Handling of Personal Information

In order to recognize the importance of such personal information and to ensure its thorough protection, we have established the following policies regarding the handling of personal information.

1.Corporate Representative

  • Like Staffing Inc Representative Director Takeshi Miyago

2.Personal Information Protection Manager

  • Administration Head Office General Affairs Department Deputy General Manager Chiaki Ikegami
  • TEL:06-6364-0006

3.Purposes of Use and Acquisition of Personal Information

The purposes of use of personal information acquired by the Company are as follows, and personal information will be acquired only to the extent necessary to achieve these purposes.

(1)Personal information of employment applicants

  • Ⅰ.To respond to inquiries from applicants for employment, to make employment selections, and to communicate with applicants.
  • Ⅱ.To conduct registration procedures for worker dispatch and fee-charging employment placement.
  • Ⅲ.To provide job information and job matching activities.

(2)Personal information of employee

  • Ⅰ.To process employee on-boarding procedures, personnel management, labor management, welfare, health management, and health and safety.
  • Ⅱ.To be used in reports and applications to the outsourcing clients handled by the Company.
  • Ⅲ.To be used in business operational activities (e.g., cellphone sales) as requested by the consignee.
  • Ⅳ.To be used in various company`s information and materials.

(3)Personal information of inquirer

  • Ⅰ.To be used in response and follow ups to the inquiries.
The purposes of use of personal data held by the Company are those described in (1) through (4) above.

4.Outsourcing the Handling of Personal Information

In order to provide smooth service, we may outsource part or all of the handling of acquired personal information to outside contractors. In such cases, we will limit the outsourcing to contractors that meet our specified standards for the protection and management of personal information, conclude confidentiality agreements with such contractors, and properly manage and supervise them to ensure that personal information is handled appropriately.

5.Provision of Personal Information to Third Parties

When a person is an employee, we may provide their personal information to a third party in the following cases for labor management and other tasks, except for tasks required by laws and regulations.
  • When we have obtained the prior consent of the person concerned.
  • When providing information such as name, name, age, address, telephone number, work history, and credentials to the company to which the information is to be provided by means of e-mail or paper, etc., in order to enter the company to which the information is to be provided in the course of job placement for fee-based job placement, placement dispatching, or licensing business, etc.

6.Request for Disclosure, etc. of Retained Personal Data or Third Party Records

If a person wishes to disclose their personal information (e.g., notification of purpose of use, disclosure, correction, addition, deletion, suspension of use or elimination, or suspension of provision to a third party) or to disclose records provided to a third party, they may contact our “Complaints and Consultation Desk for Personal Information”.
As soon as we confirm that the request is made by the person, we will promptly respond to the request in accordance with our procedures.
For details on requests for disclosure, etc., please fill out the “Request Form for Disclosure of Retained Personal Data,” a form prescribed by the Company, and send it by mail to the “Complaints and Consultation Desk for Personal Information” below, or send it to the following address by e-mail with the same information, including items required to be included in the “Request for Disclosure of Retained Personal Data or Third Party Records,” etc. Please send the form to the following address.
【Complaints and Consultation Desk for Personal Information】
Like Staffing Inc. Personal Information Protection Manager
TEL: 06-6364-0006 (Reception hour 9:30-18:00)
E-mail:privacy@like-st.co.jp
For detailed application procedures, please refer to “Procedures for Disclosure, etc. of Retained Personal Data or Records of Provision to a Third Party”.

7.Destruction and Return of Personal Information

In accordance with our company's regulations, we will, as a general rule, destroy personal information within the following period of time. Please note that we are not obligated to return personal information by any media, even by the person`s request.
In the event of deletion of personal information in accordance with the Company's regulations, or in the event of a request for deletion of personal information by the individual concerned: deletion period will be decided case by case
If the person does not work for us after registration: 1 year after registration
In the case of the person`s resignation after working for us: 3 years after resignation

8.Measures taken for the secure management of retained personal data

With respect to personal information (including personal information that we have obtained or are about to obtain) and personal data (including personal information that we have obtained or are about to obtain that we intend to treat as personal data), we have taken the following measures to prevent leakage, loss, or damage while ensuring appropriate management of other personal data.

(1)Formulation of Basic Policy

  • Establish a basic policy on personal information protection to ensure appropriate handling of personal data

(2)Establishment of rules for handling personal data

  • Establish rules for basic handling methods when acquiring, using, storing, etc. personal data in order to prevent leaks, etc. of personal data handled, and for other safe management of personal data

(3)Organizational security control measures

  • Ⅰ.Appointing a person responsible for the handling of personal data, clarifying the employees who handle personal data and the scope of personal data handled by such employees, and establishing a system for reporting to the person responsible in the event that the fact or indication of a violation of the law or handling rules is detected.
  • Ⅱ.Regular self-inspections of the status of personal data handling, as well as audits by other departments.

(4)Personnel security control measure

  • Ⅰ.Regular training of employees on matters to be considered in the handling of personal data
  • Ⅱ.Confidentiality of personal data is stipulated in the employment regulations

(5)Physical security control measure

  • Ⅰ.In the area where personal data is handled, control access to the office for employees and restrict the equipment, etc. that they bring in, and implement measures to prevent unauthorized persons from accessing personal data.
  • Ⅱ.In the area where personal data is handled, control the entry and exit of employees, restrict the equipment they bring in, and take measures to prevent unauthorized persons from accessing personal data.

(6)Technical security control measure

  • Ⅰ.Implementing access control to limit the scope of persons in charge and the personal information databases handled.
  • Ⅱ.Implement mechanisms to protect information systems that handle personal data from unauthorized external access and unauthorized software.

(7)Understanding the external environment

  • When outsourcing operations or providing information to a third party outside of Japan, we implement security control measures based on an understanding of the system for the protection of personal information in the relevant country.

9.Voluntary nature of personal information provision

Whether or not a person provides us with their personal information is voluntary, and the person in question does not necessarily need to fill in or answer all of the questions. However, please understand that failure to provide personal information may result in disadvantages to the individual, such as hindrance to operations related to Purposes of Use and Acquisition of Personal Information.

10.Acquisition of personal information by methods that are not easily recognizable by the individual

Cookies are used to make it more convenient for you to browse our website when you visit it again, and do not infringe on your privacy or have any adverse effect on your computer. The Company's website uses SSL (Secure Sockets Layer) data encryption for all areas where personal information is input. Furthermore, we have adopted measures such as installing firewalls to protect information within the site. However, due to the nature of Internet communications, we cannot guarantee complete security. Please understand this in advance.