information
Privacy{SITE_NAME} (hereinafter referred to as "Company") complies with the relevant legal provisions related to the protection of personal information, such as the Telecommunications Secrecy Protection Act, the Telecommunications Business Act, the Act on Promotion of Information and Communication Network Utilization and Information Protection and has established a privacy policy in accordance with the related legal provisions for the protection of user rights.
This privacy policy may change in accordance with changes in laws or guidelines related to personal information protection and changes in company policies, so users are advised to check it regularly when visiting our site.
Company's privacy policy is as follows.
1. Definitions of Terms in the Privacy Policy
1. “Personal Information" refers to information about an individual that can be used to identify a specific individual through names, resident registration numbers, and other symbols/letters/voices/sounds, images, etc. (even if it cannot identify a specific individual by that information alone, it includes information that can be easily combined with other information to identify a specific individual).
2. "User" refers to a person who accesses the website of Blueback Global Services KR. Ltd. (https://newboard2.mraon.com) and receives services provided by the Company under these terms and conditions.
2. Consent to Collection of Personal Information
Company has established procedures for users to click the "Agree" or "Disagree" button to express their consent to the contents of the company's privacy policy or terms and conditions.If a user expresses consent, it is considered that they have agreed to the collection of personal information.
3. Items and Methods of Collecting Personal Information
1. The items of personal information collected are as follows, to provide smooth customer consultations and various services. [Online Inquiry, Newsletter Collection Items]
1. Online Inquiries, Responses, Customer Consultations: Name, Email, Mobile Phone Number
2. Newsletter Subscription, Sending: Name, Email
3. IP Address: Cookies, Visit Date and Time, Service Usage Records
2. Methods of Collecting Personal Information
Website Consultation Bulletin Board, Phone, Email
1. Company collects personal information through the following methods.
4. Protection of Children's Personal Information
1. When collecting personal information of children under the age of 14, the company obtains consent from their legal representative.
2. The legal representative of a child under 14 years of age may request to view, correct, or withdraw consent for the child's personal information, and in such cases, the company will take necessary measures promptly.
5. Purpose of Collection and Use of Personal Information
1. Service Provision
1. Use of various contents and consultation inquiries provided to users
2. Handling complaints, delivering notices
2. Development and utilization for marketing/advertising of the Company's services
1. Delivery of advertising information, such as events, and product delivery when winning an event.
2. Development of new services and specialization, provision of services and advertisement according to demographic characteristics
3. Understanding access frequency or statistics on user service usage
6. Retention and Use Period of Personal Information
The company will retain and use the user's personal information during the period in which the user uses the service.
In cases of withdrawal of consent for the collection and use of personal information, achievement of collection/use purposes, expiration of retention/use period, or business discontinuation, the relevant personal information will be promptly disposed.
However, the following information will be retained for the specified periods as stated below.
1. Electronic Commerce Consumer Protection Act
1. Personal information and counseling content provided when making inquiries: Retained for 3 years
2. Records related to consumer complaints or dispute resolution: Retained for 3 years
7. Personal Information Disposal Procedure and Method
The company will dispose of collected personal information without delay once the purpose of collection has been achieved, following the relevant retention and use periods.
The personal information disposal procedures and methods of the company are as follows.
1. Disposal Procedure
1. Information entered for site usage purposes will be retained for a certain period in accordance with internal policies and relevant laws (refer to retention and use periods) and will then be deleted or disposed of.
2. Disposal Method
1. Personal information stored in electronic file format will be deleted using methods that render the records unrecoverable.
Personal information in printed form will be disposed of through shredding or incineration.
8. Provision and Sharing of Personal Information with Third Parties
The company will use personal information within the scope disclosed in Article 4 and will not generally provide it to external parties without the user's consent.
[Third-Party Provision]
To provide better services, the user's personal information may be provided to or shared with third parties. When providing or sharing personal information, the company will notify users individually via email or in writing regarding who will receive the information, what personal information will be provided or shared, why such information needs to be provided or shared, and how it will be protected and managed. Users can agree through the terms and conditions or go through a procedure to provide consent. If a user does not agree, the information will not be provided or shared. The same procedure will be followed when there are changes or termination in the third-party provision and sharing relationship.
However, exceptions apply in the following cases.
1. When the user has agreed in advance to the disclosure of personal information
2. When there is a request from an investigative agency according to the procedures and methods prescribed by law, or for investigation purposes
9. Handling of Personal Information Entrusted to Others
The company entrusts personal information as follows to improve its services and ensures that personal information is safely managed in accordance with relevant laws and regulations during the entrusted contract.
Outsourcing Company | Outsourced Tasks |
Web Development Specialists | Website Management and Operation |
When entering into outsourcing contracts, we adhere to the provisions of Article 26 of the Personal Information Protection Act, which include prohibiting the processing of personal information beyond the intended scope of the outsourcing, implementing technical and managerial safeguards, restricting re-outsourcing, and specifying responsibilities such as monitoring and supervision of the subcontractor, as well as liability for damages in the contract or other relevant documents.
If there is a change in the contents of the entrusted task or the entrusted party, the company will promptly disclose it through this privacy policy.
10. User Rights and How to Exercise Them
1. Users can access, modify, or request deletion of their registered personal information at any time.
2. For personal information access and modification, users can use the "information modification" function, and for withdrawal of membership (withdrawal of consent), they can request it in writing, by telephone, or through electronic mail to the personal information manager.
3. If a user requests the correction of their personal information, we will promptly make the necessary corrections to ensure accuracy.
In cases where incorrect personal information has already been provided to third parties, we will notify them without delay of the corrected information to ensure that the corrections are implemented.
Personal information that has been terminated or deleted at the user's request will be handled in accordance with the provisions specified in "5. Retention and Use Period of Personal Information" and will not be used for any other purposes.
11. Matters Concerning the Installation/Operation and Refusal of Cookies
Cookies are small pieces of information that a website server sends to a user's computer. These cookies can contain information about the website visited and may include personal information necessary for providing services. Users have the option to refuse or receive warnings about receiving cookies by changing the settings in their computer's web browser. The company may send cookies to a user's computer in the following situations, which are deemed necessary for the use of web services.
1. The purposes of using cookies include providing personalized information based on individual interests, analyzing user access frequency and usage time to understand user preferences and interests for targeted marketing, tracking user interactions with content of interest to provide personalized services, and considering service improvements based on user habits, including collecting information from forum post registrations.
2. Installation/Operation and Refusal of Cookies
1. Users have the option to refuse to accept cookies and can allow all cookies, confirm them whenever they are stored, or refuse to store all cookies by changing the options in the web browser.
2. However, if you refuse to store cookies, some of the company's services may be difficult to use.
3. Cookie Settings Method
Firefox: https://support.mozilla.com/en-US/kb/disable-third-party-cookies
Chrome: https://support.google.com/chrome/answer/95647?hl=en&topic=14666&ctx=topic
Internet Explorer: https://support.microsoft.com/en-us/help/17442
Safari: https://support.apple.com/en-us/guide/safari/sfri11471/mac
12. Technical and Administrative Measures for Protecting Personal Information
The company is taking technical and administrative measures to ensure the security of personal information and prevent its loss, theft, leakage, alteration, or damage when processing the personal information of users.
1. Technical Measures
1. User's personal information is thoroughly protected. Users should not disclose their personal information to anyone.
To ensure this, the company recommends closing web browsers after using them on a PC. Especially when using a shared computer or in public places (such as companies, schools, libraries, internet cafes), these procedures may be even more necessary to prevent personal information from being exposed to others.
2. The company takes measures to prevent damage to the user's personal information due to hacking, computer viruses, and similar threats by using antivirus programs.
To prepare for data corruption, the company regularly backs up data, utilizes up-to-date antivirus programs to prevent leakage or damage to user's personal information, and ensures the secure transmission of personal information over networks through encrypted communication. In addition, intrusion detection systems are used to control unauthorized access from external sources, and every possible technical device is employed to ensure security.
2. Administrative Measures
1. To ensure the secure protection of users' personal information, the company restricts personnel with access to personal information and provides them with separate passwords, which are regularly updated. Employees receive continuous training on the acquisition of new security technology and obligations related to personal information protection, always emphasizing compliance with the company's personal information handling policies.
2. However, the company does not assume any responsibility for problems arising from the user's negligence or internet-related issues that lead to the exposure of personal information.
‘
13. Personal Information Management Officer and Contact Information
Users can report all complaints related to personal information protection to the Personal Information Management Officer or the responsible department when using the company's services.
The person responsible for personal information processing and the department in charge will provide prompt and sincere responses to inquiries regarding personal information.
Personal Information Management Officer
Name: Administrator
Affiliation: Security Business Division
Position: Division Head
Contact: privacy@abc.com
14. Remedies for Violation of Information Subject's Rights
If you need to report or seek advice regarding personal information breaches, please contact the Korea Internet & Security Agency (KISA) Personal Information Breach Report Center. Additionally, if you have suffered financial or psychological damages due to a personal information breach, you can apply for relief through the KISA Personal Information Dispute Resolution Committee.
Personal Information Breach Report Center (http://www.cyberprivacy.or.kr, Phone: 1336)
Personal Information Dispute Resolution Committee (http://www.kopico.or.kr, Phone: 1336)
Information Protection Mark Certification Committee (http://www.privacymark.or.kr, Phone: 02-580-0533)
Cyber Investigation Division of the Supreme Prosecutors' Office (http://www.spo.go.kr, Phone: 02-3480-3600)
Cyber Terror Response Center of the Korean National Police Agency (http://www.ctrc.go.kr, Phone: 02-392-0330)
Korean National Police Agency (http://www.police.go.kr)
15. Notification of Changes to the Privacy Policy
If there are additions, deletions, or modifications to the contents of this privacy policy, advance notice will be provided through the 'Announcement' section at least 7 days prior to the revision. However, in cases such as a significant change in the items of personal information collected or the purposes of use, notice will be given at least 30 days in advance, and consent from the data subjects may be sought again if necessary.
Date of Announcement: July 1, 2021
Effective Date: July 1, 2021