information Protection Law, there are occasions for joint use

seven point two

In accordance with the provisions of item 7.1, except for the cases mentioned in item 4, the company shall designate a third country (excluding the designated country under Article 28 of the Personal Information Protection Act, which is the basic rule of the Personal Information Protection Committee). Except for those who are suitable for the establishment of a system based on the designated criteria specified in Article 28 of the Personal Information Protection Act (the Basic Rules of the Personal Information Protection Committee), when providing personal information, they shall be recognized as being provided by foreign third parties. I hereby agree to take basic measures under the Personal Information Protection Law.

seven point three

When providing personal information to a third party, in accordance with Article 29 of the Personal Information Protection Law, the creation and retention of records shall be carried out.

seven point four

When receiving personal information from a third party, it is necessary to confirm in accordance with Article 30 of the Personal Information Protection Law, and to create and store records of such confirmation.

seven point five

In accordance with the provisions of item 7.1, the local company may provide information to the user of the supporting enterprise based on other agreements stipulated in the local company's service utilization regulations.

8. Personal relationship information

When a company obtains personal related information (as defined in the Personal Information Protection Law) from a third party and uses it, the company shall

1. Obtain personal related information through personal data and use it within the scope of the purpose of the second item with my consent.

2. When the company provides personal related information to a third party and the third party intends to use the personal related information as personal data, the third party may obtain the personal related information as personal data. Please confirm your consent.

9. Disclosure of Personal Information

When the company requests disclosure of personal data or records provided by a third party based on the provisions of the Personal Information Protection Law, I confirm my own request and provide disclosure accordingly. If the personal data to be held exists as a record provided by a third party, notify them accordingly. However, in cases where the obligation to disclose is imposed by other laws and regulations under the Personal Information Protection Law, there are no restrictions.

10. Correction of personal information, etc

For the reason that my personal information has been verified, I request to revise or add to the basic content of the Personal Information Protection Law (hereinafter referred to as "revisions"). On the basis of confirmation, within the necessary scope for achieving the purpose of use, conducting investigations on the basis of the results of the investigation, and correcting the content of personal information, etc., I, myself, have no reason why my personal information is true. When requesting to revise, add, or remove (hereinafter referred to as "revisions, etc.") the basic content of the Personal Information Protection Law I confirm my own request and conduct necessary investigations within the scope necessary to achieve the purpose of use. Based on the results of these investigations, I will notify myself of the purpose of correcting the content of my personal information. I will notify you of the decision made in accordance with the order. However, in cases where the obligation to revise the Personal Information Protection Law is imposed on other laws and regulations, such as the Personal Information Protection Law, there are no restrictions.

11. Stop using personal information, etc

When the company, myself, or my personal information is used for purposes beyond the scope of the purpose of the public statement, and the reason for obtaining it is through other improper means such as forgery. For reasons beyond our control, in accordance with the Personal Information Protection Law, the cessation or elimination of basic uses (hereinafter referred to as "cessation of use, etc.") shall be requested and provided to a third party with my consent for personal information. Based on the Personal Information Protection Law, if a request is made to stop the provision of basic information (hereinafter referred to as "cessation of provision"), the reasons for the request will be determined. In this situation I hereby confirm my own request and notify myself of the cessation of the use of personal information and other related matters. However, in cases where a company has an obligation to provide cessation of use or other related laws under the Personal Information Protection Law, there are no restrictions. If it is necessary for the company to use my personal information, I will identify myself

In accordance with the Personal Information Protection Law, the rules of the Personal Information Protection Committee stipulate that the leakage, loss, or damage of personal data, as well as the security of other personal data, can cause significant harm to personal interests. When a situation arises, the other party identifies and retains personal data for personal gain that is legitimate and harms their own interests. When a request for cessation is made based on the cessation of legal use, or when the reason for the request is determined, the individual confirms the request upon their own request I will notify myself of the cessation of the use of personal information and other related matters. However, in cases where a company has an obligation to provide cessation of use or other related laws under the Personal Information Protection Law, there are no restrictions.

12. Collection of anonymous processing information

twelve point one

When creating anonymous processing information (as defined in Article 2, Paragraph 6 of the Personal Information Protection Act and the anonymous processing information data as defined in Article 16, Paragraph 6 of the same Act), the criteria for creating such information shall be based on the rules of the Personal Information Protection Committee. Processing of personal information.

twelve point two

We will discuss the security management measures based on the standards set by the Personal Information Protection Committee for anonymous processing of information.

twelve point three

When anonymous processing information is created, in accordance with the rules of the Personal Information Protection Committee, it is publicly disclosed that the anonymous processing information includes items related to individuals.

twelve point four

The provision of anonymous processing information (including the information generated by the company and received by third parties) to third parties shall be subject to the same restrictions as those set forth in the following paragraphs. When a third party provides anonymous processing information that includes items related to individuals and methods for providing such information to a public table, When the information to be provided is anonymous processing information, the purpose is clearly stated.

twelve point five

When collecting anonymous processing information, the company uses personal information to identify the individual, (1) combines anonymous processing information with other information, and (2) removes the personal information. If the description is not a personal identification symbol, then the information is obtained through a method of processing according to Article 43 (1) of the Personal Information Protection Law. (2) The anonymous processing information is provided and received by a third party. Go on your way.

twelve point six

When necessary for the security management of anonymous processing information, appropriate measures should be taken to ensure the proper collection of other anonymous processing information in addition to the processing of other grievances related to the creation of anonymous processing information. Make an effort to improve the public record.

13. Use of Cookies and Other Technologies

We use cookies and other similar technologies in our company's website. The technology of the company is based on the understanding of the utilization status of the company's own servers and other factors, and is used to improve the company's performance. If the cookie is invalidated and the settings of the ェェプラウ are changed, then the cookie will be invalidated. However, there may be situations where cookies become ineffective and some functions of the company's system are used.

14. Utilization of External Services

The company's website is used for the following purposes:. Please confirm the preferences of each company and the respective business units.

1) Grasping the Visiting Status of Ruzha

There may be occasions where the "Google Nanotechnology" service provided by Google Inc. is used as the "Google Nanotechnology Notification Function".

The following functions can be utilized.

Google Nano アリェクスリリーケェィング

Google ィスプイネイトークインプイシンレート

The relationship between Google Nanotechnology and its properties and properties

2) レーケィングトートーョン※ When used, it can be removed

When a related company of Wix.com Ltd. is engaged in business activities related to the provision of "wix software", it is used to provide the "wix software".

The "wix system" is a feature that allows customers to track and collect URLs when they view the website on the same day. That's right. Identify and analyze customers' preferences and interests, and speculate on their interests and concerns by obtaining customer information and login information. Carry out business activities such as distributing letters and making phone calls.

Ineffective optimization of ヌキートアウト

There is a possibility that some functions of the ェェプク system can be used normally without making any modifications to the settings of the user's タートプラク. Um. Specify a specific keyword, refuse to save the keyword, and prevent it from being saved. If the acquisition of data is stopped, then all users of the platform will stop calling from the top up, top up, and other platforms. In some individual cases, it is recommended to use the recommendation system of each individual website.

Google Inc. moves externally.

プイバシープリシー( https://policies.google.com/privacy

Google アナリティクス オプトアウト アドオン( https://tools.google.com/dlpage/gaoptout

15. Name of the representative of the personal information collection company, including their address and residence

AK BEAUTY Co..Ltd

Address: Eaton Square 2F, 438 Hobron Lane, # 216, Honolulu, HI, 96815 US

Representing Shuai Beizuka

16. Contact us

In order to request other personal information related to disclosure, opinions, inquiries, and complaints, please use the following methods, either by phone or email.

Personal Information Inquiry Contact

Phone number: 808-810-6860

E-mail: yoshie924kaizuka@gmail.com

(The payment time is from 10:00 to 18:00 on weekdays.)

17. Improvement of 継続

Efforts are made to improve the use of personal information in a timely and appropriate manner, and if necessary, this policy will be revised accordingly.

Established on January 26, 2026

banner.jpg

Here is a reservation

Please inquire directly to "line" or "contact us".
You can also book from the reservation site.

bottom of page