INTOPS, where each customer's personal information is immensely valued and protected at all costs
INTOPS Co., Ltd. ('https://www.intops.co.kr/') protects the privacy and interests of users in accordance with the Personal Information Protection Act and to help you handle your grievance, we have the following policy:
○ This policy takes effect on January 1, 2021.
1. Items to be collected, retention period, purpose of collection·use
INTOPS Co., Ltd. ('https://www.intops.co.kr/') collects and use personal information as follows.
A. Items to be collected, retention period and purpose of collection
Purpose of collection·use
Items to be collected·used
Checking identification of inquirer, checking inquiries, contact for investigate facts, notification of results of processing, etc.
Name, phone number, email address, records of use
1. In principle: Upon completion of the purpose of Q&A or request from an data subject for destruction of personal information
2. However, in case of falling under following cases, until the end of such period
Records of consumer’s complaint or dispute settlement: for three years (Act on the Consumer Protection in Electronic Commerce, etc.)
B. Personal information
processed is used solely to the extent of the above-mentioned purposes. In case
of any change in such purposes, we will ask your consent in advance.
2. Rights·obligations of data subject and legal proxy
Users, as data subject, can exercise rights described as follows.
① Data subject can exercise his/her right against INTOPS Co., Ltd., at any time, to request viewing, correction of, deletion of and suspension of processing of personal information, and withdrawal of consent to the personal information processing
② Users can exercise rights set forth in Paragraph 1 in writing or via email, fax, etc. in accordance with Paragraph 1 of Article 41 of Enforcement Decree of the Personal Information Protection Act, and INTOPS Co., Ltd will take an action immediately.
③ Exercise of rights prescribed in Paragraph 1 can be conducted by a representative who is a legal proxy of data subject or who is delegated, etc. and in which case, power of attorney shall be submitted in accordance with the attached Form 11 of Enforcement Decree of the Personal Information Protection Act.
④ In terms of requests to view or suspend processing of personal information, the rights of data subject may be limited by Paragraph 5 of Article 35 and Paragraph 2 of Article 37 of Personal Information Protection Act.
⑤ With respect to a request of correction or deletion of personal information, users cannot request the deletion of personal information of such subject if relevant personal information is specified as information subject to collection under any statute.
⑥ INTOPS Co., Ltd. confirms that the person who made the request, such as request for viewing, correction or deletion, or request for suspension of processing under the data subject's right, is the person or rightful proxy.
3. Destruction of personal information
In principle, INTOPS Co., Ltd. destroys users’ personal information without delay upon the achievement of the purpose of personal information processing. Destruction procedures, deadlines and methods are described as follows. If personal information has to be kept in accordance with applicable laws, it shall be destroyed immediately after the period for keeping by using means which prevent any record from being recovered. In which case, personal information separately stored and managed shall not be used for any purpose other than the retention purpose unless required by laws.
Information entered by the user is transferred to a separate DB (separate documents in the case of paper) after the purpose is achieved and stored after a period of time or immediately destroyed in accordance with internal policies and other relevant laws and regulations. At this time, personal information transferred to the DB will not be used for other purposes unless required by law.
If the retention period of users’ personal information is over, it will be destroyed within 5 days of the end of the retention period, and if such personal information becomes unnecessary, such as achieving the purpose of processing personal information, abolishing the service, or terminating the business, the Company will destroy such personal information within 5 days of the date when it is deemed unnecessary
Information in electronic files will be destroyed by technical means to prevent any record from being recovered, and information printed on paper will be shredded with a shredder or destroyed through incineration
4. Matters concerning installation·operation and refusal of personal information auto collection devices
INTOPS Co., Ltd. does not use ‘cookies’ as means of storing and retrieving data subject’s information on use from time to time.
5. Creating a privacy officer
① To undertake responsibilities for overall tasks and to handle data subject’s complaints and remedies, regarding personal information processing, INTOPS Co., Ltd. has appointed the privacy officer in charge of personal information protection as follows.
▶ Privacy officer
Name: Yoon Hyun Bum
Title: Team leader
Contact: 031-441-4181, firstname.lastname@example.org,
- You will be directed to the department in charge of personal information protection.
▶ Privacy department
Department: Human Resources Team
Contact: 031-441-4181, email@example.com,
② Data subjects can inquire of the privacy officer and privacy department about any matter concerning personal information protection-related inquires, complaints, remedies, etc. caused by using the service (or business) of INTOPS Co., Ltd. (‘https://www.intops.co.kr/’). INTOPS Co., Ltd. (‘https://www.intops.co.kr/’) will respond promptly to the data subject’s inquiries.
7. Measures for ensuring of personal information
In accordance with Article 29 of Personal Information Protection Act, INTOPS Co., Ltd. takes technical/organizational and physical measures necessary to ensure safety as follows.
① Encryption of personal information
The user's personal information is stored and managed with a password, so only the user can know it, and important data uses a separate security function, such as encrypting files and transmitted data or using file locking.