I・medex Co., Ltd.

CONTACT

TOP contact

FAQ

Q

What kind of company is I-MEDEX?

A

We were established in 1992 as pioneers in medical bioelectrodes. We handle everything from material research to design and manufacturing, providing products to medical and research institutions both domestically and internationally.

Q

What are the features of your bioelectrodes?

A

Our bioelectrodes are excellent in noise reduction and precise signal detection, enabling stable measurements even during long-term use. We also focus on skin-friendly design and comfortable wearability.

Q

Can your products be used overseas?

A

Our products are ISO 13485 certified, and we are expanding internationally. However, regulations may vary by region, so please contact us for further details.

Q

Do you collaborate with research institutions for joint development?

A

Yes, we have a strong record of joint development with universities and research institutions, working on the development of new medical and welfare devices.

Q

Do you have businesses other than bioelectrodes?

A

Yes, we also provide support for importing and selling medical devices (DMAH services) and collaborate on sensor technology research and development with universities. We are actively expanding into new areas beyond bioelectrodes.

Q

What is DMAH service?

A

The Designated Marketimg Authorization Holder (DMAH)vservice supports the application and registration process with the Ministry of Health, Labour and Welfare (PMDA) for overseas medical devices wishing to enter the Japanese market. We assist international medical device manufacturers with their market entry into Japan.

日本語
日本語
日本語
日本語
日本語
日本語
日本語
日本語
日本語

CONTACT FORM

Contact Us
Please use the form below to contact us.
We will respond via email at a later time.
Please ensure your information is accurate when filling out the form.

    0 / 300

    Privacy Policy


    I-MEDEX Co., Ltd. (hereafter referred to as "We" or "Our") sets forth this privacy policy (hereafter referred to as "this Policy") regarding the handling of personal information collected through our website and services (hereafter referred to as "Services").


    1. Information to Be Collected and Methods of Collection


    We will collect your personal information (as defined in Article 2, Paragraph 1 of the Personal Information Protection Act, hereinafter referred to as "Personal Information") through the services we provide and operate (hereinafter referred to as "Our Services") using appropriate means.
    If you do not agree to the collection and handling of personal information in accordance with this policy, you will not be able to use Our Services. By using Our Services, you are deemed to have agreed to this policy.



    2. Purpose of Using Personal Information


    We collect and use personal information for the following purposes


    (1) To provide and operate our Services
    (2) To respond to inquiries (including identity verification)
    (3) To send information about new features, updates, promotions, campaigns, and other services
    (4) To notify you of maintenance, important updates, and other necessary communications
    (5) To identify and refuse customers violating terms of use or attempting to misuse our Services
    (6) To allow you to access, modify, delete, or view your registration information and usage history
    (7) To create non-identifiable statistical data
    (8) To research and develop new services and products
    (9) To charge customers for paid services
    (10) For any purpose related to the above



    3. Implementation of Appropriate Security Management Measures


    1. Organizational Security Management Measures


    We will implement the following measures as part of our organizational security management
    (1) Establishment of Organizational Structure
    We will establish an organizational structure to implement security management measures.
    (2) Operation in Accordance with Information Handling Regulations
    We will handle information in accordance with pre-established information handling regulations. To confirm compliance with these regulations, we will record usage and other relevant details.
    (3) Establishment of Methods to Monitor Information Handling
    We will establish methods to monitor the handling of information.
    (4) Establishment of a System to Respond to Breaches and Incidents
    In the event of a breach or signs of one, we will establish a system to respond appropriately and promptly.
    (5) Monitoring Information Handling and Reviewing Security Management Measures
    We will monitor information handling practices and work on evaluating, reviewing, and improving security management measures.


    2. Human Security Management Measures

    As part of our human security management measures, we will thoroughly inform and educate our employees on the proper handling of information. Additionally, when assigning employees to handle information, we will supervise them in accordance with the Personal Information Protection Act, Article 24, and other applicable laws and regulations.


    3. Physical Security Management Measures

    As part of our physical security management measures, we will implement the following actions:
    (1) Management of Areas Handling Information
    We will ensure appropriate management of areas that handle critical information systems, such as servers and main computers, as well as other office areas where information is processed.
    (2) Prevention of Theft or Loss of Equipment and Electronic Media
    To prevent theft or loss of equipment, electronic media, documents, and other items containing information, we will implement appropriate management measures.
    (3) Prevention of Data Leakage When Transporting Electronic Media
    When transporting electronic media or documents containing information, we will take secure measures to prevent easy access to the information.
    (4) Deletion of Information and Disposal of Equipment or Electronic Media
    When deleting information or disposing of equipment, electronic media, or similar items containing information, we will use irreversible methods to ensure the data cannot be recovered.


    4. Technical Security Management Measures

    When handling information using information systems (including devices such as computers), including transmitting and receiving information via the internet or other external means, we will implement the following technical security management measures:
    (1) Access Control
    We will implement appropriate access control to limit the scope of access for personnel and the information databases they handle.
    (2) Identification and Authentication of Accessors
    We will authenticate that employees using information systems to handle information have legitimate access rights, based on the results of identification.
    (3) Prevention of Unauthorized Access from External Sources
    We will introduce systems to protect information systems from unauthorized external access or malicious software, and operate these systems appropriately.
    (4) Prevention of Data Leakage Associated with Information System Use
    We will implement measures to prevent data leakage and other incidents arising from the use of information systems, and will operate these measures appropriately.



    5.Understanding of External Environments

    When handling information in foreign countries, we will first understand the personal information protection systems and regulations in those countries, and then take necessary and appropriate measures to ensure the security management of the information.


    4.Provision of Personal Information to Third Parties


    Except as provided by the Personal Information Protection Act and other applicable laws, we will not provide personal information to third parties without obtaining prior consent from the customer.



    5.Response to Requests for Disclosure, Correction, Suspension of Use, etc. of Personal Information


    If a customer requests notification of the purpose of use, disclosure, correction, addition, deletion, suspension of use, or erasure of personal information (hereinafter referred to as "Disclosure, etc."), we will verify the identity of the requester and respond in accordance with the provisions of the Personal Information Protection Act. For such requests, please contact the designated window outlined in Section 8. However, if we are not obligated to provide Disclosure, etc. under the Personal Information Protection Act or other applicable laws, this will not apply.
    Please note that any costs incurred for communication, transportation, or documents required for identity verification in connection with such requests will be borne by the customer.



    6.Changes to This Policy


    We may change the contents of this policy based on customer feedback or our own reasonable judgment.



    7.Disclaimer


    While we make every effort to ensure the accuracy of the information published on our website, we accept no responsibility for any actions taken by users based on the information provided on our site.
    We also disclaim any responsibility for any damage caused to users or third parties as a result of the use of our website.

    CONTACT

    Please feel free to contact us.