MODE Recomandari

download MODE Recomandari

of 8

Transcript of MODE Recomandari

  • 8/14/2019 MODE Recomandari

    1/8

    FAST RETAILING CO., LTD. (the Company) is acutely aware of the importance of personal information protection. We

    strive to protect the privacy of our customers through the appropriate management of personal customer information, and

    a strict adherence to "The Act on the Protection of Personal Information" and our own privacy policy.

    The definition of personal information

    Personal information is information that can be used to identify any one customer such as his/her name, address,

    telephone number, etc. This also includes information that can be used to distinguish a person by combining it

    with other information and matching it to an individual.

    The acquisition of personal information

    On asking customers to provide personal information, the Company will always inform the customer of the

    specific purpose for which any personal information is to be used and, in addition, will also inform the customer

    of any third party with which the personal information may also be shared. Personal information will only be

    acquired from the customer upon agreement and understanding of the above criteria.

    The use of personal information

    The Company uses customers personal information for the following purposes:

    (1) To respond to customer queries

    (2) To provide the Companys products and services

    (3) To inform about details regarding products and services

    (4) To improve product development and other services

    (5) To share with third parties under the conditions outlined in item 4.

    In the event that the Company is required to use personal information for any other purpose other than those listed

    above, the Company will first obtain the agreement of the customer before any such usage is sanctioned.

    Sharing personal information with third parties

    With the exception of the two circumstances listed below, the Company will not disclose personal information to

    a third party without the customers consent.

    (1) If required by law

    (2) In case any part of operation dealing with personal information acquisition beingsub-contracted to a third party (including group companies).

    In any such instance, the Company would take extreme care in selecting the party to which information was to be

    provided or transferred, and would enter into a binding contract with such party regarding the appropriate

    handling of personal information. The Company would aim to prevent the leakage, loss or falsification of

    personal information and would commit to supervise or instruct the new party as deemed necessary.

    The management of personal information

    The Company undertakes to manage appropriately all personal information gathered from customers. The

    Company strives to prevent any information leakage, loss or incorrect recording of content. In its effort to prevent

    unlawful access, the leakage, loss or falsification of personal information, the Company undertakes to install a

    personal information management body to maintain and improve management systems and organization structure.

    The Company also undertakes to maintain an information security system to ensure the safety of personal

    information.

    The Companys group company education and management system

    The Company has compiled and established guidelines regarding the handling of personal information and these

    guidelines are consistently implemented through personnel training.

    Customer enquiries regarding personal information

    The Company will respond swiftly to customer requests regarding the disclosure, amendment or cessation ofusage of personal information. However, the Company will insist on confirming the customers identity through

    appropriate means in order to prevent any leakage of information through an unauthorized demand for disclosure.

  • 8/14/2019 MODE Recomandari

    2/8

    Customer Enquiries Desk

    You can also contact us via email to the contact address for any questions on this Company's website.

    Revisions

    The Company reserves the right to revise the above policy at any time without notice.

    The use of cookies

    The technology to record and manage the activities of visitors to a website onto computer (hard drive) is called

    Cookies.Some pages on the Companys website use cookies in order to make it easier for customers to use the website. If

    the settings determining the use of cookies are changed on the browser to prevent cookie usage, then the customer

    may not be able to access some or all of the services such as online product purchases, etc. The Company does

    use cookies for independent investigation of customer website usage with the aim of improving the website itself.

    About Personal Information Protection

    (Privacy Policy and Summary)

    Enacted on April 1, 2005Revised on April 1, 2009Takashi KawamuraPresident and Representative Executive OfficerHitachi, Ltd.

    1. Background of Personal Information Protection Policy of Hitachi, Ltd.Hitachi, Ltd. (hereinafter referred to as "Hitachi") handles various information, including our technical information and

    information provided by customers, as a global supplier who can provide total solution. With this in mind, Hitachi hasstrived to establish and fully enforce an information management system in order to respect the value of the said

    information.

    Considering such background, Hitachi will attempt to create rules and establish a management system for the personal

    information protection in Hitachi, as well as to set a privacy policy and spread it among board members and employees.

    Moreover, Hitachi will take measures to make the privacy policy easily accessible to general public.

    Hitachi will strive to protect personal information appropriately based on this policy.

    2. Hitachi Personal Information Protection Policy1. Establish rules for managing personal information protection and make continual improvements

    Hitachi will make sure that executive staff and workers recognize the importance of personal information protection,

    and will establish rules for personal information management to appropriately use and protect personal information

    and ensure that the management system is put in execution. These rules will be maintained and improved continually.

    2. Collect, use and provide personal information and forbid the use of such information for purposes other than the

    original intent

    While carefully considering the personal information is entrusted to us in our company activities, Hitachi will handle

    such information appropriately by establishing a management system for personal information protection for each

    type of business, and also by following our rules for collecting, using or providing personal information. In addition,

    Hitachi will not use such information for purposes other than the original intent and will implement appropriate

    measures for it.

    3. Implement safety measures and correct problems

    To ensure the correctness and safety of personal information, in accordance with the rules for information security,

    Hitachi will implement various measures such as managing access to personal information, restricting the means for

    transporting personal information outside the company and preventing incorrect access from outside the company,

    and strive to prevent the leakage, loss or destruction of personal information. In addition, when any problems

    regarding safety measures are found, Hitachi will identify the cause to take corrective measures.

    4. Follow laws and norms

    Hitachi will follow the Japanese laws, guidelines and other norms for the handling of personal information. Also,

    Hitachi will conform our rules with personal information management to such laws, guidelines and other norms.

    5. Respect a person's rights regarding his or her personal information

  • 8/14/2019 MODE Recomandari

    3/8

  • 8/14/2019 MODE Recomandari

    4/8

    We shall perform accounting procedures strictly, following the appropriate internal checking system. We shall review

    the adequacy and effectiveness of the system and revise it as necessary. When revising the system, we shall follow the

    appropriate and required procedures.

    We shall earnestly facilitate and assist audits by our corporate auditors and accountants, tax examinations, and other

    business audits and inspections so as to support accurate financial statements and a proper audit and inspection. In the

    event that a public agency investigates or inspects our business records due to suspicion of a violation of the law, we shall

    cooperate with such agencies for swift clarification of the truth.

    We shall faithfully exercise our individual authorities, and not make decisions that are beyond our respective authority.

    We shall submit reports as designated without delay.

    (3) We shall carefully manage the company's confidential information, intellectual property, and tangible and

    intangible assets. We shall respect and shall not unlawfully or improperly obtain or use confidential information,

    personal information or the intellectual property of others.

    We shall secure and protect the results of our R&D and technologies as intellectual property, and shall efficiently utilize

    and exercise all rights associated therewith.

    All intellectual property and other rights of invention, designs and literary works developed or acquired as a result of our

    work belong to the company. We shall strive to treat these rights appropriately, and ensure that such rights are not used

    unlawfully by others.

    We shall prevent the leaking of confidential information and in particular we shall prevent such leaking due to careless

    management. We shall be careful not to discuss the company's confidential information with or permit it to be disclosed to

    unauthorized persons, taking particular care in places where a third party is present, for example, outside on cellular

    phones, in transportation facilities or in restaurants. To prevent viruses and hackers from getting into our computer

    system, we shall implement regular virus checks and manage passwords.

    No employee or former employee of the company shall leak confidential information concerning the company, either

    during or following his employment.

    Any confidential information that belongs to others shall be obtained from its proper owners or from other legitimate

    sources in a lawful and appropriate way, and we shall maintain accurate and specific records of receipt. We shall use such

    confidential information in compliance with agreements and usage conditions to protect confidentiality. In particular,

    information sourced from the internet, newspapers, magazines, and business documents shall be treated carefully so as not

    to commit wrongful acts such as plagiarism, piracy, or violation of copyrights due to the unauthorized usage of

    photographs of models or other personalities for advertising. We shall refrain entirely from the illegal copying of

    computer software.

    We shall adopt policies in compliance with relevant laws, regulations and guidelines to thoroughly control protected

    personal information.

    We shall efficiently utilize the company's various assets both tangible and intangible, and we shall properly maintain

    and control such assets so that they can be utilized in business activities whenever necessary. We shall endeavor to

    prevent loss, theft, or illegal use of our assets.

    We shall not use the company's assets (i.e. equipment, facilities, vehicles, samples, products, computer systems,

    software, etc.) for any purpose other than for business related activities or such other activities as may be authorized by

    our supervisors. We shall handle these assets in accordance with internal rules. In particular, communication andcorrespondence via the Internet or via other company communication systems shall be limited to proper business related

    purposes, and shall not to any substantial extent be for personal use.

  • 8/14/2019 MODE Recomandari

    5/8

    Without permission from our supervisors, we shall not bring to or keep at the company, any personal belongings other

    than those that are necessary for our duties. We shall not mix our personal belongings with the company's assets, nor

    engage in any conduct which undermines safety.

    I wrote recently about how smartphone device loyalty will trump standardization in the enterprise. A number of

    TechRepublic members such as Palmetto wrote that users in their organizations are forbidden by company policy from

    bringing in privately owned laptops and smartphones. In fact, TechRepublic membertravis.duffy declared, No matter

    how loyal someone is to their iPhone they are not going to be connecting them to his company network.

    On the flip side of the coin, we have TechRepublic memberbharman, who pointed out that regardless of company

    restrictions, savvy users will find ways to circumvent the rules. The comment by bharman underscored the position I was

    trying to put across that the bottom-line reality in many organizations might not match up to company policiesspecifying the devices that employees can or cannot bring to the office.

    The entire discussion thread did get me thinking a little further, specifically to the risks when ones e-mail account is

    inadvertently or maliciously exposed. While it is conceivable for IT departments to lock down access at every nook and

    cranny, the truth is not every organization will have the resources or expertise to do so.

    Today, I attempt to highlight some possible avenues that might result in the inadvertent leaking of sensitive e-mails.

    Avenues for e-mail leakage

    One common scenario would be IT-savvy employees linking up their personal laptops to their companys Exchange

    Server. Obviously, these additional workstations represent additional points of vulnerability, especially so if they are used

    outside the company premises. While it is possible to disable or block HTTP access to forcibly divert the access of e-mails

    to the LAN, this is hardly a practical solution against the backdrop of an increasingly mobile workforce. In this context,

    the use of VPN does not protect against the risk of e-mail leakage.

    For organizations on Microsoft Exchange, it is trivial to enable Exchange ActiveSync to allow mobile devices such asWindows Mobile smartphones to access corporate mailboxes. However, this also opens the door to devices such as the

    Apple iPhone or iPod Touch, as well as other mobile phones that implement the Microsoft ActiveSync protocol.

    Organizations concerned about the security of such devices can, of course, disable such access from Exchange. However,

    Exchange push mail represents the most affordable option for many SMBs; they will be hard-pressed to pay for the steep

    licensing fees to implement a secure BlackBerry Enterprise Server with RIM BlackBerry solution.

    IMAP is a popular choice used by many organizations to access server-side e-mail without having to buy into Microsoft

    Exchange or other costly enterprise e-mail systems. Most smartphones and mobile devices now have built-in capability to

    access IMAP services natively, leading to additional points of vulnerability from lost or misplaced phones that might

    contain cached e-mails or even passwords.

    Organizations that use Microsoft Outlook should also be aware that it is trivial to sync e-mails and contact lists directly

    from Outlook using tools that are widely available on the market. While the information is static and limited to what was

    transferred in the last sync, it does not detract from the danger that the loss of the device represents.Other avenues where e-mails might leak would be via the use of POP access. It is not uncommon for some users to opt for

    Save a Copy of E-mail on Server on their e-mail client so that they can download the same e-mails onto a different

    machine or laptop. In addition, any forwarding rules will only create additional copies of corporate correspondence that

    can be lost or compromised.

    Conclusion

    There is no doubt that none of the points of vulnerability above represents insurmountable obstacles to a diligent and

    skilled network administrator. I hope I am wrong, but it is a little hard for me to imagine many smaller organizations that

    would bother to address all the areas highlighted above

    Memo Writing Notes

    Memos are used within organizations to communicate everything from routine details to complete proposals and reports.

    Memos are often only a few short paragraphs, but they can be much longer, depending on their purpose. Here are some

    typical uses of memos:

    to inform others about new or changed policy, procedures, organizational details

    to announce meetings, events, changes

    to present decisions, directives, proposals, briefings

    to transmit documents (internal)

    Memo Format

  • 8/14/2019 MODE Recomandari

    6/8

    Company and/or department name (without address)

    Heading

    To (who gets it)

    From (who sent it)

    Subject (what its about)

    Date (when it was sent)

    Body (conveys message)

    Introduction

    Main points

    Close

    Memo Style

    Concise: Make your sentences, paragraph, and overall memo as brief and as focused as possible.

    Clear: Get your purpose straight before you start, then plan what you want to say and in what order. Use your

    memo layout to help your reader (headings, bulleted lists, white space, as appropriate).

    Direct: Speak directly to your reader, as you would in person or on the phone. Do not pad your ideas withunnecessary details. Think of what questions your reader wants answered, and then answer them.

    Clean: Reread, revise, copyedit, and proofread.

    Memo Structure

    Subject Line: Summarizes the main idea; think of it as being preceded by the words "This memo is about."

    Introductory paragraph: Quickly orients the reader to what the memo is about.

    Give your purpose for writing.

    Supply any relevant background information.

    Identify any task the memo is related to.

    Body: Conveys the information and supporting details relevant to the memo's purpose

    Keep paragraphs short and focused; one main idea per paragraph.

    Keep sentences tight and informative

    Use bullets to list information

    Close: End courteously (think of a phone call or face-to-face meeting), stating any expected outcome, action, or other

    information appropriate to your purpose. For example,

    Please send me your comments and suggestions by January 16.

    "Let's meet next week to go over the next stage in the plan."

    To:

    From:

    Subject:

    Dr. Mary Kasarda

    Jess UnderwoodJU

    Correcting the Unbalance of the Demonstration Test Rig

    Summary and Introduction

    Recently, you informed me that an unbalance in our demonstration test rig was causing it

    to experience high levels of vibration at the first critical speed. Because the test rig is to be

  • 8/14/2019 MODE Recomandari

    7/8

  • 8/14/2019 MODE Recomandari

    8/8

    XYZ Company needs to focus advertising on internet sites that appeal to young people. According to surveys,

    72% of our target market uses the internet for five hours or more per week. The following list shows in order of

    popularity the most frequented sites:

    Google

    Facebook

    Myspace

    EBay

    iTunes

    Shifting our efforts from our other media sources such as radio and magazine to these popular internet sites will

    more effectively promote our product sales. Young adults are spending more and more time on the internet

    downloading music, communicating and researching for homework and less and less time reading paper

    magazines and listening to the radio. As the trend for cultural icons to go digital, so must our marketing plans.

    Television Advertising

    It used to be common to advertise for our products on shows likeFriends and Seinfeldfor our target audience,

    but even the face of television is changing. Young adults are tuning into reality television shows for their

    entertainment. Results from the focus group show that our target audience is most interested in shows like

    American Idol,The Apprentice, andAmerica's Next Top Model. The only non-reality television show to be

    ranked in the top ten most commonly watched shows by males and females 18-25 isDesperate Housewives. AtBlue Incorporated, we need to focus our advertising budget on reality television shows and reduce the amount

    of advertising spent on other programs.

    By refocusing our advertising efforts of our new line of clothing we will be able to maximize the exposure ofour product to our target market and therefore increase our sales. Tapping into the trends of young adults will

    help us gain market share and sales through effective advertising.

    Attachments: Focus Group Results, January- May 2007; Survey Findings, January - April 2007