Privacy Policy
1. Personal Information Collected and Collection Methods
2. Purpose of Collecting and Using Personal Information
3. Sharing and Provision of Collected Personal Information
4. Outsourcing of Personal Information Processing
5. Retention and Use Period of Collected Personal Information
6. Procedures and Methods for Destruction of Personal Information
7. Measures to Ensure the Security of Personal Information
8. Rights of Users and Legal Representatives and How to Exercise Them
9. Installation, Operation, and Refusal of Automatic Personal Information Collection Devices
10. Personal Information Manager and Responsible Department
11. Duty of Notification
This policy is effective from August 1, 2021.
1. Personal Information Collected and Collection Methods
1) Items Collected For managing company-related inquiries, service/product inquiries, recruitment inquiries, website inquiries, misconduct reports, and security reports, the Company collects the following personal information:
- Required Information: Name, Company Name, Email, Contact Number
- Right to Refuse Consent and Possible Disadvantages
- You have the right to refuse consent for the collection of required information.
- You also have the right to refuse consent for the collection of optional information.
However, if you refuse to provide consent, we may not be able to respond to your inquiry.
2) Collection Methods The Company collects personal information in the following way:
- “Online Inquiry” menu
2. Purpose of Collecting and Using Personal Information
The Company uses the collected personal information for the following purposes:
- To provide feedback and manage customer inquiries such as company-related, service/product, and website inquiries
3. Sharing and Provision of Collected Personal Information
The Company does not provide users’ personal information to external parties, except in the following cases:
- When users have given prior consent
- When required by law or upon request from investigative authorities following lawful procedures
4. Outsourcing of Personal Information Processing
The Company does not outsource the processing of users’ personal information in principle. However, exceptions are made in the following cases:
- When users have given prior consent
- When required by law or upon request from investigative authorities following lawful procedures
5. Retention and Use Period of Collected Personal Information
Collected personal information is destroyed without delay once feedback for customer inquiries (such as company-related, service/product, and website inquiries) has been provided.
6. Procedures and Methods for Destruction of Personal Information
In principle, the Company destroys personal information without delay once the purpose of collection and use has been achieved. The procedures and methods are as follows:
1) Destruction Procedures Information entered by users is retained for a certain period of time in accordance with internal policies (refer to “Retention and Use Period of Collected Personal Information”) and then destroyed. Such information will not be used for any purposes other than those specified by law.
2) Destruction Methods Personal information printed on paper will be shredded or incinerated. Personal information stored in electronic file format will be deleted using technical methods that prevent recovery.
7. Measures to Ensure the Security of Personal Information
The Company takes the following technical, administrative, and physical measures necessary to ensure the security of personal information:
1) Establishment and Implementation of Internal Management Plans The Company establishes and enforces internal management plans to protect personal information.
2) Minimization and Training of Personnel Handling Personal Information Access rights to the database system handling personal information are granted, changed, or revoked as necessary, and unauthorized access is blocked using intrusion prevention systems.
3) Storage of Access Records and Prevention of Forgery or Theft Records of access to personal information systems (such as web logs and summary information) are kept for at least six months and secured against tampering, loss, or theft.
4) Technical Measures Against Hacking and Unauthorized Access Control To prevent leakage or damage of personal information due to hacking or computer viruses, the Company installs security programs, conducts regular updates and inspections, and installs systems in controlled access areas with technical/physical monitoring and blocking. Network traffic is monitored, and illegal attempts to alter information are detected.
8. Rights of Users and Legal Representatives and How to Exercise Them
Users and legal representatives may access, correct, or delete registered personal information at any time. Requests for access, correction, or deletion can be made by phone or e-mail to the Personal Information Manager, and appropriate actions will be taken promptly after identity verification.
If you request correction of an error, the relevant information will not be used or provided until the correction is completed. If incorrect information has already been provided to a third party, the Company will notify them without delay to ensure correction.
Personal information that has been deleted or canceled at the request of users or legal representatives will be handled in accordance with the “Retention and Use Period of Collected Personal Information” and will not be used for any other purpose.
9. Installation, Operation, and Refusal of Automatic Personal Information Collection Devices
The Company does not operate devices that automatically collect personal information (such as cookies).
10. Personal Information Manager and Responsible Department
The Company has designated the following departments and personnel as the Personal Information Manager and responsible department to protect users’ personal information and handle related complaints:
1) Personal Information Management Department
Name:
Phone: - -
Email: @
2) Personal Information Manager
Name:
Phone: - -
Email: @
Users may report any personal information protection-related complaints arising from the use of the Company’s services to the Personal Information Manager or responsible department. The Company will respond promptly and sufficiently to such reports. For further inquiries or counseling regarding personal information violations, please contact the following organizations:
1. Personal Information Dispute Mediation Committee (www.kopico.go.kr) : 02-2100-2499
2. Supreme Prosecutors’ Office Cybercrime Investigation Unit : 02-3480-3571 (http://www.spo.go.kr/)
3. Cyber Bureau of the National Police Agency : (No area code) 182 (http://cyberbureau.police.go.kr/)
According to the Personal Information Protection Act, Articles 35 (Access to Personal Information), 36 (Correction or Deletion of Personal Information), and 37 (Suspension of Personal Information Processing), individuals whose rights or interests have been infringed upon by the actions or inactions of public institutions may file an administrative appeal in accordance with the Administrative Appeals Act.
※ For more details on administrative appeals, please refer to the Ministry of Government Legislation website (http://www.moleg.go.kr).
11. Duty of Notification
If there are any additions, deletions, or modifications to this Privacy Policy, they will be announced at least seven days in advance through the website’s “Notices.”




