Privacy Policy

GESHARY COFFEE INC. (hereafter, “we”) recognizes the importance of safeguarding personal information in the highly innovative information society, and is committed to safeguarding the personal information obtained through our operation and the personal information provided through inquiries to us under the following privacy policy (“Policy”).

  1. Intended use of Personal Information
    We use the personal information provided for the following purposes:

    1. Personal Information Provided Through Our Operation
      1. For the provision of services, the sale of the products, and the responses incidental to it
      2. For the purpose of giving information and guidance on new products, new services, seminars, events, etc.
      3. To respond to applications for seminars and events related to products and services
      4. In response to lotteries, winning notices, and gifts of prizes for various campaigns
      5. For use in improving products and services, such as marketing through information on customers visiting stores and improving store management efficiency
      6. For use as statistical data for the planning of questionnaires, market surveys, customer trend analyses, and other management-necessary analyses, sales promotions, products, services, seminars, events, etc.
      7. For communication regarding the opinions and inquiries received. (including conducting identification)
      8. To inform any changes to our Code, this Policy, etc.
      9. To respond to acts in violation of our Code, this Policy, etc.
    2. Personal Information of Job Applicants
      1. To provide recruitment information, recruitment selection, and confirmation of application history.
      2. For human resources and management, if job applicants join us.
  2. Provision to Third Parties
    We will not provide personal information to any third party, except with the prior consent of the person in question or as otherwise provided by law.
  3. Entrustment
    We may outsource the handling of personal information to outside parties to the extent necessary to provide better services and achieve the purpose of use. In this case, we will supervise the entrusted company to appropriately manage and protect personal information following the Personal Information Protection Law to manage the safety of personal information.
  4. Security Control Measures
    We manage the personal information provided as follows.

    1. We will strive to ensure that personal information is accurate and up-to-date within the scope necessary for the achievement of the Purpose of Utilization.
    2. We take appropriate information security measures against unauthorized access, computer viruses, etc., to prevent personal information from being lost, destroyed, falsified, or leaked.
    3. We will take necessary and appropriate measures to prevent the leakage, loss, or damage of personal information and to ensure the safe management of personal information.
    4. We will instruct our executives and employees on how to appropriately manage personal information and thoroughly handle personal information in our work.
  5. To Form Organization, Structure, and Compliance With Laws and Regulations
    We will strictly observe laws, regulations, and other norms, protect and handle personal information appropriately in our daily operations to our executives and employees.
  6. Disclosure of Personal Information
    We will disclose any personal information requested by the person in question following the Personal Information Protection Law to the person after confirming that the person in question made the request. (We will notify you of this when the relevant personal information does not exist.) However, this is not the case if we are not obliged to disclose due to the Personal Information Protection Law or other laws. Please be advised that we charge a reasonable amount of fees for disclosing personal information, taking actual costs into account.
  7. Correction, Suspension of Use, and Deletion of Personal Information
    1. Correction and Suspension of Use of Personal Information
      When you notify us that ① if you are to correct the content based on the provisions of the Personal Information Protection Law for the reason that personal information is not true, and ② if you are to stop using it based on the provisions of the Personal Information Protection Law for the reason that it is handled beyond the scope of the purpose of use that has been announced in advance, or because it has been collected by fraudulent or other illegal means, we will conduct necessary investigations without delay after confirming that it is a request from the person in question, and based on the results, and we will correct or suspend the use of the content of the personal information and notify the person. In addition, if we decide not to correct or suspend the use, we will notify you to that effect.
    2. Deletion of Personal Information
      If we find it necessary for us to comply with the request in case you request the removal of your personal information, we will verify that the request is made by you, remove the personal information, and notify the person to that effect.
    3. The provisions of paragraphs 1 and 2 do not apply if we are not obliged to correct, etc. or suspend the use, etc. by the Personal Information Protection Law or other laws.
  8. Contact Points for Inquiries
    For inquiries about opinions, questions, requests for complaints, and other matters relating to the handling of personal information, please contact us through the “CONTACT” inquiry form.
  9. Procedures for Changes to this Policy
    1. We change this Policy as necessary. However, if you make any changes to this Policy that require legal consent, the changed Policy will only apply to those who agree to the change in our predetermined way. When we change this Policy, we will inform you of the timing and content of the enforcement of this changed Policy by displaying it on our website and other appropriate methods.
    2. Except as stipulated in the proviso of the preceding paragraph, this changed Policy shall be effective from the time it is posted on this website.

Established October 15, 2019
Revised March 17, 2020
Chief Executive Officer, Kaishun Kihara

Basic Policy for Information Security

GESHARY COFFEE INC. (hereafter, “we”) will work on information security throughout the company in accordance with the following policies in order to protect the information assets it receives from customers from the threat of accidents, disasters, crimes, etc., and to respond to the trust of customers and society.

  1. Management Responsibility
    We strive to improve information security systematically and continuously under the leadership of management.
  2. Establish the Necessary Internal Systems
    We establish an organization to maintain and improve information security and establish information security measures as official internal rules.
  3. Activities of Each Employee
    Our employees will acquire the knowledge and skills required for information security and will ensure our efforts for information security.
  4. Compliance with Laws and Contractual Requirements
    We comply with laws, regulations, norms, and contractual obligations related to information security and meet the expectations of our customers.
  5. Response to Violations and Accidents
    We will take appropriate measures to prevent recurrence in the event of a violation of laws, contract violations, or accidents related to information security.

Established September 1, 2020
Chief Executive Officer, Kaishun Kihara

Acquisition of Visiting Information by Marketing Camera

  1. Place of Implementation
    GESHARY COFFEE Hibiya Store
  2. Purpose of Usage
    A marketing camera (one) will be installed in the shop mentioned above to obtain information on customers’ visits to the shop.
      We will analyze the acquired information and improve customer convenience by improving the following marketing and store management efficiency.

    1. Marketing: Improve product lineup, develop products, develop stores, and conduct campaigns
    2. Streamlining of store operations: Improving staffing, customer service, and streamlining order placement
  3. Acquired Information
    Visit history, purchase history, and estimated attributes (gender/age)
  4. Handling of Acquired Information
    The history of visits to the shop is obtained by using the features (converted into numerical values and converted into data) of the face image obtained from the marketing camera in the above shop. The face image is deleted after the minutiae are converted to data. In addition, it is handled under our privacy policy.
  5. Start Date
  6. Contact Points for Inquiries
    Please contact us through the “CONTACT” inquiry form.