-
SKYCIRCUS-WI-FI-JW
Notes Concerning Internet Use -
Customers who access the Internet with the Japan Connected-free Wi-Fi are asked to note the following.
Wi-Fi can only be used with certified terminals that meet the technical regulations conformity certification of Japan. Please do not use a terminal that is not subject to this certificate, such as a terminal which brought in from outside of Japan. For details, please visit the link below.
http://www.tele.soumu.go.jp/e/adm/monitoring/illegal/monitoring_qa/
We will not be responsible for any loss or damage whatsoever caused through provision of this service.
Access may be suspended for reasons owing to unavoidable circumstances such as maintenance or construction of telecommunications equipment, reasons involving subscribers to Access Points, or other significant obstacles to normal business operations.
The following acts are prohibited.
(1) Acts that infringe or may infringe upon the copyright, trademarks, or other intellectual property rights of others.
(2) Acts that infringe or may infringe on the property, privacy, or likeness and image rights of others.
(3) Acts that unjustly discriminate against, slander, or insult others, or acts that promote unjust discrimination toward and damage the honor or credibility of others.
(4) Acts that lead to or are highly likely to lead to fraud, child prostitution, illegal sales of savings accounts or mobile phones, or other crimes.
(5) Acts of transmission or display of images, video, audio, or text materials that constitute obscenity, child pornography, or child abuse. Furthermore, acts of selling, or the transmission or display of advertising for the sale of recorded media that contain such materials.
(6) Acts of advertising that lead to or are highly likely to lead to drug-related crimes or misuse of controlled substances, or acts of advertising for unapproved medical products.
(7) Acts of advertising for the lending of money without obtaining a registration for operating a money lending business.
(8) Acts of establishment of or invitation to join a pyramid scheme.
(9) Acts of improper overwriting or deletion of information stored on the equipment of others.
(10) Acts of use of this service while impersonating others.
(11) Acts of transmission or publication of a virus or other harmful computer program.
(12) Acts of sending advertising, promotional, or solicitation e-mail to others without permission, or acts of sending e-mail that may be distasteful to others under normal social conventions.
(13) Acts that cause or are likely to cause hindrance to the use or operation of the equipment or internet service facilities of others.
(14) Acts of illegal gambling or solicitation for participation in illegal gambling.
(15) Acts of contracting for, mediation in, or invitation to illegal acts (including requests to others). (This includes transfer of guns and other weapons, improper manufacturing of explosives, provision of child pornography, forgery of official documents, murder, terrorism, and other acts. This applies to all items below.)
(16) Acts of transmitting information of brutality such as images of the scene of a murder, images of killing of or cruelty toward animals, or other information that is extremely distasteful to others under normal social conventions.
(17) Acts of transmitting information involving sexual expression, violent expression, matchmaking websites, or any other information that inhibits the proper growth of children.
(18) Acts that entice or persuade a person to commit suicide, or acts of introducing methods for suicide that would harm or are highly likely to harm a third party.
(19) Acts of posting links to signs or codes that correspond to anything mentioned in previous items.
(20) Acts of aiding others in posting or otherwise distributing information that leads to or is highly likely to lead to crimes or illegal acts, or information that unjustly slanders, insults, or violates the privacy of others.
(21) Acts of collecting personal information from individuals without their knowledge or consent.
(22) Acts of obtaining personal information from insecure lines, servers or other environments.
(23) Any other acts that violate public order and morals or infringe upon the rights of others.
(24) In the event that any act corresponding to the prohibited acts listed above is committed, the user registration of the Japan Connected-free Wi-Fi may be revoked.
Because this is a Wi-Fi connection, please be aware that a third party with malicious intent may intentionally intercept the signal and see your ID, password, credit card number and other personal information, or read the content of your e-mail or other transmissions.
To prevent falsification of information or impersonation by a third party, please adjust your security settings (encryption of transmissions, etc.).
The Wi-Fi connection and data transmission services are available within the range covered by the signal from Access Point Wi-Fi router.
The range covered by the signal and the signal strength may vary depending on your usage environment.
You may be unable to connect to Wi-Fi, or your connection speed or other factors may decline, if there is a shield between Access Point Wi-Fi router and your connecting device that prevents the signal from passing, if you are in a location with a strong magnetic field, static electricity, or radio wave interference, or if there is another radio frequency range identical to that of Access Point Wi-Fi router in the same transmission area.
We gather the connection time period, IP address, details on individual identification information (MAC address), and authentication ID (hereunder "access" data) in each device connected to a wireless LAN device installed in a facility, and keep this data for up to two months after the month a connection is made.
However, access data of this device is gathered only on the dates and times of authentication related to Internet (SKYCIRCUS-WI-FI-JW) access.
?The connection status information gathered via wireless LAN devices installed in facilities is applied to our telecommunications services within the range of the purposes below.
1.Operations concerning after-sales services
2.Operations concerning the evaluating/improving of services and the developing of new services, and operations concerning facilities related to the provision of services, the developing of devices and software, administration, and management
3.Operations concerning research and responses to troubles in services, system failures, and accidents related to services
4.Consulting for facilities, etc. that have installed this device
We provide connection status information that we have gathered to third parties within the scope of consent from our customers and stipulations of the law.
Access status information that has been provided is safely and immediately discarded and deleted after the purpose of its provision is achieved. Furthermore, it is provided as statistical data that cannot be identified as an individual within the scope of consent from our customers.
Provision to a third party under stipulations of the law is covered by the items below.
When it is based on laws and regulations
When it is necessary for the protection of one's life, body, or property, and when it is difficult to obtain consent from the individual.
When it is particularly necessary for improving public hygiene or promoting the sound growth of children and when it is difficult to obtain consent from the individual.
When it is necessary for cooperating with a national institution, local government, or an entrusted individual or business for the executing of affairs stipulated by laws and regulations and when obtaining consent from the individual is likely to impede the execution of the affairs concerned.