1. Purposes and Use of Personal Information Collection
We collect your personal information obligatorily to a minimum level which is necessary to give replies back to your inquiries about our products.
The personal information of all clients registered as our members shall not be used for any other purposes other than that described above and we will certainly ask your consent if there is any case to change the purpose or use of the personal information.
2. Personal Information We Collect
We collect following information to check your inquiries about our products and to give responses;
② Name of your company
④ Contact Number
For more efficientprocedures to check and reply to your inquiries, we may ask additional information. The additionally collected personal informationwe may have will be promptly destroyed after checking and replying to inquiries.
3. Personal Information Protection of Children
In accordance with “the provision of Article 31, section 1 of the law regarding the promotion of information and communication network use and protection of information”, we should get the consent of a legal representative when we collect the personal information of children under full fourteen years old. Thus, we do not collect the personal information of children under full fourteen years old and also those children are not allowed to be registered as our members. The children under full fourteen years old, however, is allowed to be our member after getting the consent of their legal representatives and written confirmations.
Furthermore, the legal representatives of the children under full fourteen years old can request to recant of the reading, amendment and consent of their children’s personal information and in case that we receive the request, we will immediately take necessary measures.
4. Information Offering and Sharing
In principle, the personal information of our members is not allowed to offer to any third agencies and parties. When we need to offer the personal information collected to any specific companies in order to provide our members convenience, we are supposed to seek your consent through appropriate procedures.
We are, however, allowed to offer the personal information without the approval for the limited cases as follows;
①In case that the personal information is offered with the formation which cannot identify any specific privacy for the purposes of statistic mapping, academic research or market research
②In case that there is an official request from governmental agencies
5. Reading, Amendment and Deletion of Personal Information
At any time, our members have the right to read their personal information through our security manager when they want and to amend and delete the stored essential information.
6. Operation of Cookie
We use Cookie for members’ certification procedures. Since it is set up not to automatically save and to delete the information on computers when logout, when you have used the computers which are installed in public places or are easily accessible to other persons, please make sure to close every window of Internet after log-in and using the service.
7. Network Security
We are equipped with the high-tech security system for severs and networks. We have our own firewall, IDSs (Intrusion Detection Systems) and IPS (Intrusion Prevention System) and alsotake the best methods to protect our members’ personal information. Our security system is examined periodically and irregularly by , the professional security solution provider and we are consulting with them. Furthermore, we perform a thorough system inspection in accordance with our own regulations on network security.
8. Internal Security Policy
We limit and minimize the personnel who can handle the personal information of our members and perform the periodic and irregular security education. The system that enables to read the members’ personal information is secured with secondary password system and is completed isolated from external network to cope with external and internal invasion. Our policy on personal information protection mentioned above will take effect concurrently with the opening of our site. We assign the security manager in charge of protecting the personal information as below;
Security Protection Manager: [Department Head] Yeong-Seok, Kim (firstname.lastname@example.org)