GESHARY COFFEE

PRIVACY

Privacy Policy

GESHARY COFFEE INC. (hereafter, “we”) recognizes the importance of safeguarding personal information in the highly innovative information society and is committed to ensuring appropriate use and safeguarding of the personal information obtained through our operation and the personal information provided through inquiries to us under the following privacy policy (“Policy”).

  1. 1.Intended use of Personal Information
    We use the personal information provided for the following purposes:

    1. Personal information of customers (name, address, telephone number, e-mail address, etc.)
      1. For the provision of services to customers in each of our businesses, to sell and ship products, to confirm addresses in case of undelivered products, to contact customers, etc.
      2. To contact customers regarding various inquiries, confirm the identity, confirm the details of inquiries, and respond to inquiries.
      3. To provide information and guidance regarding products, services, seminars, events, campaigns, questionnaires, etc., in each of our businesses.
      4. To contact, confirm, or otherwise respond to customers who have applied for seminars, events, etc., related to products, services, etc., conducted by the Company.
      5. To accept applications for various campaigns in each of our businesses, make the lottery, contact winners, send out prizes, confirm addresses when prizes are not received, contact applicants, etc.
      6. To use the information on customer visits for marketing purposes and improve our products and services, such as by increasing the efficiency of store operations.
      7. To analyze information on the content of inquiries, responses to memorial questionnaires, participation in events, campaigns, etc., and use it to plan and develop sales promotions, products, services, campaigns, seminars, events, etc.
    2. Personal information of business partners (name, affiliation, position, address, telephone number, e-mail address, etc.)
      1. To contact for business negotiations, schedule adjustment, etc., for various transactions in our business activities, and to consider the commencement of transactions, etc.
      2. Contact, discuss, place and receive orders, conclude contracts, bill and pay, and manage business partners as necessary for our business activities.
      3. To provide information and guide on our products and events, campaigns, questionnaires, etc.
    3. Personal information of applicants for employment (name, address, telephone number, e-mail address, education, employment history, etc.)
      1. Contact the applicant regarding employment selection, selection results, adjust the interview schedule, etc.
      2. To manage recruitment operations, such as receiving applications and managing selection progress.
    4. Personal information of employees (name, date of birth, address, telephone number, e-mail address, etc.)
      1. To perform official or internal procedures necessary for social insurance and other employment-related matters.
      2. Personnel and labor-management include recruitment, hiring, assignment, training, transfer, retirement, etc.
  2. 2.Provision to Third Parties
    We will not provide personal information to any third party, except with the prior consent of the person in question or as otherwise provided by Act on the Protection of Personal Information law and other laws.
  3. 3.Entrustment
    We may outsource the handling of personal information to outside parties to the extent necessary to provide better services and achieve the purpose of use. In this case, we will supervise the entrusted company to appropriately manage and protect personal information following the Personal Information Protection Law to manage the safety of personal information.
  4. 4.Security Control Measures
    We manage the personal information provided as follows.

    1. We will strive to ensure that personal information is accurate and up-to-date within the scope necessary to achieve the Purpose of Utilization.
    2. We take appropriate information security measures against unauthorized access, computer viruses, etc., to prevent personal information from being lost, destroyed, falsified, or leaked.
    3. We will take necessary and appropriate measures to prevent the leakage, loss, or damage of personal information and ensure safe management.
    4. We will instruct our executives and employees to appropriately manage personal information and thoroughly handle personal information in our work.
  5. 5.To Form Organization, Structure, and Compliance With Laws and Regulations
    We will strictly observe laws, regulations, and other norms and appropriately protect and handle the personal information of our executives and employees in our daily operations.
  6. 6.Disclosure of Personal Information
    We will disclose any personal information requested by the person following the Personal Information Protection Law to the person after confirming that the person made the request. However, this is not the case if we are not obliged to disclose due to the Personal Information Protection Law or other laws. In addition, if the Company decides not to disclose such Personal Information following the provisions of the Personal Information Protection Law, if such Personal Information does not exist, or if it is difficult to disclose by the method requested by the person, the Company shall notify without delay. We charge a reasonable fee for disclosing personal information, taking actual costs into account.
  7. 7.Correction, Suspension of Use, and Deletion of Personal Information
    1. Correction, Suspension of Use, and Deletion of Personal Information
      If the person requests the following items, we will conduct the necessary investigation without delay after confirming that the request is made by the person. If it is found that there is a reason for the request, we will respond to the request without delay to the extent necessary. However, this shall not apply when alternative measures are permitted under the Personal Information Protection Law provisions. When we have taken action or decided not to take action, we will notify the person.
      1. When a correction, addition, or deletion of personal information is requested following the Personal Information Protection Law provisions because the personal information is not true.
      2. When the use of personal information is suspended or deleted according to the provisions of the Personal Information Protection Law because the personal information is handled by a method that encourages or is likely to induce an illegal or unjust act or is acquired by deception or other wrongful means that exceeds the scope of the previously publicly announced purpose of use.
      3. Where the Company is requested to suspend the provision of personal information because personal information is provided to a third party, even though prior consent of the person is not obtained or when such information is not provided for in the Personal Information Protection Law or other laws.
      4. When it is no longer necessary for us to use personal information, or in a situation such as leakage, loss, or damage, or if the use of personal information or the legitimate interest of the person is likely to be harmed by the handling of personal information to which the person is identifiable. The use or deletion of such personal information or the suspension of provision thereof to a third party is requested under the Personal Information Protection Law provisions.
    2. The provisions above do not apply if we are not obliged to correct, etc., or suspend the use, etc., by the Personal Information Protection Law or other laws.
  8. 8.Use of Cookies
    Our website uses “cookies” in some content for qualitative improvement. Our web server uses cookies to record your computer’s IP/internet address automatically, but this information does not identify you personally unless you provide it to us yourself. Most browsers allow you to configure cookies’ settings and refuse to accept them. Please contact the software manufacturer to change the settings of your browser.
  9. 9.Contact Points for Inquiries
    For inquiries about opinions, questions, requests for complaints, and other matters relating to the handling of personal information, please contact us through the “CONTACT” inquiry form.
  10. 10.Procedures for Changes to this Policy
    1. We change this Policy as necessary. However, if you make any changes to this Policy that require legal consent, the changed Policy will only apply to those who agree to the change in our predetermined way. When we change this Policy, we will inform you of the timing and content of the enforcement of this changed Policy by displaying it on our website and other appropriate methods.
    2. Except as stipulated in the proviso of the preceding paragraph, this changed Policy shall be effective from the time it is posted on this website.

Established October 15, 2019
Revised March 17, 2020
Revised April 1, 2022
Tokyo Square Garden
3-1-1 Kyobashi, Chuou-ku, Tokyo
GESHARY COFFEE INC.
Chief Executive Officer, Kaishun Kihara


Basic Policy for Information Security

GESHARY COFFEE INC. (hereafter, “we”) will work on information security throughout the company in accordance with the following policies in order to protect the information assets it receives from customers from the threat of accidents, disasters, crimes, etc., and to respond to the trust of customers and society.

  1. Management Responsibility
    We strive to improve information security systematically and continuously under the leadership of management.
  2. Establish the Necessary Internal Systems
    We establish an organization to maintain and improve information security and establish information security measures as official internal rules.
  3. Activities of Each Employee
    Our employees will acquire the knowledge and skills required for information security and will ensure our efforts for information security.
  4. Compliance with Laws and Contractual Requirements
    We comply with laws, regulations, norms, and contractual obligations related to information security and meet the expectations of our customers.
  5. Response to Violations and Accidents
    We will take appropriate measures to prevent recurrence in the event of a violation of laws, contract violations, or accidents related to information security.

Established September 1, 2020
GESHARY COFFEE INC.
Chief Executive Officer, Kaishun Kihara


Acquisition of Visiting Information by Marketing Camera

  1. Place of Implementation
    GESHARY COFFEE Hibiya Store
  2. Purpose of Usage
    A marketing camera (one) will be installed in the shop mentioned above to obtain information on customers’ visits to the shop.
      We will analyze the acquired information and improve customer convenience by improving the following marketing and store management efficiency.

    1. Marketing: Improve product lineup, develop products, develop stores, and conduct campaigns
    2. Streamlining of store operations: Improving staffing, customer service, and streamlining order placement
  3. Acquired Information
    Visit history, purchase history, and estimated attributes (gender/age)
  4. Handling of Acquired Information
    The history of visits to the shop is obtained by using the features (converted into numerical values and converted into data) of the face image obtained from the marketing camera in the above shop. The face image is deleted after the minutiae are converted to data. In addition, it is handled under our privacy policy.
  5. Start Date
    2020/3/27
  6. Contact Points for Inquiries
    Please contact us through the “CONTACT” inquiry form.