en | 59
English
Information System Security
15 INFORMATION SYSTEMS SECURITY
If the system is to be transferred, resold, or disposed of by a third party, all data must be deleted under the appropriate control of the
customer, taking into consideration the following.
Initialize all data including personal information stored in the memory according to the content described below.
Initialize the data stored in memory. If copyrighted data is transferred (Paid and free) or resold without the consent of the copyright holder,
it may violate the Copyright Law. Our company shall not be held liable in any way for damages suffered by Customers due to leakage of
remaining data, etc. Therefore, the Company requests that Customers take appropriate measures based on their own management as
described above.