1. Purpose and Use of Collected Information
Basic, necessary information is mandatorily collected in order to reply to inquiries. The personal information of all clients registered as members shall not be used for any other purpose other than that described above, and consent shall be requested in case of a change in purpose or use of the information collected.
2. Collected Information
The following information is collected in order to reply to inquiries.
¨ê Contact Number
In order to provide a more accurate and efficient reply, further information may be requested. The additional information requested will be immediately destroyed after a reply has been sent.
3. Information Protection of Children
In accordance with ¡°the provision of Article 31, section 1 of the law regarding the promotion of information and communication network use and protection of information¡±, consent of a legal representative is obligated when collecting the personal information of children under 14 years old. Thus, the personal information of children under 14 years old is not collected and children under 14 years old are prohibited to register as members without the consent of a legal guardian and written authorization.
Furthermore, the legal representatives of children under 14 years old can request to recant or amend the consent. Once the request is received, necessary measures will be taken.
4. Information Offering and Sharing
In principle, members¡¯ information will not be disclosed to any third party agencies. When information collected is required to be revealed to a third party in order to provide a response to an inquiry, consent shall be requested through appropriate procedures.
However, members¡¯ information can be revealed without consent in the following cases:
¨ç In the case that the information does not specifically identify the member for the purpose of statistic mapping, academic research or market research.
¨è In the case that an official request is made from governmental agencies.
5. Reading, Amendment and Deletion of Information
At any time, members have the right to read their personal information through the security manager and to amend or delete the stored information.
6. Operation of Cookies
Cookies are used for members¡¯ certification procedures. Since the system is set up to not automatically save or to delete the information on computers when logging out, when using public computers which are easily accessible by other people, ensure all windows have been closed after logging out.
7. Network Security
A high-tech security system for servers and networks is enabled. A firewall, IDSs (Intrusion Detection Systems) and IPS (Intrusion Prevention System) is installed and every effort is made to protect members¡¯ information. The security system is examined periodically as well as randomly by Leaderstech, the professional security solution provider. Furthermore, a thorough system inspection is performed in accordance with company policies on network security.
8. Internal Security Policy
Limited personnel have access to members¡¯ information and undertake regular security training. The system that permits personnel to read members¡¯ information is secured with a secondary password system and is completely isolated from the external network to prevent any external or internal intrusion. The policy on the gathering of information mentioned above will take effect concurrently with the launching of the website. The assigned security manager in charge of protecting members¡¯ information is:
Security Protection Manager: Yeong-Seok Kim, Head of the HR Department (email@example.com)