{"id":55885,"date":"2023-11-07T23:10:22","date_gmt":"2023-11-07T14:10:22","guid":{"rendered":"https:\/\/monolith.law\/en\/?page_id=55885"},"modified":"2025-05-23T16:34:59","modified_gmt":"2025-05-23T07:34:59","slug":"personal-information-protection","status":"publish","type":"page","link":"https:\/\/monolith.law\/en\/personal-information-protection","title":{"rendered":"Personal Information Protection"},"content":{"rendered":"\n<section class=\"heading-area\">\n\t<div class=\"heading-area-inner\">\n\t\t<h2 class=\"icon-personal-information-protection\">Personal Information Protection<\/h2>\n\t\t<p>Business situations involving IT and the Internet often involve the handling of various types of personal information, including personal information databases, cookies, and the rest. Particular attention must be paid to those that may change due to legal revisions. MONOLITH LAW OFFICE provides highly specialised legal services related to the Japan privacy law.<\/p>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"section-inner pdt0  border-bottom-section\">\n\t\t<p>The Japan Act on the Protection of Personal Information(APPI)  is one of the most crucial law. It governs the handling of personal information in business activities. This Japan privacy law focuses on how personal data should be handled. The article sets out the obligations that personal data providers must fulfil in order to protect the rights and interests of individuals. Companies are facing the challenge of complying with the revised APPI, which was forced in April 2022.<br>As an expertise in supporting IT and Internet businesses, MONOLITH LAW OFFICE has handled legal matters related to The Japan Act on the Protection of Personal Information for numerous companies, ranging from companies listed on the Prime Market of the Tokyo Stock Exchange (TSE) to seed-stage startups.<\/p>\n\t<\/div>\n<\/section>\n<section class=\"second-nav\">\n\t<div class=\"second-nav-inner\">\n\t\t<p>TOPICS<\/p>\n\t\t<nav>\n\t\t\t<ul>\n\t\t\t\t<li><a href=\"#example-of-support-provided-by-our-firm\">Examples of Support Provided by Our Firm<\/a><\/li>\n\t\t\t\t<li><a href=\"#compliance-with-the-japan-privacy-law\">Compliance with the Japan Privacy Law<\/a><\/li>\n\t\t\t\t<li><a href=\"#basic-obligations-of-business-operator\">Basic Obligations of Business Operator<\/a><\/li>\n\t\t\t\t<li><a href=\"#creating-and-revising-a-privacy-policy\">Creating and Revising a Privacy Policy<\/a><\/li>\n\t\t\t\t<li><a href=\"#responding-to-a-personal-information-breach\">Responding to a Personal Information Breach<\/a><\/li>\n\t\t\t\t<li><a href=\"#response-to-the-appi-in-2022\">Response to the APPI in 2022<\/a><\/li>\n\t\t\t\t<li><a href=\"#drafts-can-be-prepared-with-minimal-hearings\">Drafts Can Be Prepared with Minimal Hearings<\/a><\/li>\n\t\t\t\t<li><a href=\"#terms-of-use-for-apps\">Terms of Use for Apps<\/a><\/li>\n\t\t\t\t<li><a href=\"#examples-of-our-clients-products\">Examples of Our Client\u2019s Products<\/a><\/li>\n\t\t\t\t<li><a href=\"#monolith-law-magazine\">MONOLITH LAW MAGAZINE<\/a><\/li>\n\t\t\t\t<li><a href=\"#fee-structure\">Fee structure<\/a><\/li>\n\t\t\t<\/ul>\n\t\t<\/nav>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"example-of-support-provided-by-our-firm\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<h3>Examples of Support Provided by MONOLITH LAW OFFICE<\/h3>\n\t\t<ul class=\"layout-column4\">\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/privacypolicy.png\"><\/div>\n\t\t\t\t<h4>Privacy Policy<\/h4>\n\t\t\t\t<p>We have handled the drafting of privacy policies for websites, services, apps, etc., as well as numerous revisions in response to legal amendments and other changes.<\/p>\n\t\t\t<\/li>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/manual.png\"><\/div>\n\t\t\t\t<h4>Business Manuals for Internal Use<\/h4>\n\t\t\t\t<p>We also help establish a Chief Privacy Officer (CPO) and maintain internal manuals and policies..<\/p>\n\t\t\t<\/li>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/GDPR.png\"><\/div>\n\t\t\t\t<h4>GDPR and Other Compliance<\/h4>\n\t\t\t\t<p>We also handle legal matters related to personal data protection, such as the EU General Data Protection Regulation (GDPR) in cross-border IT business opportunities.<\/p>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/dataleak.png\"><\/div>\n\t\t\t\t<h4>Personal Data Breach<\/h4>\n\t\t\t\t<p>We can assist with reporting to the  Personal Information Protection Commission and notifying individuals in case of a personal data breach.<\/p>\n\t\t\t<\/li>\n\t\t<\/ul>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"compliance-with-the-japan-privacy-law\"><\/div>\n\t<div class=\"section-inner-black\">\n\t\t<h3>Compliance with the Japan Privacy Law<\/h3>\n\t\t<p class=\"mgb-small\">The Japan Act on the Protection of Personal Information(APPI) imposes regulations on business operators handling personal information in relation to the provision or transfer of such personal information to third parties. This law imposes strict requirements on the purposes for which personal information may be used, how it may be obtained, and the security control measures that must be taken.<\/p>\n\t\t<p class=\"mgb-middle\">In addition, the law is frequently amended to provide new definitions and regulations, such as personal information databases, anonymously processed information and pseudonymised information.<\/p>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"basic-obligations-of-business-operator\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<h3>Basic Obligations of Business Operator Handling Personal Data<\/h3>\n\t\t<p class=\"mgb-middle\">The Japan privacy law establishes the following obligations for the &#8220;Business Operator Handling Personal Information&#8221; that handles personal information in particular. It is necessary to respond to these obligations and establish a compliance system.<\/p>\n\t\t<table class=\"type03\">\n\t\t<tbody>\n\t\t<tr>\n\t\t<td>Rules Regarding the Utilization Purpose of Use of Personal Data<\/td>\n\t\t<td>Specify the utilization purpose as explicitly as possible (Article 15, Paragraph 1)<br>Notification or disclosure of the utilization purpose (Article 18, Paragraph 1)<br>Use within the specified utilization purpose (Article 16, Paragraph 1)<br>Altered utilization purpose are not permitted in principle (Article 15, Paragraph 2)<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Acquisition by Appropriate Means<\/td>\n\t\t<td>Prohibition of acquisition by deception or other wrongful means (Article 17, Paragraph 1)<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Appropriate security control actions<\/td>\n\t\t<td>Prevention of data breaching, loss, or damage, etc. (Article 20)<br>Supervision over employees and contractors (Article 20, 21)<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Provision to a third party and cross-border transfer<\/td>\n\t\t<td>Necessary when providing information to a third party<br>Obtaining the principal&#8217;s consent in advance (Article 23, Paragraph 1)<br>So-called opt-out method (Article 23, Paragraph 2)<\/td>\n\t\t<\/tr>\n\t\t<\/tbody>\n\t\t<\/table>\n\t<\/div>\n<\/section>\n<section class=\"purple-section\">\n\t<div class=\"anchor\" id=\"creating-and-revising-a-privacy-policy\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<div class=\"flex\">\n\t\t\t<div class=\"width41\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/privacypolicy2.png\" alt=\"Creating and Revising a Privacy Policy\"><\/div>\n\t\t\t<div class=\"width51\">\n\t\t\t\t<h3>Creating and Revising a Privacy Policy<\/h3>\n\t\t\t\t<p class=\"mgb-small\">When an IT service is launched, an appropriate privacy policy should be developed based on what type of personal information will be collected and how that information will be used. In addition, such policies must be revised as new business functions are added or as laws are revised.<\/p>\n\t\t\t\t<p>As an IT, Internet and business law firm, we understand the behavior of such systems. We can help you create or revise appropriate privacy policies at minimal cost to your organization.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<h4 class=\"mgb-small\">Examples of our experiences<\/h4>\n\t\t<p>BGM and sound effect distribution service, BGM playback app, SaaS based voice recognition service for BtoB use, D2C EC sites, EC platforms, Services for data integration between SaaS services, Integration services for SaaS businesses, Artist platforms, Sales support tools, Household account books Apps, Job-related web services, Job search services, Cloud-based expense reimbursement services, Cloud-based attendance management services, Cloud-based transportation expense reimbursement services, Supplement sales services, Politics-related SNS, Taxi dispatch apps, Outsourced data analysis services, Video SNS services, Business SNS, Business matching site, Hospital reservation platform, Programming school, Blockchain SNS, Blockchain ad network, Reference service, Travel concierge service, Safety confirmation service, Medical information network system, Virtual currency exchange (outside Japan), Orthodontic clinic database site, Support service for the disabled, Student recruitment, Employee management, Employee training cloud service, Authorized import car sales site, Lifestyle-related support service, Start-up support service, and Antisocial check service<\/p>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"responding-to-a-personal-information-breach\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<div class=\"flex reverse\">\n\t\t\t<div class=\"width41\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/security.png\" alt=\"Responding to a Personal Information Breach\"><\/div>\n\t\t\t<div class=\"width51\">\n\t\t\t\t<h3>Responding to a Personal Information Breach<\/h3>\n\t\t\t\t<p class=\"mgb-small\">The 2022 revision of the Japan Act on the Protection of Personal Information (APPI) established the obligation of business operators that handle personal information to report to the Personal Information Protection Commission and notify individuals when a breach or potential breach of personal information has occurred. The types of reports are preliminary reports and detailed reports. In particular, preliminary reports must be made within 3 to 5 days of the discovery of the data breach.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"orange2-section\">\n\t<div class=\"anchor\" id=\"response-to-the-appi-in-2022\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<h3>Response to the Japan Act on the Protection of Personal Information in 2022<\/h3>\n\t\t<p class=\"mgb-middle\">In April 2022, the revised privacy law went into effect in Japan. This has created a need for all business owners to review their internal manuals and internal systems. In particular, for those business operators who handle short-term stored data that will be erased within 6 months or those who use opt-out, it is necessary to revise their privacy policies.<\/p>\n\t\t<table class=\"type07\">\n\t\t<thead>\n\t\t<tr>\n\t\t<th><\/th>\n\t\t<th>Amendments<\/th>\n\t\t<th>Necessary Response<\/th>\n\t\t<\/tr>\n\t\t<\/thead>\n\t\t<tbody>\n\t\t<tr>\n\t\t<td>All economic operators<\/td>\n\t\t<td>Relaxed requirements for requests for cessation of use, erasure, and cessation of provision to third parties<\/td>\n\t\t<td>Reinforcement of response to increased number of claims<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>All economic operators<\/td>\n\t\t<td>Enhancement of disclosure requests<\/td>\n\t\t<td>Establishment of a system to determine no longer necessary<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Businesses that process short-term stored data to be deleted within 6 months<\/td>\n\t\t<td>Expansion of the scope of retained personal data subject to disclosure, etc.<\/td>\n\t\t<td>Revision of internal manuals and other handling procedures<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Business operators using opt-out<\/td>\n\t\t<td>Strengthening of opt-out regulations: addition of matters to be notified, etc.<\/td>\n\t\t<td>Revision of privacy policy, etc.<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Business operators using opt-out<\/td>\n\t\t<td>Strengthening of opt-out regulations: prohibition of double opt-out<\/td>\n\t\t<td>Verify means of acquisition\/obtaining information, and change business schemes as necessary<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>All economic operators<\/td>\n\t\t<td>Obligation to report leaks, etc. and notify the individual<\/td>\n\t\t<td>Establish internal manuals and other procedures to prepare for possible leakage<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Business operators using anonymously processed information<\/td>\n\t\t<td>Establishment of new provision of pseudonymized processed information<\/td>\n\t\t<td>Revision of privacy policy, etc<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Business operators providing DMP and related services<\/td>\n\t\t<td>Regulation of personal-related information that becomes personal data at the destination of provision<\/td>\n\t\t<td>Verify that the consent of the individual is obtained from the business to which the information is provided<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t<td>Business operators conducting cross-border transactions<\/td>\n\t\t<td>Tighter regulation of cross-border transfers<\/td>\n\t\t<td>Review whether the service is being provided or not, and switch services as appropriate.<\/td>\n\t\t<\/tr>\n\t\t<\/tbody>\n\t\t<\/table>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"drafts-can-be-prepared-with-minimal-hearings\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<div class=\"flex\">\n\t\t\t<div class=\"width41\"><img decoding=\"async\" src=\"\/wp-content\/themes\/monolith2021\/img\/pic\/pic_draft.jpg\" alt=\"Drafts can be prepared with minimal hearings\"><\/div>\n\t\t\t<div class=\"width51\">\n\t\t\t\t<h3>Drafts Can Be Prepared with Minimal Hearings<\/h3>\n\t\t\t\t<p class=\"mgb-small\">Our founding lawyer is a former IT engineer.<\/p>\n\t\t\t\t<p class=\"mgb-small\">In order to create privacy policies for apps and web services, it is necessary to understand their functions and screen transitions (in terms of what the user is supposed to agree to and by what method of operation).  We can read the various documents and data that already exist in your company, such as requirement definitions, frameworks created with Adobe XD, LP, sales materials for potential clients.<\/p>\n\t\t\t\t<p>Therefore, we can create a draft for your privacy policy, etc. with minimal time spent on interviews, effectively reducing communication costs and the time required for creation.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"purple-section\">\n\t<div class=\"anchor\" id=\"terms-of-use-for-apps\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<div class=\"flex reverse\">\n\t\t\t<div class=\"width41\"><img decoding=\"async\" src=\"\/wp-content\/themes\/monolith2021\/img\/practices-itlaw\/practices-itlaw_pic2.jpg\" alt=\"Terms of Use for Apps\"><\/div>\n\t\t\t<div class=\"width51\">\n\t\t\t\t<h3>Terms of Use for Apps<\/h3>\n\t\t\t\t<p>At MONOLITH LAW OFFICE, we create and revise the terms of use for various apps, services, games, etc., and create privacy policies. It is also possible to create a privacy policy based on existing documents and data used for app development, such as requirement definitions, frameworks, LPs, and sales materials for prospective customers.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"white-section\">\n\t<div class=\"anchor\" id=\"examples-of-our-clients-products\"><\/div>\n\t<div class=\"section-inner\">\n\t\t<h3>Examples of Our Client\u2019s Products<\/h3>\n\t\t<ul class=\"layout-column4 mgb-middle\">\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/09\/logo_oVice.png\"><\/div>\n\t\t\t\t<h4><a href=\"https:\/\/ovice.in\/ja\/\" target=\"_blank\" rel=\"noopener noreferrer\">oVice<\/a><\/h4>\n\t\t\t\t<p>We have been an auditor for oVice Corporation, which realizes co-working spaces and event spaces in virtual spaces where you can feel close to people, as if you are talking next to them.<\/p>\n\t\t\t<\/li>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/themes\/monolith2021\/img\/clients\/logo_tokium.png\"><\/div>\n\t\t\t\t<h4><a href=\"https:\/\/www.keihi.com\/lp\/\" target=\"_blank\" rel=\"noopener noreferrer\">TOKIUM Expense Reimbursement<\/a><\/h4>\n\t\t\t\t<p>We have worked with TOKIUM Inc., the company behind the corporate finance app \u201cTOKIUM Expense Reimbursement\u201d as their Chief Legal Officer. We have provided legal support for their projects, including the release of their expense reimbursement system \u201cTOKIUM Invoice\u201d.<\/p>\n\t\t\t<\/li>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/themes\/monolith2021\/img\/clients\/logo_seculio.png\"><\/div>\n\t\t\t\t<h4><a href=\"https:\/\/www.lrm.jp\/seculio\/feature\/\" target=\"_blank\" rel=\"noopener noreferrer\">Securio<\/a><\/h4>\n\t\t\t\t<p>We have been an auditor for LRM Corporation, which releases Securio, which improves the perception of information security throughout the company.<\/p>\n\t\t\t<\/li>\n\t\t\t<li>\n\t\t\t\t<div><img decoding=\"async\" src=\"\/wp-content\/themes\/monolith2021\/img\/clients\/logo_tribeau.png\"><\/div>\n\t\t\t\t<h4><a href=\"https:\/\/corp.tribeau.jp\/\" target=\"_blank\" rel=\"noopener noreferrer\">TRIBEAU<\/a><\/h4>\n\t\t\t\t<p>We are in charge of a project for TRIBEAU Corporation, which releases &#8220;TRIBEAU,&#8221; an application for beauty care reviews and reservations, which is also available as a web service.<\/p>\n\t\t\t<\/li>\n\t\t<\/ul>\n\t\t<p class=\"txt-s\">As well as these clients, we are responsible for many other products. Only the companies that have given us permission to disclose their client status or the businesses registered us as their executives are listed here. As a general rule, clients&#8217; information is kept confidential under the confidentiality agreement.<\/p>\n\t<\/div>\n<\/section>\n\n<section class=\"purple2-section\">\n\t<div class=\"anchor\" id=\"monolith-law-magazine\"><\/div>\n\t<div class=\"section-inner\">\n\t\t    <section class=\"white-section temp-article\">\n        <div class=\"section-inner\">\n            <h4>MONOLITH LAW MAGAZINE<\/h4>\n            <div class=\"articles type_practice_column\">\n                                                                    <div class=\"article article-area\">\n                        <figure>\n                            <div class=\"img-wrap\">\n                                <img alt=\"[Latest Edition] What is the Personal Information Protection Law? Essential Basics You Should Know, Clearly Explained\" src=\"https:\/\/monolith.law\/en\/wp-content\/uploads\/sites\/6\/2026\/01\/7754792bacecaafed2fca2c081c09987-1024x683.webp\" width=\"500\" height=\"250\">\n                            <\/div>\n                            <figcaption>\n                                <div class=\"figcaption-inner\">\n                                    <h3>[Latest Edition] What is the Personal Information Protection Law? Essential Basi.<\/h3>\n                                <\/div>\n                            <\/figcaption>\n                            <a href=\"https:\/\/monolith.law\/en\/general-corporate\/personal-information-protection-act\"><\/a>\n                        <\/figure>\n                    <\/div>\n                                                    <div class=\"article article-area\">\n                        <figure>\n                            <div class=\"img-wrap\">\n                                <img alt=\"Can Exposing Someone's Address Become a Crime? Explaining How to Identify Posters\" src=\"https:\/\/monolith.law\/en\/wp-content\/uploads\/sites\/6\/2024\/11\/29746988_m-1-1024x682-1.webp\" width=\"500\" height=\"250\">\n                            <\/div>\n                            <figcaption>\n                                <div class=\"figcaption-inner\">\n                                    <h3>Can Exposing Someone's Address Become a Crime? Explaining How to Identify Poster.<\/h3>\n                                <\/div>\n                            <\/figcaption>\n                            <a href=\"https:\/\/monolith.law\/en\/general-corporate\/address-sin\"><\/a>\n                        <\/figure>\n                    <\/div>\n                                                    <div class=\"article article-area\">\n                        <figure>\n                            <div class=\"img-wrap\">\n                                <img alt=\"What Are the Key Points of the Revised Personal Information Protection Act in Reiwa 6 (2024)? Explaining the Changes and Measures You Should Know\" src=\"https:\/\/monolith.law\/en\/wp-content\/uploads\/sites\/6\/2024\/07\/Shutterstock_2372500751.webp\" width=\"500\" height=\"250\">\n                            <\/div>\n                            <figcaption>\n                                <div class=\"figcaption-inner\">\n                                    <h3>What Are the Key Points of the Revised Personal Information Protection Act in Re.<\/h3>\n                                <\/div>\n                            <\/figcaption>\n                            <a href=\"https:\/\/monolith.law\/en\/general-corporate\/personal-information-protection-2024\"><\/a>\n                        <\/figure>\n                    <\/div>\n                                            <\/div>\n            <div class=\"btn-more\"><a href=\"https:\/\/monolith.law\/en\/tag\/personal-information-protection\">Read More<\/a><\/div>\n        <\/div>\n    <\/section>\n\t<\/div>\n<\/section>\n<section class=\"orange2-section\">\n\t<div id=\"fee-structure\"><\/div>\n\t\t<div class=\"section-inner\">\n\t\t\t<div class=\"planWrap\">\n\t\t\t<h3>Fee Structure<\/h3>\n\t\t\t\t<ul class=\"plan\">\n\t\t\t\t  <li class=\"txt-left\">\n\t\t\t\t    <div class=\"plan-inner\">\n\t\t\t\t      <h4 class=\"plan-title\">Hourly Rate<\/h4>\n\t\t\t\t      <p class=\"plan-price\"><span class=\"price-figure\">$400<\/span> per hour<\/p>\n\t\t\t\t      <p class=\"plan-body\">\n\t\t\t\t        In certain instances, we may consider accepting a dispute or lawsuit with an initiation fee and a contingency fee.\n\t\t\t\t        For more details, please feel free to contact us.\n\t\t\t\t      <\/p>\n\t\t\t\t    <\/div>\n\t\t\t\t  <\/li>\n\t\t\t\t  <li class=\"txt-left\">\n\t\t\t\t    <div class=\"plan-inner\">\n\t\t\t\t      <h4 class=\"plan-title\">Drafting Contracts<\/h4>\n\t\t\t\t      <p class=\"plan-price\">from <span class=\"price-figure\">$500<\/span> to $2,000 or more<\/p>\n\t\t\t\t      <p class=\"plan-body\">\n\t\t\t\t        The pricing structure is subject to variation based on the type and quantity of contracts.\n\t\t\t\t        We are pleased to offer a preliminary estimate upon inquiry, thereby encouraging you to reach out to us for further details.\n\t\t\t\t      <\/p>\n\t\t\t\t    <\/div>\n\t\t\t\t  <\/li>\n\t\t\t\t  <li class=\"txt-left\">\n\t\t\t\t    <div class=\"plan-inner\">\n\t\t\t\t      <h4 class=\"plan-title\">Other Services<\/h4>\n\t\t\t\t      <p class=\"plan-price\"><span class=\"price-figure\">Contact Us<\/span><\/p>\n\t\t\t\t      <p class=\"plan-body\">\n\t\t\t\t        We offer a wide range of services including company formation, contract review, legal opinion, case review, or research letter.\n\t\t\t\t        Should you have any inquiries or concerns, we cordially invite you to contact us and our knowledgeable team will be happy to assist you.\n\t\t\t\t      <\/p>\n\t\t\t\t    <\/div>\n\t\t\t\t  <\/li>\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n<section class=\"white-section\">\n\t<div class=\"section-inner\">\n\t<div class=\"btn-area\">\n\t<div class=\"btn icon-contact\"><a href=\"\/en\/contact\">Contact Us<\/a><\/div>\n\t<\/div>\n\t<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Personal Information Protection Business situations involving IT and the Internet often involve the handling of various types of personal information, including personal information databases, cookies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":57143,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"non-other-page-temp.php","meta":{"footnotes":""},"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/pages\/55885"}],"collection":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/comments?post=55885"}],"version-history":[{"count":44,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/pages\/55885\/revisions"}],"predecessor-version":[{"id":65357,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/pages\/55885\/revisions\/65357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media\/57143"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media?parent=55885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}