Company name( mandatory
Industrymandatory)

Department and title
Your namemandatory)
Email addressmandatory)

※Please enter your email address again for confirmation.

Address
Postal Code
Country (mandatory
State / Province / Region (mandatory
City
Address and building name
Phone numbermandatory)
Product(s) you've purchasedmandatory)

Serial Number(s)mandatory)
METAVISION™ version
Fields of applicationmandatory)

Purpose of using the source filemandatory)

Terms and Conditions
  • Please use the source file on your own responsibility.
  • We do not provide warranty, analysis, or support for any problems that may occur in your system as a result of using the source files. We also assume no responsibility for any malfunctions or damages.
  • We assume no responsibility for any possible effects on your system, software, data, or peripherals that may be caused by the use of the plug-in files during or after compilation.
  • The source files must be managed by the applicant. Provision or sharing of source files to third parties, including within the company, is prohibited.
  • The information you provide in this form may be used to inform you about information about our company, our products and services.

 


Personal Information Protection Policy

CenturyArks Co., Ltd(hereinafter referred to as "the Company") recognizes that it is a very important responsibility for the Company to properly handle and protect all personal information obtained and handled in the course of business activities, including that of customers, agents, business partners, the Company's officers, employees (including all dispatched, contracted, and temporary workers), and applicants for employment. (hereinafter referred to as "the Company") recognizes that it is a very important responsibility for the Company to properly handle and protect all personal information of customers, agents, business partners, officers, employees (including all dispatched, contracted, and temporary employees), and applicants for employment that the Company obtains and handles in the course of its business activities, and implements and maintains the following policies for the proper use and management of personal information.

1.Appropriate management of personal information

We will appoint a manager for each department that handles personal information, maintain personal information appropriately and accurately, and establish and operate appropriate information security measures to prevent loss, leakage, falsification, etc., and manage it safely.

2.Collection of Personal Information

When collecting personal information, we will comply with the relevant laws and regulations and collect the information appropriately within the scope of the person's consent.

3.Purpose of use of personal information

When using personal information, we will indicate the purpose of use at the time of acquisition of the personal information and use it appropriately within the scope of the person's consent.

4.Provision of personal information to third parties

Personal information will not be provided to third parties unless the consent of the individual has been obtained or there is a legitimate reason such as a request for disclosure based on legal procedures.

5.Provision of personal information to subcontractors

When we provide personal information to subcontractors, we will do so within the scope of the consent of the individual concerned, and we will oblige the subcontractors to strictly manage personal information by contract and supervise them appropriately.

6. Joint Use of Personal Information

We may share Personal Information with our group companies and affiliates as follows

① Purpose of use of Personal Information
 (1)To provide services to our customers about the  products, services, etc.
 (2)For different information regarding our products, services, events, etc.
 (3)For planning, development, improvement, sales, marketing activities of our products and services
 (4)To implement our  businesses related to the  each items above

② Personal Information items to be shared
 Name, age, address, postal code, telephone number, e-mail address, fax number,
 information (company, department, etc.) and also information related to businesses with us, etc.

③Companies who may use the Personal Information
 Sun-S Co.,Ltd.
 Sun-S Holdings Co.,Ltd.
 SUN-S Business Solution, Ltd.
 Gunkei Co., Ltd.
 Unix Co., Ltd.

④Person responsible for the Personal Information management for joint use
Takeshi Saito
President and Representative Director 
Centuryarks Co.,Ltd.
 13-13-1, Nishiazabu 3-chome, Minato-ku, Tokyo 106-0031

7.Complaints and consultations regarding the handling of personal information

The Company will promptly respond to complaints, inquiries, and requests for correction of personal information from the individual concerned or their representative to the extent reasonable.

8.Education and awareness of personal information

We will educate and enlighten all employees and officers based on our Personal Information Protection Policy, make them aware of the importance of protecting personal information, and ensure the appropriate handling of personal information in the course of business.

9.Continuous review and improvement of personal information

In addition to complying with the relevant laws and regulations and other standards for the protection of personal information, we will continuously review and improve our personal information protection policy and personal information management in response to amendments to such laws and regulations and changes in internal and external circumstances.

Apr 25, 2023
CenturyArks Co., Ltd
President and Representative Director Takeshi Saito

Basic Policy on Information Security

CenturyArks Co., Ltd (hereinafter referred to as "the Company") has established the following basic policy on information security and implements safe and appropriate information security measures in order to protect the Company's information assets from all threats, to respond to the trust of customers and the society surrounding customers, and to contribute to the Company's continuous and stable business operations.

1.Protection of information assets

Through appropriate human, organizational, and technical measures, we will protect our information assets by preventing unauthorized access, leakage, falsification, theft, loss, destruction, or interference with their use.

2.Compliance with laws, regulations, and contracts

"We will comply with laws and regulations related to information security, including the Personal Information Protection Law, internal regulations separately stipulated, and contracts concluded with customers.

3.Implementation of education and training

We will provide education on the importance of information security to employees and contract workers who use our information assets, and ensure that they are familiar with the relevant regulations.

4.Implementation of operation and management

In order to promote the safe and appropriate management and operation of information assets, we will assign an information security promoter to periodically review the Basic Policy on Information Security and related internal regulations, and continuously improve information security.

May 1, 2018
CenturyArks Co., Ltd
President and Representative Director Takeshi Saito