ο This policy is effective as of January 1, 2021.
1. Purpose of Personal Information Processing “company”utilizes the personal information collected for the purposes described below. Personal information that is handled is not used for purposes other than those stated below. If there is any change to the purpose of use, prior consent will be sought. A. Website membership management Identification• authentication for service provision, membership maintenance, identification in accordance with the limited verification of identity system, and prevention of illegal use of service.
B. Handling of civil applications Personal information may be used for the purpose of identifying applicants, checking application details, contacting for fact checking, and notifying the results. C. Provision of materials or services Personal information may be used for service provision purposes. D. Use for marketing and advertisement Personal information may be used for the purpose of checking of validity of services, grasping of access frequency, and statistical reference of members’ service use. 2. Present status of personal information files • 1. Personal information file name: Personal information • Personal information items: E-mail, mobile phone no., company telephone no., title, department, company name, access log, access IP info., and legal representative’s name • How to collect info.: Website • Reason for retention: Agreement to personal information use • Retention period: 3 • Related laws: Records regarding the collection, processing, and use of credit information: 3 years, Records of consumer complaints or dispute settlements: 3 years, Records of contracts or application withdrawal: 5
3. Period of personal information processing and retention① “company” processes and retains personal information during the designated period of use as agreed upon with the information object and according to laws concerning the retention and use period of personal information. ② The period of personal information processing and retention depending on the service type is as follows: • 1.<Civic service> • Personal information related to <civic service provision> is retained and used for the aforesaid purposes for 3 years from the date of agreement to the collection and use of personal information. • Reason for retention: Agreement to personal information use • Related laws: 1) Records of consumer complaints or dispute settlements: 3 years, 2) Records of contracts or application withdrawal: 5 • Reason for exception:
4. Provision of personal information to a third party① “company” may provide a third party with personal information only when the personal information object agrees to it and such is in accordance with specific laws or regulations such as Articles 17 and 18 of the Personal Information Protection Act. ② “company” may provide personal information to a third party in the following cases: • 1. “company” • Those who are provided with personal information: “company” • Purpose of the receiver’s use of personal information: E-mail, mobile phone no., company telephone no., title, department, company name, and legal representative’s name • Purpose of the receiver’s retention and use of personal information: 3
5. Rights and duties of the information object and legal representative as well as how to exercise the rights As a personal information object, a user may exercise the following rights: ① An information object may exercise the right to request “company” for opening, correction, deletion, and suspension of use of personal information anytime. ② The act of exercising the rights stated in Paragraph 1 above may be implemented in writing or via e-mail or fax in accordance with Article 41-1 of the Enforcement Ordinance of the Personal Information Protection Act. In response, “company” will take measures accordingly without delay. ③ An information object may exercise the rights stated in Paragraph 1 above through a legal representative or an entrusted individual. In this case, the user shall submit a letter of attorney using Annex Form No. 11 of the Enforcement Regulations of the Personal Information Protection Act. ④ The information object’s right to request opening or suspension of use of personal information may be restricted in accordance with Articles 35-5 and 37-2 of the Personal Information Protection Act. ⑤ As for the correction and deletion of certain personal information items, in case the relevant law specifies such items as a basic requirement, the request for deletion may not be accepted. ⑥ As for the correction and deletion of certain personal information items, in case the relevant law specifies such items as a basic requirement, the request for deletion may not be accepted.
6. Personal information items to be handled① “company” handles the following personal information items: • 1<Civic service> • Required items: E-mail, mobile phone no., company telephone no., title, department, company name, and legal representative’s name and mobile phone no. • - Optional items:
7. Disposal of Personal Information Once the purpose of handling personal information is fulfilled, “company” destroys the personal information without delay, in principle. Personal information is deleted using the following procedure and method: -Deletion Procedures Information that is entered by a user is transferred to a separate database once its purpose is fulfilled (in the case of paper, a separate filing cabinet), and then destroyed after the designated period in accordance with internal directions or related laws on privacy protection. Personal information transferred to a DB is not used for any other purpose unless required by law.-Information DisposalA user’s personal information is destroyed within 5 days of the final date of retention if the retention period expires and within 5 days of the date when the handling of personal information is judged as unnecessary for reasons such as fulfillment of handling personal information, termination of service, completion of business, etc. -Disposal Method Personal information saved in electronic file format is deleted by means of a technical method that makes opening the file impossible.
8. Installation, operation, and denial of devices automatically collecting personal information “company” does not use “cookies” that save and frequently load an information object’s use logs.
9. Person in charge of protecting personal information ① In order to manage duties regarding personal information as well as handle complaints and remedies, “company” designates the following person in charge of protecting personal information: • ▶ Person in charge of protecting personal information • Name: • Title: • Position: • Contact Info.: ② An information object may inquire with the personal information protection manager and responsible department about personal information protection, unsatisfactory service, remedies for damage, etc. regarding the service (business) offered by “company” “company” will provide an answer to such inquiries without delay.
11. Measures for personal information security According to Article 29 of the Personal Information Protection Act, “company” takes technical, managerial, and physical measures for information security as follows: 1. “company” designates the minimal number of employees in charge of handling personal information so that personal information is handled only by the designated individual(s) in charge.2. Technical measures for hacking, etc. In order to prevent personal information leak or damage due to hacking, computer viruses, etc., “company” installs and regularly updates and checks security programs. “company” installs a security system in a restricted area and supervises it technically and physically. 3. Personal information encryption A user’s password is encrypted when stored and managed and is known to the user only. For files including vital data, additional security functions such as encryption and file locking are applied.
4. Retention of access logs and forgery prevention Logs of access to the personal information processing system are kept and managed for at least 6 months. Security functions are applied to prevent log forgery, leak, or loss.
5. Control of unauthorized individuals’ access Personal information is kept in a physically separate place, and access control procedures are established and operated.