Privacy Policy

This website is administered by the Media Department at Teikyo University (hereinafter referred to as the website administrator). By using this website you acknowledge that you have read and agreed to the terms and conditions outlined below. Terms and conditions are subject to change without notice.

Privacy policy at Teikyo University

Under the Act on Protection of Personal Information, effective April 1, 2005, Teikyo University (hereinafter referred to as the University) has a social obligation to implement appropriate protections for individual rights and interests with respect to the management of personal information. The University's privacy policy, stated as below, stipulates privacy protections and is circulated to all teaching staff and associated personnel.

  1. 1. Collection, utilization and provision of personal information
    The collection, utilization and provision of personal information is governed by the University privacy regulations in accordance with internal privacy procedures.
  2. 2. Security of personal information
    The University makes every effort to prevent security breaches involving personal information, including unauthorized access, tampering, loss and destruction of data. In the event of a breach or suspected breach, the affected person or persons are notified immediately and immediate action is taken to rectify the situation.
  3. 3. Holder's right to access, amend or bar the use of personal information
    The holder of personal information reserves the right to request to view, amend or bar the use of their personal information and all such requests must be responded to appropriately.
  4. 4. Privacy laws, regulations and conventions
    The University is committed to complying with all relevant laws, regulations and conventions pertaining to personal information.
  5. 5. Education and continuous improvement
    The University strives to ensure the relevance and efficacy of internal privacy procedures, to provide teaching staff with appropriate training on privacy issues and procedures, and to pursue continuous improvement of internal regulations through an ongoing review and revision process.
  6. 6. Disclosure of personal information
    Provisions pertaining to the disclosure of personal information are stipulated separately.
  7. 7. Inquiries
    Details of the Privacy Policy and how personal information is used at the University are posted on campus noticeboards and are also available on the this website. Any inquires in relation to personal information should be directed to the Privacy Protection Office as follows:

    Privacy Protection Office
    Administration Section
    Teikyo University
    Email: h-soumu@teikyo-u.ac.jp

March 31, 2005
Yoshihito Okinaga
Chairman and President
Teikyo University

Limitations on use of personal information

The University collects personal information in response to inquiries, suggestions and requests for materials or documents, for the purpose of contacting the original applicant and/or providing the requested materials. Such information may also be collated by the University, after being stripped of identifying information, for the purpose of ongoing evaluation of administrative operations. Where personal information has been provided in relation to a specific service, the information will be used only in connection with the specified service. The University will never divulge or supply personal information to a third party or use personal information for any other purpose other than those defined herein without the consent of the rightful owner. Note that the University may, in certain situations, provide personal data to subcontractors, on the proviso that usage is limited to the purposes defined herein.

Specific uses of personal information at Teikyo University

  • Kindergarten and school students
    Teaching and administration duties and general student welfare
  • University students
    Teaching and administration duties as student health and welfare, and educational and career guidance
  • Students attending lectures
    Providing notifications of course details and payment reminders as well as other administration procedures
  • Parents, guardians and guarantors
    Providing notifications of academic results statements and payment reminders as well as Parents' Association business
  • Graduates and alumni
    Verifying graduation status, academic results and enrollment details
  • Applicants
    Providing application guides and details of entrance examinations
  • Patients
    Administrative procedures related to the delivery of health care services
  • Clients/consumers
    Administrative procedures related to profit-making activities
  • Requests for materials and/or documents
    Sending materials and/or documents, event notifications and invoices (where payment is required)
  • Teaching staff (including full-time, part-time, casual and agency instructors)
    Organizational and administrative duties including personnel, salary payment, hiring and employment procedures, health and welfare, health insurance and finance management
  • Suppliers, contractors, outsourcing companies and affiliates
    Delivery notifications, invoicing and other administration procedures

1. If you do not consent to the use of your personal information as outlined above, contact the relevant officer.
2. Your consent is implied unless we hear from you otherwise.
3. You have the right to withdraw or modify your consent at any time.

Access log

This web page contains an access log that stores limited details of visits including domain name, IP address, browser type and time and date of access. The access log is used solely for website maintenance and administration and general analysis of website usage. It does not contain or store personal identifying information in any form.

Basic principles of data security at Teikyo University

Advances in computing and networking technology in recent years have had a profound impact on the delivery of education, research and health care services at the University, while also promoting more efficient and user-friendly administrative services. At the same time, the advent of such technology has raised genuine concerns about information security, in particular the illegal destruction of data by internal and external parties, unauthorized access to data, and security of information that can be used to identify a person or persons (hereinafter referred to as personal information).

The University holds personal information on teaching staff and students as well as sensitive operational material, and a security breach could have devastating consequences. Information security management is a systematic and continuous process for ensuring appropriate protection of all forms of information held by the University (including personal information and important operational information) and of systems used for the storage, manipulation and transmission of such information, collectively referred to as information assets.

Information security management ensures that important information is properly managed and protected in accordance with the Basic Principles of Information Security shown below.

Basic Principles of Information Security

  1. 1. Information security procedures
    Information security procedures are designed to ensure compliance with laws, regulations and conventions pertaining to information security in relation to all information assets held by the University and in turn preserve the good reputation of the University in wider society.
  2. 2. Information security regulations
    Information security regulations and associated principles and processes are designed to ensure appropriate protection for all information assets held by the University.
  3. 3. Information security strategies
    Information security strategies are designed to prevent unauthorized access, disclosure, tampering, loss, destruction and/or interference for use of information assets held by the University.
  4. 4. Compliance with laws and regulations
    The University is committed to compliance with all laws and regulations pertaining to information security as well as social conventions and internal regulations in relation to information assets held by the University.
  5. 5. Continuous improvement
    The University will review, evaluate and modify as appropriate the above procedures and processes on an ongoing basis.

March 31, 2005
Yoshihito Okinaga
Chairman and President
Teikyo University

  • Home
  •  > Privacy Policy