MODE Recomandari
Transcript of MODE Recomandari
-
8/14/2019 MODE Recomandari
1/8
FAST RETAILING CO., LTD. (the Company) is acutely aware of the importance of personal information protection. We
strive to protect the privacy of our customers through the appropriate management of personal customer information, and
a strict adherence to "The Act on the Protection of Personal Information" and our own privacy policy.
The definition of personal information
Personal information is information that can be used to identify any one customer such as his/her name, address,
telephone number, etc. This also includes information that can be used to distinguish a person by combining it
with other information and matching it to an individual.
The acquisition of personal information
On asking customers to provide personal information, the Company will always inform the customer of the
specific purpose for which any personal information is to be used and, in addition, will also inform the customer
of any third party with which the personal information may also be shared. Personal information will only be
acquired from the customer upon agreement and understanding of the above criteria.
The use of personal information
The Company uses customers personal information for the following purposes:
(1) To respond to customer queries
(2) To provide the Companys products and services
(3) To inform about details regarding products and services
(4) To improve product development and other services
(5) To share with third parties under the conditions outlined in item 4.
In the event that the Company is required to use personal information for any other purpose other than those listed
above, the Company will first obtain the agreement of the customer before any such usage is sanctioned.
Sharing personal information with third parties
With the exception of the two circumstances listed below, the Company will not disclose personal information to
a third party without the customers consent.
(1) If required by law
(2) In case any part of operation dealing with personal information acquisition beingsub-contracted to a third party (including group companies).
In any such instance, the Company would take extreme care in selecting the party to which information was to be
provided or transferred, and would enter into a binding contract with such party regarding the appropriate
handling of personal information. The Company would aim to prevent the leakage, loss or falsification of
personal information and would commit to supervise or instruct the new party as deemed necessary.
The management of personal information
The Company undertakes to manage appropriately all personal information gathered from customers. The
Company strives to prevent any information leakage, loss or incorrect recording of content. In its effort to prevent
unlawful access, the leakage, loss or falsification of personal information, the Company undertakes to install a
personal information management body to maintain and improve management systems and organization structure.
The Company also undertakes to maintain an information security system to ensure the safety of personal
information.
The Companys group company education and management system
The Company has compiled and established guidelines regarding the handling of personal information and these
guidelines are consistently implemented through personnel training.
Customer enquiries regarding personal information
The Company will respond swiftly to customer requests regarding the disclosure, amendment or cessation ofusage of personal information. However, the Company will insist on confirming the customers identity through
appropriate means in order to prevent any leakage of information through an unauthorized demand for disclosure.
-
8/14/2019 MODE Recomandari
2/8
Customer Enquiries Desk
You can also contact us via email to the contact address for any questions on this Company's website.
Revisions
The Company reserves the right to revise the above policy at any time without notice.
The use of cookies
The technology to record and manage the activities of visitors to a website onto computer (hard drive) is called
Cookies.Some pages on the Companys website use cookies in order to make it easier for customers to use the website. If
the settings determining the use of cookies are changed on the browser to prevent cookie usage, then the customer
may not be able to access some or all of the services such as online product purchases, etc. The Company does
use cookies for independent investigation of customer website usage with the aim of improving the website itself.
About Personal Information Protection
(Privacy Policy and Summary)
Enacted on April 1, 2005Revised on April 1, 2009Takashi KawamuraPresident and Representative Executive OfficerHitachi, Ltd.
1. Background of Personal Information Protection Policy of Hitachi, Ltd.Hitachi, Ltd. (hereinafter referred to as "Hitachi") handles various information, including our technical information and
information provided by customers, as a global supplier who can provide total solution. With this in mind, Hitachi hasstrived to establish and fully enforce an information management system in order to respect the value of the said
information.
Considering such background, Hitachi will attempt to create rules and establish a management system for the personal
information protection in Hitachi, as well as to set a privacy policy and spread it among board members and employees.
Moreover, Hitachi will take measures to make the privacy policy easily accessible to general public.
Hitachi will strive to protect personal information appropriately based on this policy.
2. Hitachi Personal Information Protection Policy1. Establish rules for managing personal information protection and make continual improvements
Hitachi will make sure that executive staff and workers recognize the importance of personal information protection,
and will establish rules for personal information management to appropriately use and protect personal information
and ensure that the management system is put in execution. These rules will be maintained and improved continually.
2. Collect, use and provide personal information and forbid the use of such information for purposes other than the
original intent
While carefully considering the personal information is entrusted to us in our company activities, Hitachi will handle
such information appropriately by establishing a management system for personal information protection for each
type of business, and also by following our rules for collecting, using or providing personal information. In addition,
Hitachi will not use such information for purposes other than the original intent and will implement appropriate
measures for it.
3. Implement safety measures and correct problems
To ensure the correctness and safety of personal information, in accordance with the rules for information security,
Hitachi will implement various measures such as managing access to personal information, restricting the means for
transporting personal information outside the company and preventing incorrect access from outside the company,
and strive to prevent the leakage, loss or destruction of personal information. In addition, when any problems
regarding safety measures are found, Hitachi will identify the cause to take corrective measures.
4. Follow laws and norms
Hitachi will follow the Japanese laws, guidelines and other norms for the handling of personal information. Also,
Hitachi will conform our rules with personal information management to such laws, guidelines and other norms.
5. Respect a person's rights regarding his or her personal information
-
8/14/2019 MODE Recomandari
3/8
-
8/14/2019 MODE Recomandari
4/8
We shall perform accounting procedures strictly, following the appropriate internal checking system. We shall review
the adequacy and effectiveness of the system and revise it as necessary. When revising the system, we shall follow the
appropriate and required procedures.
We shall earnestly facilitate and assist audits by our corporate auditors and accountants, tax examinations, and other
business audits and inspections so as to support accurate financial statements and a proper audit and inspection. In the
event that a public agency investigates or inspects our business records due to suspicion of a violation of the law, we shall
cooperate with such agencies for swift clarification of the truth.
We shall faithfully exercise our individual authorities, and not make decisions that are beyond our respective authority.
We shall submit reports as designated without delay.
(3) We shall carefully manage the company's confidential information, intellectual property, and tangible and
intangible assets. We shall respect and shall not unlawfully or improperly obtain or use confidential information,
personal information or the intellectual property of others.
We shall secure and protect the results of our R&D and technologies as intellectual property, and shall efficiently utilize
and exercise all rights associated therewith.
All intellectual property and other rights of invention, designs and literary works developed or acquired as a result of our
work belong to the company. We shall strive to treat these rights appropriately, and ensure that such rights are not used
unlawfully by others.
We shall prevent the leaking of confidential information and in particular we shall prevent such leaking due to careless
management. We shall be careful not to discuss the company's confidential information with or permit it to be disclosed to
unauthorized persons, taking particular care in places where a third party is present, for example, outside on cellular
phones, in transportation facilities or in restaurants. To prevent viruses and hackers from getting into our computer
system, we shall implement regular virus checks and manage passwords.
No employee or former employee of the company shall leak confidential information concerning the company, either
during or following his employment.
Any confidential information that belongs to others shall be obtained from its proper owners or from other legitimate
sources in a lawful and appropriate way, and we shall maintain accurate and specific records of receipt. We shall use such
confidential information in compliance with agreements and usage conditions to protect confidentiality. In particular,
information sourced from the internet, newspapers, magazines, and business documents shall be treated carefully so as not
to commit wrongful acts such as plagiarism, piracy, or violation of copyrights due to the unauthorized usage of
photographs of models or other personalities for advertising. We shall refrain entirely from the illegal copying of
computer software.
We shall adopt policies in compliance with relevant laws, regulations and guidelines to thoroughly control protected
personal information.
We shall efficiently utilize the company's various assets both tangible and intangible, and we shall properly maintain
and control such assets so that they can be utilized in business activities whenever necessary. We shall endeavor to
prevent loss, theft, or illegal use of our assets.
We shall not use the company's assets (i.e. equipment, facilities, vehicles, samples, products, computer systems,
software, etc.) for any purpose other than for business related activities or such other activities as may be authorized by
our supervisors. We shall handle these assets in accordance with internal rules. In particular, communication andcorrespondence via the Internet or via other company communication systems shall be limited to proper business related
purposes, and shall not to any substantial extent be for personal use.
-
8/14/2019 MODE Recomandari
5/8
Without permission from our supervisors, we shall not bring to or keep at the company, any personal belongings other
than those that are necessary for our duties. We shall not mix our personal belongings with the company's assets, nor
engage in any conduct which undermines safety.
I wrote recently about how smartphone device loyalty will trump standardization in the enterprise. A number of
TechRepublic members such as Palmetto wrote that users in their organizations are forbidden by company policy from
bringing in privately owned laptops and smartphones. In fact, TechRepublic membertravis.duffy declared, No matter
how loyal someone is to their iPhone they are not going to be connecting them to his company network.
On the flip side of the coin, we have TechRepublic memberbharman, who pointed out that regardless of company
restrictions, savvy users will find ways to circumvent the rules. The comment by bharman underscored the position I was
trying to put across that the bottom-line reality in many organizations might not match up to company policiesspecifying the devices that employees can or cannot bring to the office.
The entire discussion thread did get me thinking a little further, specifically to the risks when ones e-mail account is
inadvertently or maliciously exposed. While it is conceivable for IT departments to lock down access at every nook and
cranny, the truth is not every organization will have the resources or expertise to do so.
Today, I attempt to highlight some possible avenues that might result in the inadvertent leaking of sensitive e-mails.
Avenues for e-mail leakage
One common scenario would be IT-savvy employees linking up their personal laptops to their companys Exchange
Server. Obviously, these additional workstations represent additional points of vulnerability, especially so if they are used
outside the company premises. While it is possible to disable or block HTTP access to forcibly divert the access of e-mails
to the LAN, this is hardly a practical solution against the backdrop of an increasingly mobile workforce. In this context,
the use of VPN does not protect against the risk of e-mail leakage.
For organizations on Microsoft Exchange, it is trivial to enable Exchange ActiveSync to allow mobile devices such asWindows Mobile smartphones to access corporate mailboxes. However, this also opens the door to devices such as the
Apple iPhone or iPod Touch, as well as other mobile phones that implement the Microsoft ActiveSync protocol.
Organizations concerned about the security of such devices can, of course, disable such access from Exchange. However,
Exchange push mail represents the most affordable option for many SMBs; they will be hard-pressed to pay for the steep
licensing fees to implement a secure BlackBerry Enterprise Server with RIM BlackBerry solution.
IMAP is a popular choice used by many organizations to access server-side e-mail without having to buy into Microsoft
Exchange or other costly enterprise e-mail systems. Most smartphones and mobile devices now have built-in capability to
access IMAP services natively, leading to additional points of vulnerability from lost or misplaced phones that might
contain cached e-mails or even passwords.
Organizations that use Microsoft Outlook should also be aware that it is trivial to sync e-mails and contact lists directly
from Outlook using tools that are widely available on the market. While the information is static and limited to what was
transferred in the last sync, it does not detract from the danger that the loss of the device represents.Other avenues where e-mails might leak would be via the use of POP access. It is not uncommon for some users to opt for
Save a Copy of E-mail on Server on their e-mail client so that they can download the same e-mails onto a different
machine or laptop. In addition, any forwarding rules will only create additional copies of corporate correspondence that
can be lost or compromised.
Conclusion
There is no doubt that none of the points of vulnerability above represents insurmountable obstacles to a diligent and
skilled network administrator. I hope I am wrong, but it is a little hard for me to imagine many smaller organizations that
would bother to address all the areas highlighted above
Memo Writing Notes
Memos are used within organizations to communicate everything from routine details to complete proposals and reports.
Memos are often only a few short paragraphs, but they can be much longer, depending on their purpose. Here are some
typical uses of memos:
to inform others about new or changed policy, procedures, organizational details
to announce meetings, events, changes
to present decisions, directives, proposals, briefings
to transmit documents (internal)
Memo Format
-
8/14/2019 MODE Recomandari
6/8
Company and/or department name (without address)
Heading
To (who gets it)
From (who sent it)
Subject (what its about)
Date (when it was sent)
Body (conveys message)
Introduction
Main points
Close
Memo Style
Concise: Make your sentences, paragraph, and overall memo as brief and as focused as possible.
Clear: Get your purpose straight before you start, then plan what you want to say and in what order. Use your
memo layout to help your reader (headings, bulleted lists, white space, as appropriate).
Direct: Speak directly to your reader, as you would in person or on the phone. Do not pad your ideas withunnecessary details. Think of what questions your reader wants answered, and then answer them.
Clean: Reread, revise, copyedit, and proofread.
Memo Structure
Subject Line: Summarizes the main idea; think of it as being preceded by the words "This memo is about."
Introductory paragraph: Quickly orients the reader to what the memo is about.
Give your purpose for writing.
Supply any relevant background information.
Identify any task the memo is related to.
Body: Conveys the information and supporting details relevant to the memo's purpose
Keep paragraphs short and focused; one main idea per paragraph.
Keep sentences tight and informative
Use bullets to list information
Close: End courteously (think of a phone call or face-to-face meeting), stating any expected outcome, action, or other
information appropriate to your purpose. For example,
Please send me your comments and suggestions by January 16.
"Let's meet next week to go over the next stage in the plan."
To:
From:
Subject:
Dr. Mary Kasarda
Jess UnderwoodJU
Correcting the Unbalance of the Demonstration Test Rig
Summary and Introduction
Recently, you informed me that an unbalance in our demonstration test rig was causing it
to experience high levels of vibration at the first critical speed. Because the test rig is to be
-
8/14/2019 MODE Recomandari
7/8
-
8/14/2019 MODE Recomandari
8/8
XYZ Company needs to focus advertising on internet sites that appeal to young people. According to surveys,
72% of our target market uses the internet for five hours or more per week. The following list shows in order of
popularity the most frequented sites:
Google
Facebook
Myspace
EBay
iTunes
Shifting our efforts from our other media sources such as radio and magazine to these popular internet sites will
more effectively promote our product sales. Young adults are spending more and more time on the internet
downloading music, communicating and researching for homework and less and less time reading paper
magazines and listening to the radio. As the trend for cultural icons to go digital, so must our marketing plans.
Television Advertising
It used to be common to advertise for our products on shows likeFriends and Seinfeldfor our target audience,
but even the face of television is changing. Young adults are tuning into reality television shows for their
entertainment. Results from the focus group show that our target audience is most interested in shows like
American Idol,The Apprentice, andAmerica's Next Top Model. The only non-reality television show to be
ranked in the top ten most commonly watched shows by males and females 18-25 isDesperate Housewives. AtBlue Incorporated, we need to focus our advertising budget on reality television shows and reduce the amount
of advertising spent on other programs.
By refocusing our advertising efforts of our new line of clothing we will be able to maximize the exposure ofour product to our target market and therefore increase our sales. Tapping into the trends of young adults will
help us gain market share and sales through effective advertising.
Attachments: Focus Group Results, January- May 2007; Survey Findings, January - April 2007