Return to Contact TOP

Reportable events

The details of each event are shown below.

Spam

Spam refers to “e-mails that receivers have not agreed to receive” or “e-mails that will continue to be sent even if they are refused.”

General features

  • E-mails intended for advertising/promotion that appear to be sent to the unspecified majority
    Example: Dating advertisement , loan advertising by non-registrants, etc.
  • Spoofed e-mails using someone else’s e-mail address to hide the sender
  • Virus e-mails sent to cause the computer to behave abnormally

Information to prepare

  • Header information
  • Body text of the received spam

Notes

  • The servers provided by our company are operated and managed by individuals and business operators that have a contract with us.
  • For this reason, we may not be able to stop e-mail delivery by us directly.
  • We only accept reports from you and do not report on the details of our support, action, etc. back to you.
  • We do not accept inquiries or provide responses over the phone.
  • Inquiries on the IP addresses that are not under our management cannot be accepted. Please consult with the relevant management company.
  • If the header information is not provided, we cannot accept the inquires as the fact cannot be confirmed.
  • If the sender’s e-mail server is located at another company and only the URL in the e-mail text is under our network, we cannot stop the e-mail delivery directly. Please consult with the sender e-mail server administrator about e-mail delivery suspension.

Our actions

  • Confirmation/investigation based on the reported information
  • Based on the information provided, we will take action such as investigation, alerting, warning, or content suspension against the contractor in accordance with our policy.

Unauthorized access

Unauthorized access is an act in which a person without proper access authority obtains access rights by unauthorized means and infiltrates the server or information system.

General features

  • Impersonation login to a net-bank or member site
  • Access to the server by someone without proper access authority
  • Suspicious port scan

Information to prepare

  • Log information determined to be unauthorized access

Notes

  • The servers provided by our company are operated and managed by individuals and business operators that have a contract with us.
  • We only accept reports from you and do not report on the details of our support, action, etc. back to you.
  • We do not accept inquiries or provide responses over the phone.
  • Inquiries on the IP addresses that are not under our management cannot be accepted. Please consult with the relevant management company.
  • If detailed dates and time, as well as log information, are not provided, we cannot accept the inquires as the fact cannot be confirmed.

Our actions

  • Confirmation/investigation based on the reported information
  • Based on the information provided, we will take action such as investigation, countermeasures, alerting, warning, or content suspension against the contractor in accordance with our policy.

Websites infected with malware/viruses

Websites infected with malware/viruses are the ones with malicious software or malicious code created to perform illegal operations intentionally.

General features

  • Trojan horse, spyware, worms, etc. are embedded.
  • A suspicious source code is embedded.

Information to prepare

  • All applicable URLs
  • Source code that identifies problem information, etc.

Notes

  • The servers provided by our company are operated and managed by individuals and business operators that have a contract with us.
  • We only accept reports from you and do not report on the details of our support, action, etc. back to you.
  • We do not accept inquiries or provide responses over the phone.
  • Inquiries on the IP addresses that are not under our management cannot be accepted. Please consult with the relevant management company.

Our actions

  • Confirmation/investigation based on the reported information
  • Based on the information provided, we will take action such as investigation, countermeasures, alerting, warning, or content suspension against the contractor in accordance with our policy.

Website tampering

Website tampering means that a website display is changed to something different from the original.

General features

  • It has been changed to a string such as Hacked By.
  • It has been rewritten with a suspicious image.

Information to prepare

  • All applicable URLs
  • Detailed description contents determined to be tampered

Notes

  • The servers provided by our company are operated and managed by individuals and business operators that have a contract with us.
  • We only accept reports from you and do not report on the details of our support, action, etc. back to you.
  • We do not accept inquiries or provide responses over the phone.
  • Inquiries on the IP addresses that are not under our management cannot be accepted. Please consult with the relevant management company.

Our actions

  • Confirmation/investigation based on the reported information
  • Based on the information provided, we will take action such as investigation, countermeasures, alerting, warning, or content suspension against the contractor in accordance with our policy.

Phishing site

A phishing site is to publish web content that masquerades as a legitimate site, and to open content for the purpose of obtaining user information through a fake site.

General features

  • The content installed to steal registration IDs and passwords
    Example: Fake of Bank official site, Online shopping page, etc.

Information to prepare

  • All applicable URLs
  • Detailed information determined to be phishing

Notes

  • The servers provided by our company are operated and managed by individuals and business operators that have a contract with us.
  • We only accept reports from you and do not report on the details of our support, action, etc. back to you.
  • We do not accept inquiries or provide responses over the phone.
  • Inquiries on the IP addresses that are not under our management cannot be accepted. Please consult with the relevant management company

Our actions

  • Confirmation/investigation based on the reported information
  • Based on the information provided, we will take action such as investigation, countermeasures, alerting, warning, or content suspension against the contractor in accordance with our policy.

Use of copyrighted works (e.g. photos, works) without permission of the copyright holder

General features

  • To post music, illustrations, designs, etc. on the web without permission of copyright holders

Information to prepare

  • URL and clear location where we can check the copyrighted work
  • Proof of authorship or copyright ownership
  • Coments which we can forward to our user for fact-checking
  • Information on the victim of infringement/claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on the provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Request to remove defamation/privacy infringement

The act of publishing content that hurts honor or personal content that the person does not want to be published

General features

  • Publishing false facts and degrading the other party
  • Publishing, without permission, personal information, letter contents, action records, etc. that the person does not want to publish

Information to prepare

  • URL where defamation or privacy information is posted and a specific location on the webpage
  • Information (name, etc.) of those who have suffered defamation or privacy infringement
  • Coments which we can forward to our user for fact-checking
  • Claimant information (name, contact information, etc.)

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on the provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Request to delete personal information

Information about a living individual that enables us to identify a specific individual or that contains a personal identification code

General features

  • Information that can be used to identify a specific individual by a combination of name, work address, home address, telephone number, etc., has been published or disclosed without permission.

Information to prepare

  • The specific location where the personal information is posted
  • Coments which we can forward to our user for fact-checking
  • Identification information/claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Infringement of portrait rights

The act of disclosing photos, etc. that can be used to identify a specific person without the permission

General features

  • The act of publishing a portrait (person’s figure, shape, image, etc.) without the permission of the person

Information to prepare

  • The specific location where portrait information is posted
  • Information of those who have been suffering infringement on portrait rights
  • Coments which we can forward to our user for fact-checking
  • Claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Trademark infringement

Unauthorized use of registered trademarks

General features

  • The act of using a registered trademark without permission by a person who is not a trademark owner

Information to prepare

  • The specific location where trademark information is posted
  • Proof information such as trademark numbers
  • Coments which we can forward to our user for fact-checking
  • Claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Illegal activity

The act of violating or conflicting with laws and regulations other than the other Reportable events on this site

General features

  • Child pornography
  • Gambling
  • Revenge pornography

Information to prepare

  • Specific URL information and locations where illegal activities can be confirmed
  • Other information necessary to specify the information (IP address, etc.)
  • Reasons/foundations for determining the illegal or wrongful act
  • Coments which we can forward to our user for fact-checking
  • Claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on the provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Nuisance

Although it does not fall under a rights infringement, etc., when deletion of the posted information is requested or when the posted information is causing a damage

Information to prepare

  • Specific URL information and location where we can confirm nuisance
  • Other information necessary to specify the information (IP address, etc.)
  • Reasons/foundations for determining nuisance
  • Coments which we can forward to our user for fact-checking
  • Claimant information

Notes

  • If the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures directly on the target information.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

Others

Complaints that do not fall under any of the above items

Please report any complaints related to our service to this contact with the following information.

  • A detailed explanation of the problem and the content of the complaint
  • Information indicating that our service is involved
  • Specific response results desired
  • Coments which we can forward to our user for fact-checking
  • Claimant information

Notes

  • As for other complaints, if the target server administrator or publisher information is clearly known, or if contact information is posted or a contact is established, please consider directly contacting them first.
  • Target URL pages and web content are operated and managed by our contractors (individuals, corporations, etc.) or by end-users (individuals, corporations, etc.) who have contractual relations with our contractors and have not signed a direct contract with us. For this reason, we may not be able to take measures to match your request.
  • There are various cases, such as not being able to take measures only for the target information from a technical point of view.

Our actions

  • [Content review] Confirmation of complaint/report contents (we will identify server service/contractor based on provided information)
  • [Fact-check] We will notify the contractor of the facts of complaint/reporting and the contents of the report and will forward the contents.
  • [Reporting] We will report replies and details of responses from the contractor.

This is an English translation from the Japanese version. In the case of any disputes, the Japanese version takes precedence.