Article 1. Purpose of Processing Personal Information
Article 2. Items of Personal Information Processed
Article 3. Processing of Personal Information of Children Under the Age of 14
Article 4. Provision of Personal Information to Third Parties
Article 5. Outsourcing of Personal Information Processing
Article 6. Cross-Border Transfer of Personal Information
Article 7. Criteria for Additional Use or Provision
Article 8. Procedures and Methods for Destruction of Personal Information
Article 9. Rights and Obligations of Users and Their Legal Representatives, and
Methods of Exercise
Article 10. Measures to Ensure the Security of Personal Information
Article 11. Installation, Operation, and Rejection of Automatic Data Collection
Devices
Article 12. Personal Information Protection Officer and Related Matters
Article 13. Remedies for Infringement of Rights
Article 14. Amendments to the Privacy Policy
1. Installation and Updating of Security Programs
To prevent the leakage or damage of personal information, the Company regularly backs up data, installs and updates antivirus programs, and conducts inspections to ensure that users’ personal information and data are protected from unauthorized access or damage.
2. Encryption of Personal Information
3. Retention and Tamper Prevention of Access Records
4. Access Control and Restrictions on Personal Information
1. Establishment and Implementation of Internal Management Plans
2. Operation of a Dedicated Organization
3. Regular Employee Training
1. Access Control for Unauthorized Personnel
2. Use of Locking Devices for Document Security
3. Subscription to Personal Information Protection Liability Insurance
1. Acquisition of Personal Information Protection Certifications: Personal Information
and Information Security Management System (ISMS-P), Excellent Web and System Certification
for Personal Information Protection (ePRIVACY PLUS)