Technology used

1. Recommended environment

The following browsers are recommended for the safest and most pleasant experience using this website:

  1. Microsoft Internet Explorer 11 or later
  2. Google Chrome, latest version
  3. Mozilla Firefox, latest version
  4. Safari, latest version
  5. Microsoft Edge, latest version
2. Technology used
  1. Plug-ins
    Adobe Reader (Acrobat Reader 9.0 or later) is required to view and print PDF files. Quick Time or Microsoft Windows Media Player is required to view video files. On some pages, the latest versions of the above software will be required.
  2. Cookies
    This website utilizes cookies for the purpose of achieving a more convenient viewing experience and continuously improving this website. A cookie is data sent to a user’s browser from the server that handles administration of this website. The cookie sent is saved in the user’s computer. However, information such as the user’s name, address, phone number, and other information that identifies the user are absolutely not included in this cookie. Additionally, these cookies have no direct negative effect on the user’s computer. This website may use cookies provided by a third-party contractor to assess the access information of this website. It is possible for the user to decline cookies through the use of appropriate browser settings. Disabling cookies in this way will not hinder the use of this website in any major way. Refer to your browser’s help files or browser manufacturer for information on these browser settings.
  3. JavaScript
    Portions of this website use JavaScript to achieve a more comfortable user experience. Failure to activate JavaScript in your browser may result in an inability to properly view or use this website.
  4. TLS
    This website uses TLS encryption on a portion of its services to improve its security level. To use the relevant services, a browser that supports TLS1.2 encryption is required. The use of such a browser will automatically encrypt data that the user inputs, sends, and receives, such as the user’s name, address, phone number, and other personal information. In the unlikely event that any transmission of this data is intercepted by a third party, there is no fear that the transmission’s contents will be stolen. Additionally, the use of a firewall may prevent some users from accessing this website.
  5. PDF
    The Adobe Reader from Adobe Systems Incorporated is required to view files in the PDF file format. Download the latest version of Adobe Reader if it is not installed on your system or the contents of this website are displayed incorrectly.
  6. FLASH
    The Adobe Flash Player from Adobe Systems Incorporated is required to view contents that use FLASH. Download the latest version of the Adobe Flash Player if it is not installed on your system or the contents of this website are displayed incorrectly.
  7. Twitter
    Refer to the Twitter website for an explanation of its terms of use.
  8. Facebook
    Refer to the Facebook website for an explanation of its terms of use.
  9. YouTube
    Refer to the YouTube website for an explanation of its terms of use.
  10. LinkedIn
    Refer to the LinkedIn website for an explanation of its terms of use.
3. Information system security

This website will protect its information assets from threats, for the purpose of preserving the trust of its users and fulfilling its social mission.

  1. As a means of maintaining the safety and accuracy of this site’s information assets, appropriate safety measures have been taken to prevent improper data access, and the destruction, alteration, loss, and leakage of this data.
  2. The information assets on this site are handled in strict accordance with the organization’s basic policy on information security, laws, ordinances, and other standards.
  3. Should the processing of information assets be entrusted to an external party, this processing work will take place under the appropriate supervision of the organization.
  4. Mechanisms will be established for the continued improvement of this information security policy, one of the aims of this website.


1. Disclaimer

There is no guarantee of the completeness or accuracy of any information provided on this website.

This information may be changed without notice or warning.

The administrators and owners of this website accept absolutely no responsibility for any damage that may occur directly or indirectly due to the use of the information or content on this website.

2. Prohibitions

The following activities are prohibited in the use of this website:

  1. Any activity that hinders or creates obstructions to the operation of this website.
  2. Any activity that causes or may cause inconvenience, loss, or violations of privacy to the organization, the users of this website, or other third parties.
  3. Any activity that violates or may violate public order and morality.
  4. Any activity that violates a law, ordinance, or regulation.
  5. Any other activity deemed inappropriate by the organization.

Copyrights and Links

1. Copyrights
  1. All information (text, photographs, illustrations, etc.) on this website is subject to copyright. Additionally, the Official Website of the organization in its entirety is subject to copyright as a “compilation,” and it is therefore also protected by copyright laws.
  2. Unauthorized reproduction or re-use of the materials on this website is prohibited, although “reproduction for private use,” “quotation,” and other special exceptions are permitted under copyright law.
  3. Exceptions to the above stipulations may exist for specific content if specifically indicated.
2. Links

As a general rule, all links to this website, both commercial and noncommercial, are freely permitted.
However, links are not permitted in the event that any of the following applies or may possibly apply to the link or the linking site:

  1. Links of a libelous or defamatory nature, or that intentionally damage the reputation or credibility of the organization, private companies, groups, organizations, or individuals.
  2. Links that infringe or that may infringe trademarks, copyrights, other intellectual property rights, assets, rights to privacy, rights to the usage of one’s likeness, or other rights owned by the organization, private companies, groups, organizations, or individuals.
  3. Links that place the website within a frame or otherwise can cause misunderstandings among third-party visitors by rendering the contents in such a way that it is unclear that the contents belong to the organization.
  4. Any links aside from the above that violate or may violate any laws, rules, regulations, public order and morality, or that obstruct or may obstruct the administration of this website.
  5. Links that make unauthorized use of logos, marks, etc. owned by the organization.
  6. Links of a form that misrepresents the source of information.

The URL of this website may be changed without prior notice. Please understand this prior to using the website. The organization shall accept no responsibility for compensation, claims, or complaints pertaining to any links.

We use our own and third-party cookies to improve your experience and our services, by analysing browsing on our website.
By continuing to browse, we understand that you accept our use of them. To find out more about the cookies we use (and to see how to disable them), visit our cookie policy.