What personal information do we collect from the people that visit our online sites, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number, vehicle info or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
- To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
- To improve our website in order to better serve you.
- To allow us to better service you in responding to your customer service requests.
- To administer a contest, promotion, survey or other site feature.
How do we protect visitor information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn the correct way to modify your cookies.
If users disable cookies in their browser:
If you disable cookies (off), some features will be disabled. It will turn off some of the features that make your site experience more efficient and some of our services will not function properly.
However, you can still place orders.
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
Third party links
We do not include or offer third party products or services on our website.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.
We have not enabled Google Ads on our site, but we may do so in the future.
California Online Privacy Protection Act
According to CalOPPA we agree to the following:
- Users can visit our site anonymously
Users are able to change their personal information:
- By logging in to their account
How does our site handle do not track signals?
We don’t honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
We don’t honor them because:
- Site requires cookies
Does our site allow third party behavioral tracking?
It’s also important to note that we do not allow third party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices, we will take the following responsive action should a data breach occur:
We will notify the users via email
- Within 7 business days
We will notify the users via in site notification
- Within 7 business days
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
Commitment to Information Security
We regard all our own information assets as one of our management resources. Through the proper protection and effective use of our information assets, we pursue healthy maintenance and development of our business.
Information Security Guiding Principles
- We establish rules that clearly define the system and responsibilities for the protection and management of all the information assets including the information we keep for our customers, the know-how and intellectual properties owned by our group, and personal information.
- We comply with laws, ordinances, and regulations regarding information security.
- We educate all executives and employees who handle information assets about the importance of information security, and about specific items to be observed.
- We continuously update the information infrastructure for the maintenance and improvement of the confidentiality, integrity, and availability of all the information assets.
- We promote measures to prevent incidents to address the risks of information leakage associated with the continuous advancement and sophistication of information technology. Should an incident occur, we will strive to minimize the damage and take preventive measures against recurrence.
An information security management team has been established to support the continual improvement and monitor the effectiveness of our information security management and to support the reduction of security risks regarding information assets through the concerted effort of the management team and on-site workers. We will continue to foster appropriate measures by checking how information security activities are conducted across the company.
We are continuously implementing measures to deal with the types of information security risks that pose a threat to companies and other organizations. In response to the recent increase of damage caused by cyberattacks, we utilize a Computer Security Incident Response Team (CSIRT) to identify and respond to cybersecurity incidents.
Protection of Personal Information
The NGK SPARK PLUG Group has set a range of internal rules to appropriately protect, manage and handle the personal information of its customers and employees.