Skip to main content

Simkung ilji Privacy Policy

 

Privacy Policy

Beatory (hereinafter referred to as ‘Service Provider’) establishes and discloses the personal information processing policy as follows in order to protect members’ personal information and handle related complaints quickly and smoothly in accordance with personal information protection laws.

Chapter 1 Purpose of processing personal information
Service providers process personal information for the following purposes. The personal information being processed will not be used for purposes other than the following, and if the purpose of use changes, necessary measures will be taken, such as obtaining separate consent in accordance with Article 18 of the Personal Information Protection Act. 

1. Membership registration and management
Personal information is processed for the purposes of confirming intention to become a member, identifying and authenticating oneself in accordance with the provision of membership services, maintaining and managing membership qualifications, preventing illegal use of services, various notices and notices, and handling grievances.
2. Provision of goods or services
We process personal information through product delivery, service provision, contract/invoice sending, content provision, customized service provision, identity verification, age verification, bill payment/settlement, and debt collection.

Chapter 2 Processing and retention period of personal information
① Personal information is processed and retained within the personal information retention and use period in accordance with the law or within the personal information retention and use period agreed upon when collecting personal information from users.
1. Member registration and management: Until app membership withdrawal
However, in the case of the following reasons, until the end of the relevant reason
1) If an investigation or investigation is in progress for violation of relevant laws and regulations, until the investigation or investigation is completed.
2) If a bond or debt relationship remains due to the use of the app, until the bond or debt relationship is settled.
3) In case of , until

2. Provision of goods or services: Until completion of supply of goods or services and completion of payment/settlement
However, in the following cases, until the end of the relevant period:
1) Records of transactions, such as labeling, advertising, contract details and performance, pursuant to the Act on Consumer Protection in Electronic Commerce, etc.
- Records of labeling and advertising: 6 months
- Records of contract or subscription cancellation, payment, supply of goods, etc.: 5 years - Records of consumer complaints or dispute resolution: 3 years
2) Storage of communication confirmation data in accordance with the 「Communication Secrets Protection Act」
- Subscriber telecommunication date and time, start/end time, counterpart subscriber number, frequency of use, transmitting base station location tracking data: 1 year
- Computer communication, internet log records, access point tracking data: 3 months

Chapter 3 Personal information items processed
We are processing the following personal information items.
1. Member registration and management
• Items: Name, gender, date of birth, phone number, email address
2. Providing goods or services
• Items: Name, date of birth, address, phone number, email address, credit card number, bank account information

Chapter 4 Provision of personal information to third parties
The service provider processes the user's personal information only within the scope specified in 'Article 1 Guide on Collection and Use of Personal Information', and personal information is only processed when there is a separate prior consent of the user or a special request under relevant laws. Provided to 3rd party.
① Information provided to third parties without prior consent based on relevant laws and regulations
1. When it is provided in a form that does not identify a specific individual as necessary for statistical compilation, academic research, or market research
2. When requested by a state agency pursuant to relevant laws and regulations
3. When there is a purpose of investigating a crime or there is a request from the Information and Communication Ethics Committee
4. If there is a request in accordance with the procedures prescribed by other relevant laws and regulations

Chapter 5 Entrustment of Personal Information Processing
① To ensure smooth personal information processing, the service provider entrusts personal information processing tasks as follows.
Person who is entrusted (trustee)Consignment workcontact
To be confirmed laterPayment & RefundTo be confirmed later
② When concluding a consignment contract, the service provider shall, in accordance with Article 26 of the Personal Information Protection Act, prohibit processing of personal information other than for the purpose of performing consignment work, technical and managerial protection measures, restrictions on re-entrustment, management and supervision of the trustee, and matters related to responsibilities such as compensation for damages. is specified in documents such as contracts, and we supervise whether the trustee handles personal information safely.
③ If the details of the entrusted work or the trustee changes, we will disclose it through this personal information processing policy without delay.

Chapter 6 Overseas transfer of personal information
The service provider does not provide personal information to other overseas businesses. However, in order to fulfill contracts for the provision of information and communication services and improve user convenience, personal information processing work is transferred overseas as follows.
purposeitemDate and methodRetention periodCompany and country
Website user statistics and service informationDate of visit, service use history, access IP information, cookiesTransmitted via encrypted network when providing service24 months from the date of contract termination or import date, whichever comes firstGoogle/USA
App user statistics and service improvementDate of visit, service use history, access IP information, cookiesTransmitted via encrypted network when providing service24 months from the date of contract termination or import date, whichever comes firstApple/USA

Chapter 7 Personal information destruction procedures and methods
① When personal information becomes unnecessary, such as when the personal information retention period has passed or the purpose of processing has been achieved, the service provider destroys the personal information without delay.
② In cases where personal information must continue to be preserved pursuant to other laws and regulations despite the expiration of the personal information retention period agreed upon by the user or the purpose of processing has been achieved, the personal information may be transferred to a separate database (DB) or stored in a different storage location. Preserve.
③ The procedures and methods for destroying personal information are as follows.
1. Destruction procedure
The service provider selects the personal information that requires destruction and destroys the personal information with the approval of the service provider's personal information protection manager.
2. Destruction method
The service provider destroys personal information recorded and stored in the form of electronic files so that the records cannot be reproduced, and personal information recorded and stored in paper documents is destroyed by shredding or incineration.

Chapter 8 Measures to ensure the safety of personal information
The service provider does its best to safely manage users' personal information to prevent personal information from being lost, stolen, leaked, altered or damaged, and takes necessary technical, managerial and physical measures.
1. Management measures: Establishment and implementation of internal management plan, regular employee training
2. Technical measures: Management of access rights to personal information processing systems, installation of access control systems, encryption of unique identification information, etc., installation of security programs.
3. Physical measures: Server access control

Chapter 9 Rights of users and legal representatives and methods of exercising them
To protect the personal information rights of users (or their legal representatives), the service provider has prepared the following exercise methods.
① User rights and how to exercise them
1. View or edit: User information
2. In addition, you may request suspension of processing or deletion of personal information through writing, e-mail, etc.
3. If you request correction or deletion of errors in personal information, the service provider will not use or provide the personal information until correction or deletion is completed.
4. Requests for correction or deletion of personal information cannot be requested if the personal information is specified as the subject of collection in other laws and regulations.
5. The service provider verifies whether the person making the request, such as a request for viewing, a request for correction or deletion, or a request for suspension of processing, is the person making the request in accordance with the user's rights.

② Legal representative's rights and methods of exercise
1. If an agent, such as the user's legal representative or a person authorized to exercise the user's rights (viewing, correction, suspension of processing, deletion), must submit a power of attorney in the form of Annex No. 11 of the Enforcement Rules of the Personal Information Protection Act.
2. The service provider verifies whether the person making the request, such as a request for viewing, a request for correction or deletion, or a request for suspension of processing, is a legitimate agent in accordance with the user's rights.

Chapter 10 Matters concerning the installation, operation and refusal of automatic personal information collection devices
① Cookie
Service providers use 'cookies' to store usage information and retrieve it from time to time in order to provide individualized services to users. Cookies are a small amount of information that the server used to run the website sends to the user's computer browser and are sometimes stored on the hard disk of the user's PC computer.
1. Purpose of use of cookies: They are used to provide optimized information to users by understanding their visiting and usage patterns for each service and website visited.
2. If you refuse to store cookies, you may have difficulty using customized services.
3. Allow or reject cookie installation: Users have the option to install cookies. By selecting options for each web browser, they can allow or reject all cookies or require confirmation each time a cookie is saved. Here's how to specify whether to allow cookie installation:
DivisionMenu
Internet ExplorerTools menu > Internet Options > Privacy tab > Personal information processing level
ChromeSettings menu > Select Show advanced settings > Privacy-content settings > Cookie level settings
FirefoxOptions menu > Privacy > History - Custom Settings > Cookie level settings
SafariSettings menu > Privacy tab > Cookie and website data level settings
② advertising identifier
The service provider automatically collects the customer's service usage history through cookies and advertising identifiers and provides it to the advertising business (Google Admob). Advertisers use this to conduct customized advertisements. Cookies and advertising identifiers collected by Bitori are not linked to other personal information and do not identify individuals. Additionally, advertisers do not use the information provided by Vitori to identify individuals. Users can opt out of receiving these customized advertisements at any time, in which case random advertisements rather than customized advertisements will be displayed. Here's how to opt out of ADID/IDFA collection:
DivisionMenu
AndroidSettings > Google (Google Settings) > Advertising > Opt out of ad customization
iOSSettings > Privacy > Advertising > Limit Ad Tracking

Chapter 11 Personal Information Protection Manager
① The service provider is responsible for overall handling of personal information, and appoints a personal information protection manager as follows to handle user complaints and provide relief for damages related to personal information processing.
‣ Personal information protection officer
Name: YangKoo Kang
Contact : beatories@gmail.com

② Users may inquire about all personal information protection-related inquiries, complaint handling, damage relief, etc. that arise while using the service provider's service (or business) to the personal information protection manager and responsible department. The service provider will respond and process the user's inquiries without delay.

Chapter 12 Changes to Personal Information Processing Policy
① This privacy policy is effective from November 25, 2023.

Comments

Popular posts from this blog

Beatory Terms of Use

  Terms of Use Article 1 (Purpose) These terms and conditions were created to establish the rights, obligations, responsibilities, and procedures between the service provider and members when using drowsiness prevention and related services provided by Beatory (hereinafter referred to as ‘Service Provider’). Article 2 (Definition) In these Terms and Conditions, terms are defined and used as follows. 1. “Service” refers to all related services provided by the service provider through the member’s terminal (including various wired and wireless devices such as mobile phones and tablet PCs). 2. “Member” refers to customers who use the Service by accessing the Service and entering into a service agreement with the Service Provider in accordance with these Terms and Conditions. 3. “ID” is the SNS account used by the member to identify the member and provide services. 4. “Tokens” are service data that members pay to perform health checks and prevent drowsiness, and can be obtained by watching

Simkung ilji Terms of Use

  Terms of Use Article 1 (Purpose) These terms and conditions were created to establish the rights, obligations, responsibilities, and procedures between the service provider and members when using the Simkung ilji service provided by Beatory (hereinafter referred to as ‘Service Provider’). Article 2 (Definition) In these Terms and Conditions, terms are defined and used as follows. 1. “Service” refers to all related services provided by the service provider through the member’s terminal (including various wired and wireless devices such as mobile phones and tablet PCs). 2. “Member” refers to customers who use the Service by accessing the Service and entering into a service agreement with the Service Provider in accordance with these Terms and Conditions. 3. “ID” is the SNS account used by the member to identify the member and provide services. 4. “Tokens” are service data that members pay to record their Simkung and can be obtained by watching advertisements, etc. Article 3 (Posting an