This Website https://www.jice.org/en/ (hereinafter referred to as "the Website") is designed to introduce our activities to a broader clients and public viewers. Please note that by visiting or interacting with the Website you signify your unequivocal consent to this Policy described below.
Collection of data from the access log files
Approval of link posting request
If you wish to seek approval to post a link to the Website, please send an email to firstname.lastname@example.org providing necessary information such as the web address of the link source and the purpose. It is our policy to reject linking to the following websites that:
- Contains slander, calumny or defamatory expression and information regarding JICE and other third party organizations or individuals.
- May result in the infringement of copyright, trade mark right, right of portrait or privacy.
- Contains anti-social elements.
- Contains illegal elements or those against public order and morals, or otherwise
- Is deemed inappropriate.
The copyright in the Website and the materials on the Website including but not limited to the text, photographs, Illustration, logo, and audio-visual materials is owned either by JICE or the third party. Unauthorized use or reproduction thereof is not permitted unless private use exception applies under the relevant law.
While we endeavor to keep the information contained in the Website up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the data, information, and other materials contained on the Website. Any reliance you place on such information is therefore strictly at your own risk. We will not be liable for any loss or damages resulting from using or not using the Website.
Please also note that the whole or a part of the information posted on the Websites may be subject to change without notice.
JICE commits ourselves to properly handle and protect personal information through the establishment of rules and a system compliant with the JISQ 15001 (personal information protection management standard) requirements to deploy the most secure system for that purpose. For further details, please refer to the Policy for Personal Information Protection.