Skip to main content

Simkung ilji Privacy Policy

 

Privacy Policy

Beatory (hereinafter referred to as ‘Service Provider’) establishes and discloses the personal information processing policy as follows in order to protect members’ personal information and handle related complaints quickly and smoothly in accordance with personal information protection laws.

Chapter 1 Purpose of processing personal information
Service providers process personal information for the following purposes. The personal information being processed will not be used for purposes other than the following, and if the purpose of use changes, necessary measures will be taken, such as obtaining separate consent in accordance with Article 18 of the Personal Information Protection Act. 

1. Membership registration and management
Personal information is processed for the purposes of confirming intention to become a member, identifying and authenticating oneself in accordance with the provision of membership services, maintaining and managing membership qualifications, preventing illegal use of services, various notices and notices, and handling grievances.
2. Provision of goods or services
We process personal information through product delivery, service provision, contract/invoice sending, content provision, customized service provision, identity verification, age verification, bill payment/settlement, and debt collection.

Chapter 2 Processing and retention period of personal information
① Personal information is processed and retained within the personal information retention and use period in accordance with the law or within the personal information retention and use period agreed upon when collecting personal information from users.
1. Member registration and management: Until app membership withdrawal
However, in the case of the following reasons, until the end of the relevant reason
1) If an investigation or investigation is in progress for violation of relevant laws and regulations, until the investigation or investigation is completed.
2) If a bond or debt relationship remains due to the use of the app, until the bond or debt relationship is settled.
3) In case of , until

2. Provision of goods or services: Until completion of supply of goods or services and completion of payment/settlement
However, in the following cases, until the end of the relevant period:
1) Records of transactions, such as labeling, advertising, contract details and performance, pursuant to the Act on Consumer Protection in Electronic Commerce, etc.
- Records of labeling and advertising: 6 months
- Records of contract or subscription cancellation, payment, supply of goods, etc.: 5 years - Records of consumer complaints or dispute resolution: 3 years
2) Storage of communication confirmation data in accordance with the 「Communication Secrets Protection Act」
- Subscriber telecommunication date and time, start/end time, counterpart subscriber number, frequency of use, transmitting base station location tracking data: 1 year
- Computer communication, internet log records, access point tracking data: 3 months

Chapter 3 Personal information items processed
We are processing the following personal information items.
1. Member registration and management
• Items: Name, gender, date of birth, phone number, email address
2. Providing goods or services
• Items: Name, date of birth, address, phone number, email address, credit card number, bank account information

Chapter 4 Provision of personal information to third parties
The service provider processes the user's personal information only within the scope specified in 'Article 1 Guide on Collection and Use of Personal Information', and personal information is only processed when there is a separate prior consent of the user or a special request under relevant laws. Provided to 3rd party.
① Information provided to third parties without prior consent based on relevant laws and regulations
1. When it is provided in a form that does not identify a specific individual as necessary for statistical compilation, academic research, or market research
2. When requested by a state agency pursuant to relevant laws and regulations
3. When there is a purpose of investigating a crime or there is a request from the Information and Communication Ethics Committee
4. If there is a request in accordance with the procedures prescribed by other relevant laws and regulations

Chapter 5 Entrustment of Personal Information Processing
① To ensure smooth personal information processing, the service provider entrusts personal information processing tasks as follows.
Person who is entrusted (trustee)Consignment workcontact
To be confirmed laterPayment & RefundTo be confirmed later
② When concluding a consignment contract, the service provider shall, in accordance with Article 26 of the Personal Information Protection Act, prohibit processing of personal information other than for the purpose of performing consignment work, technical and managerial protection measures, restrictions on re-entrustment, management and supervision of the trustee, and matters related to responsibilities such as compensation for damages. is specified in documents such as contracts, and we supervise whether the trustee handles personal information safely.
③ If the details of the entrusted work or the trustee changes, we will disclose it through this personal information processing policy without delay.

Chapter 6 Overseas transfer of personal information
The service provider does not provide personal information to other overseas businesses. However, in order to fulfill contracts for the provision of information and communication services and improve user convenience, personal information processing work is transferred overseas as follows.
purposeitemDate and methodRetention periodCompany and country
Website user statistics and service informationDate of visit, service use history, access IP information, cookiesTransmitted via encrypted network when providing service24 months from the date of contract termination or import date, whichever comes firstGoogle/USA
App user statistics and service improvementDate of visit, service use history, access IP information, cookiesTransmitted via encrypted network when providing service24 months from the date of contract termination or import date, whichever comes firstApple/USA

Chapter 7 Personal information destruction procedures and methods
① When personal information becomes unnecessary, such as when the personal information retention period has passed or the purpose of processing has been achieved, the service provider destroys the personal information without delay.
② In cases where personal information must continue to be preserved pursuant to other laws and regulations despite the expiration of the personal information retention period agreed upon by the user or the purpose of processing has been achieved, the personal information may be transferred to a separate database (DB) or stored in a different storage location. Preserve.
③ The procedures and methods for destroying personal information are as follows.
1. Destruction procedure
The service provider selects the personal information that requires destruction and destroys the personal information with the approval of the service provider's personal information protection manager.
2. Destruction method
The service provider destroys personal information recorded and stored in the form of electronic files so that the records cannot be reproduced, and personal information recorded and stored in paper documents is destroyed by shredding or incineration.

Chapter 8 Measures to ensure the safety of personal information
The service provider does its best to safely manage users' personal information to prevent personal information from being lost, stolen, leaked, altered or damaged, and takes necessary technical, managerial and physical measures.
1. Management measures: Establishment and implementation of internal management plan, regular employee training
2. Technical measures: Management of access rights to personal information processing systems, installation of access control systems, encryption of unique identification information, etc., installation of security programs.
3. Physical measures: Server access control

Chapter 9 Rights of users and legal representatives and methods of exercising them
To protect the personal information rights of users (or their legal representatives), the service provider has prepared the following exercise methods.
① User rights and how to exercise them
1. View or edit: User information
2. In addition, you may request suspension of processing or deletion of personal information through writing, e-mail, etc.
3. If you request correction or deletion of errors in personal information, the service provider will not use or provide the personal information until correction or deletion is completed.
4. Requests for correction or deletion of personal information cannot be requested if the personal information is specified as the subject of collection in other laws and regulations.
5. The service provider verifies whether the person making the request, such as a request for viewing, a request for correction or deletion, or a request for suspension of processing, is the person making the request in accordance with the user's rights.

② Legal representative's rights and methods of exercise
1. If an agent, such as the user's legal representative or a person authorized to exercise the user's rights (viewing, correction, suspension of processing, deletion), must submit a power of attorney in the form of Annex No. 11 of the Enforcement Rules of the Personal Information Protection Act.
2. The service provider verifies whether the person making the request, such as a request for viewing, a request for correction or deletion, or a request for suspension of processing, is a legitimate agent in accordance with the user's rights.

Chapter 10 Matters concerning the installation, operation and refusal of automatic personal information collection devices
① Cookie
Service providers use 'cookies' to store usage information and retrieve it from time to time in order to provide individualized services to users. Cookies are a small amount of information that the server used to run the website sends to the user's computer browser and are sometimes stored on the hard disk of the user's PC computer.
1. Purpose of use of cookies: They are used to provide optimized information to users by understanding their visiting and usage patterns for each service and website visited.
2. If you refuse to store cookies, you may have difficulty using customized services.
3. Allow or reject cookie installation: Users have the option to install cookies. By selecting options for each web browser, they can allow or reject all cookies or require confirmation each time a cookie is saved. Here's how to specify whether to allow cookie installation:
DivisionMenu
Internet ExplorerTools menu > Internet Options > Privacy tab > Personal information processing level
ChromeSettings menu > Select Show advanced settings > Privacy-content settings > Cookie level settings
FirefoxOptions menu > Privacy > History - Custom Settings > Cookie level settings
SafariSettings menu > Privacy tab > Cookie and website data level settings
② advertising identifier
The service provider automatically collects the customer's service usage history through cookies and advertising identifiers and provides it to the advertising business (Google Admob). Advertisers use this to conduct customized advertisements. Cookies and advertising identifiers collected by Bitori are not linked to other personal information and do not identify individuals. Additionally, advertisers do not use the information provided by Vitori to identify individuals. Users can opt out of receiving these customized advertisements at any time, in which case random advertisements rather than customized advertisements will be displayed. Here's how to opt out of ADID/IDFA collection:
DivisionMenu
AndroidSettings > Google (Google Settings) > Advertising > Opt out of ad customization
iOSSettings > Privacy > Advertising > Limit Ad Tracking

Chapter 11 Personal Information Protection Manager
① The service provider is responsible for overall handling of personal information, and appoints a personal information protection manager as follows to handle user complaints and provide relief for damages related to personal information processing.
‣ Personal information protection officer
Name: YangKoo Kang
Contact : beatories@gmail.com

② Users may inquire about all personal information protection-related inquiries, complaint handling, damage relief, etc. that arise while using the service provider's service (or business) to the personal information protection manager and responsible department. The service provider will respond and process the user's inquiries without delay.

Chapter 12 Changes to Personal Information Processing Policy
① This privacy policy is effective from November 25, 2023.

Comments

Popular posts from this blog

H・Beatory vs. Beatory

  Image by  Dariusz Sankowski  from  Pixabay H・Beatory vs. Beatory   H ・ Beatory Beatory 자가 건강점검 O O 졸음예방 X O 회원가입 X O 알림설정 X O Data  백업 및 복구 X O Download url Apple Store     Apple Store

Beatory Privacy Policy

  Privacy Policy Beatory (hereinafter referred to as ‘Service Provider’) establishes and discloses the personal information processing policy as follows in order to protect members’ personal information and handle related complaints quickly and smoothly in accordance with personal information protection laws. Chapter 1 Purpose of processing personal information Service providers process personal information for the following purposes. The personal information being processed will not be used for purposes other than the following, and if the purpose of use changes, necessary measures will be taken, such as obtaining separate consent in accordance with Article 18 of the Personal Information Protection Act. However, we do not provide services to children under the age of 14 and do not collect personal information related thereto. 1. Membership registration and management Personal information is processed for the purposes of confirming intention to become a member, identifying and auth...

Beatory 설명

  Image by  DaModernDaVinci  from  Pixabay 운전이나 공부, 독서를 하려는데 중간에 졸릴까 걱정 되십니까??? 그렇다면 지금 당장 비토리의 졸음 방지를 실행하십시오!!! 빅토리 download URL 당신이 활동을 하는 동안 졸지 않도록 최대한 도와 드리겠습니다. 다만 개인 차이나 오늘 상태에 따라 졸음을 잘 못 예측할 수도 있습니다. 따라서 졸음 방지를 100% 믿지 말고 활동 전 또는 활동 중간이라도 졸리면 충분한 휴식을 취할 것을 권고합니다. 졸음 방지는 패턴 분석 및 AI 학습에 의해 졸음을 예측합니다. 당신이 수 분 내에 졸을 가능성이 있으면 여러 방법으로 졸음 가능성을 알려 드릴 것입니다. 당신이 느끼기에 졸리지 않는데 졸을 가능성이 있다고 할 수 있습니다. 졸음 방지는 당신이 졸린 여부를 정확히 맞추는 것이 목적이 아닙니다. 졸음 방지는 당신이 활동을 하는 동안 졸지 않도록 도와주는 것이 목적입니다. 만약 예측이 틀리면 적극적인 피드백을 주십시오!! 졸리 다거나 졸리지 않다거나 말입니다. 적극적인 피드백만이 당신에게 맞는 졸음 예방 모델을 만들 수 있습니다. 비토리의 졸음 방지를 실행하기 위해서는 애플 워치가 있어야 합니다. 그리고 건강(health) 앱의 ‘심박수’와 ‘운동’에 대한 접근 권한이 있어야 합니다. 비토리는 졸음 방지 이외에도 심장 박동을 자가 진단 및 그 추이를 관찰할 수 있는 기능을 제공합니다. 혹시 심박 변화를 확인하는 것 만으로도 건강 상태를 확인할 수 있다는 사실 알고 계셨나요? 더욱 놀라운 사실은 심박수로 수명을 예측할 수 있다는 것입니다. 비토리는 심박데이터로 우리의 건강상태를 확인할 수 있는 대표적인 지표를 알려드립니다. 심박수: 비토리로 측정한 심박 데이터(BPM)의 평균 심박변이: 비토리로 측정한 심박 데이터의 표준편차 RMSSD: 인접한 심박 사이의 차이에 대한 제곱의 합을 평균하여 이에 대한 제곱근으로 계산 pNN50: 심박 사이의 차이가 50 m...