1. Personal Information to be Collected
(1) The Company is collecting the following personal information for providing customer consultation and services without a hitch.
Generally collected items
Name, contact information, email, company/school name, rank/grade
Automatically collected items
IP address, cookies, date of visits, service-use records
(2) While users are using the service, the following information can be automatically generated and collected. IP address, cookies, date of visits, service-use records
2. Methods for Collecting Personal Information
The company uses the following methods to collect personal information.
Website, paper forms, fax, telephone, email
Received from partner companies
Collected using information collection tools.
3. Purpose of Personal Information Collection and Use
The Company uses collected personal information for the following purposes:
Development and specialization of new services; delivery of ads such as event notifications; assessment of access frequencies and stats on service use by visitors; responses to inquiries.
4. Sharing and Providing Collected Personal Information
The Company uses the personal information of users within the scope defined in “2. Purpose of Personal Information Collection and Use.” And it does not disclose personal information to outside parties or use it beyond the specified scope without the prior consent of users. However, there are exceptions as the following:
If users have agreed to disclosure previously
If investigative agencies demand disclosure pursuant to the law or for the purpose of investigations within the scope of legitimate procedures and methods.
5. Period for Owning and Using Personal Information
The Company will immediately dispose of collected personal information after the purpose of personal information collection and use is achieved. However, the following information is stored for a specific period of time for the reasons specified below.
Period for Owning and Using Personal Information
Items to be stored – Name, email
Purpose of storage – Verifying the details of an inquirer
Storage period – 36 months
Items to be stored – Contact information, email, company/school name, rank/grade
Purpose of storage – Verifying the details of an inquirer
Storage period – 12 months
– If an individual user has given prior consent on a storage period for other kinds of personal information, they will be stored for that period of time.
6. Procedures and Methods for Disposing of the Personal Information
Without exception, the Company will immediately dispose of collected personal information after the purpose of personal information collection and use is achieved. The methods and procedures for disposal are as follows:
After the purpose of personal information collection and use is achieved, the information entered will be moved to a separated database (paper forms will be stored in a file cabinet) and then stored for a certain period of time (refer to “5. Period for Owning and Using Personal Information”) according to internal policies or reasons for information protection before the information is finally disposed of. Personal information moved to a separate database will not be used for other purposes except when the law states otherwise.
Personal information stored in an electronic file form will be deleted in such a way as to prevent it from being restored. Paper containing personal information will be shredded or burned.
7. Consigning Collected Personal Information
The Company will not consign collected personal information to other companies without prior consent of users. When an occasion arises in the future, the Company will notify users of the company to which the personal information will be consigned and the nature of the consignment. The Company will, if necessary, obtain the prior consent of users.
8. The Rights of Users and Legal Representatives and Methods of Exercising Those Rights
Users or legal representatives can view or modify their personal information or that of their children aged below 14, or request the deletion of that personal information.
Contact your personal information manager by letter, telephone or email. Your identity will be confirmed and necessary actions taken.
Should users request corrections on errors of personal information, we will not use or provide any personal information until a correction is made. In addition, if the wrong personal information has already been provided to a third party, we will immediately notify them so that a proper correction can be made.
If the personal information is canceled or deleted upon request of users or legal representatives, the Company will take the necessary actions as specified in “5. Period for Owning and Using Personal Information,” and prohibit disclosure or use for any other purposes.
9. Installation, Operation and Rejection of Automatic Personal Information Collection Devices
Purposes of using cookies
To analyze the frequency of access/time of visit by members or non-members; to assess users’ preferences and areas of interest; to provide target marketing and customized services by assessing the level of participation in various events and the number of visits to them. You have the right to select whether to install a cookie. You can set the option in your web browser to allow all the cookies, to request confirmation each time cookies are saved or to reject the saving of any cookies.
How to reject cookies Ex:
You can set the option in your web browser to allow all cookies or to request confirmation each time cookies are saved or to reject the saving of any cookies. How to activate (Internet Explorer) :
Go to [Tools] (at the top of Internet Explorer) > [Internet Options] > [Personal Information].However, if you reject installation of cookies, the service may not operate properly.
10. Technical and Managerial Protection Measures for Personal Information
The Company provides the following technical and managerial measures to prevent loss, theft, leaks, falsification of or damages to personal information, so that personal information can be handled in a reliable manner.
(a) Technical protection measures for personal information
In case of hacking or invasions, each server uses an invasion prevention system and a vulnerability analysis system in each server for the purpose of security.
(b) Managerial protection measures for personal information
Restrictions and training on personal information handlers
Restricted access to personal information processing systems
The Company has established an internal standard for allowing personal information handlers to access the system. The Company manages the assignment of, changes to, and disposal of such rights. Various policies for managing personal information handlers are being taken, such as the management of the reference/change period when a password allowing the access by personal information handlers is generated. If any personal information is lost, leaked, falsified or damaged due to internal/external managers’ mistakes or accidents, the Company will immediately notify you and compensate where appropriate.
11. Contact Information of Personal Information Managers
To protect the personal information of users and handle any complaints regarding personal information, the Company has appointed managers as follows:
Senior personal information manager
Name: Mike Holland
Department : IT – Information Technology
Telephone : 1-214-755-2176
13. Responsibility for Announcements