Inquiry

Mamiel Co., Ltd.
Inquiry

    Customer Information

    Name

    Phone

    --

    E-mail

    @

    Contact Details

    Title

    Content

    Consent to Privacy Policy

    Consent to Privacy Policy

    MAMIL Co., Ltd. (hereinafter referred to as "MAMIL") complies with the regulations related to the protection of personal information, including the "Act on Promotion of Information and Communication Network Utilization and Information Protection, etc." and has enacted and disclosed the "Personal Information Handling Policy" (hereinafter referred to as the "This Policy") on its website. The protocol will inform you of the purpose and method for which personal information provided by users is used and what measures the company is taking to protect personal information. This policy may be changed from time to time in accordance with the company's policy to protect the user's personal information, and if important changes are made, the reason and details of the change will be notified on the website. Some types of personal information handling policies include the following.

    • 1. Purpose of Collection and Use of Personal Information

    • 2. Items and methods of collecting personal information

    • 3. Period of retention and use of personal information

    • 4. Procedures and methods for destroying personal information

    • 5. Provision and sharing of personal information

    • 6. Consignment of Personal Information Handling

    • 7. Matters concerning the installation/operation and rejection of automatic personal information collection devices

    • 8. Technical/Management Measures for Personal Information Protection

    • 9. Rights and obligations of users and legal representatives and methods of exercising them

    • 10. Personal Information Protection Officer and Personal Information Protection Manager

    • 11. Notification due to change of personal information handling policy

    General rule

    The term "personal information" means information on a living individual, such as a code, text, voice, sound, video, biometric characteristics, etc., which can identify the relevant individual by name, resident registration number, etc. (including those that can be easily combined with other information even if a specific individual cannot be identified only by the relevant information). The Protection of Customer Information is of utmost importance, and the Personal Information Protection Regulations under the Act on Promotion of Information and Communication Network Utilization, Information Protection, etc. and the Personal Information Protection Guidelines established by the Ministry of Information and Communication are followed. The Protection of Personal Information is notified of the purpose of collecting and using personal information provided by the customer through the Personal Information Protection Policy, and the measures taken to protect personal information are taken. The Protection of Personal Information Protection Policy is disclosed on the first screen of the website so that you can always easily see it, and the procedures necessary for revising the Personal Information Protection Policy are established for the continuous improvement of the Personal Information Protection Policy. In addition, when the Personal Information Protection Policy is revised, an enforcement date is given so that customers can easily recognize the revised information, and the reason and details of the change are notified to the customer through the website, etc. before implementing the changed Personal Information Protection Policy.

    1. Purpose of Collection and Use of Personal Information

    We collect minimal personal information for consulting and providing services for overall business introduction, and use it for the following purposes.

    • A. Answers to customer inquiries

    2. Items and methods of collecting personal information

    • A. Personal information collection items

      • We do not collect personal information through membership registration on the website. However, we operate an inquiry on the website.

      • Mandatory items: name, contact information, e-mail

    • B. Personal information collection items

      • For users of the following services, it is collected only when they agree to "collect and use personal information" when signing up for the first time.

    C. We do not collect sensitive personal information (race and ethnicity, ideology and creed, origin and place of origin, political orientation and criminal records, health status, and sex life) that is likely to violate the user's basic human rights.

    3. Period of retention and use of personal information

    In principle, after the purpose of collecting and using personal information has been achieved, the information shall be destroyed without delay. However, the following information shall be preserved for a period specified for the following reasons.

    • A. Reasons for the retention of information in accordance with the internal policy of the protocol

      • Personal Information for Inquiry

      • - Reason for preservation: Check the facts of this inquiry and guide the contents of the process

      • - Retention period: 1 year

    • B. Reasons for holding information under relevant laws and regulations

      • If it is necessary to preserve it in accordance with the provisions of related laws, such as the Commercial Act and the Consumer Protection Act in e-commerce, etc., Uijong stores member information for a certain period of time prescribed by related laws.

    4. Procedures and methods for destroying personal information

    In principle, the Uijong shall destroy the personal information without delay after the purpose of collecting and using it has been achieved. The procedure and method of destruction are as follows.

    • A. Reversal procedure

      • After the purpose is achieved, the information entered will be destroyed according to a separate internal policy and other reasons for information protection under related laws.
        The information entered by the user for inquiries, etc., will be stored for a certain period of time after the purpose is achieved according to a separate internal policy and other reasons for information protection under related laws and regulations (refer to the retention and use period).
        Personal information for which the purpose of the information has been achieved is not by law and shall not be used for any other purpose.
        Personal information on the homepage that has not been accessed and used for more than a year is destroyed.

    • B. Method of destruction

      • Personal information printed on paper is crushed with a shredder or destroyed through incineration.

      • Personal information stored in electronic file format is deleted using a technical method that cannot be played back.

    5. Provision and sharing of personal information

    In principle, Uijong does not provide the user's personal information to the outside world. However, exceptions are made in the following cases.

    • A. When users have agreed in advance

      • Prior to collecting or providing information, you will be asked to agree on who the business partner is, why what information is needed, and how long it will be protected and managed, and if you do not agree, you will not collect or share additional information.

    • B. Where an investigative agency is requested in accordance with the provisions of laws and regulations or in accordance with the procedures and methods prescribed in laws and regulations for the purpose of investigation

    • C. Where a particular individual is provided in an indistinguishable form for statistical purposes

    • D. Where a request is made in accordance with the procedures prescribed by other relevant laws such as the Act on Secrets of Real Name Financial Transactions, the Act on the Use and Protection of Credit Information, the Framework Act on Telecommunications, the Telecommunications Business Act, the Local Tax Act, the Consumer Protection Act, the Bank of Korea Act, the Criminal Procedure Act, etc

    6. Consignment of Personal Information Handling

    • A. Uijong does not entrust the handling of the user's personal information to an external company without the user's consent.

    • B. In the event of such a need in the future, we will notify the user in advance of the matters concerning the trustee, the period of entrustment, the relationship between the service provider and the trustee, and the scope of responsibility, and obtain prior consent if necessary.

    7. Consignment of Personal Information Handling

    Uijong operates cookies that store and find your information from time to time. A cookie is a tiny text file that the server that runs the website sends to your browser that is stored on your computer's hard disk and used for the following purposes.

    • A. Purpose of use of cookies, etc

      • It is used for target marketing and personalized services by analyzing the user's access frequency and visit time, identifying the user's taste and interests, tracking the level of participation in various events, and identifying the number of visits.

    • B. Installation/operation and rejection of cookies

      • Users have the option to install cookies. As a result, users can allow all cookies by setting options in the web browser, go through confirmation each time they are saved, or refuse to save all cookies.
        However, if you refuse to save cookies, some services that require login may have difficulty using them.
        Records about consumer complaints or disputes

      • - Reason for preservation: Consumer Protection in Electronic Commerce, etc. Act

      • - Retention period: 3 years

      • How to specify whether cookies are allowed to be installed (for Internet Explorer)

      • From the Tools menu, select Internet Options.

      • - Click the Privacy tab.

      • - You can set [Personal Information Handling Level].

    8. Technical/Management Measures for Personal Information Protection

    • A. Technical measures

      • Privacy is protected by passwords, and sensitive data is protected by separate security features, such as encrypting file and transfer data or using file locking.
      • is doing its best to prevent personal information from being leaked or damaged by hacking or computer viruses. We use the intrusion prevention system to control unauthorized access from outside and try to equip all possible technical devices to secure security in other systems.
      • Data is backed up from time to time in preparation for damage to personal information, the latest vaccine program is used to prevent leakage or damage of users' personal information, and personal information can be transmitted safely on the network through encryption communication.
    • B. Management measures

      • Personal information is protected by passwords, and important data is protected through separate security functions such as encrypting files and transmission data or using file lock functions. Some types of handling personal information are limited to the person in charge, and a separate password is assigned for this purpose to update it regularly, and the government always emphasizes compliance with the privacy policy through occasional training for the person in charge. The transfer of personal information-related handlers is carried out thoroughly while security is maintained, and the responsibility for personal information accidents after entering and leaving the company is clarified.
      • The client is striving to correct and correct any problems immediately if they are found by checking the implementation of the personal information handling policy and compliance with the person in charge through the personal information protection organization within the company. The client is not responsible for any problems caused by the leakage of personal information such as ID and password due to the user's own carelessness or Internet problems. Personal information and general data are not mixed and stored, but are stored separately through a separate server, and access is controlled by setting computer rooms and data storage rooms as special protected areas.

    9. Rights and obligations of users and legal representatives and methods of exercising them

    The data subject may at any time view the registered data subject's personal information, request correction, deletion, suspension of processing, or withdrawal of consent. If you want to view, correct or delete your personal information, suspend processing, or withdraw consent, contact the personal information protection manager in writing, by phone, or e-mail, and we will take action without delay through the identification process.

    • A. If the data subject requests correction of an error in personal information, the personal information shall not be used or provided until the correction is completed. In addition, if incorrect personal information has already been provided to a third party, the correction processing result will be notified to the third party without delay to take measures to ensure that the correction is made.

    • B. Personal information requested to be deleted by the data subject is processed in accordance with the retention and use period of personal information collected by the species and other laws and regulations, and is not accessible or used for other purposes.

    • C. The data subject should accurately input personal information in the latest state to prevent unexpected accidents. The data subject itself is responsible for the accident caused by the inaccurate information entered by the data subject, and if false information such as the theft of other person's information is entered, there may be a problem of violation of the law.

    • D. In addition to the right to protect personal information, the data subject has an obligation to protect itself and not infringe on other people's information. Care must be taken to prevent the personal information of the data subject from being leaked and not to damage the personal information of others, including posts. Failure to fulfill such responsibilities and damage the personal information and dignity of others may result in punishment under relevant laws and regulations.

    • E. Users and legal representatives can inquire about the registered personal information of themselves or children under the age of 14 at any time and may request deletion. In order to inquire and correct personal information of users or children under the age of 14, contact the personal information protection manager in writing, by phone, or by e-mail, and we will take action without delay after going through the identification process.

    • F. If a user or legal representative requests correction of an error in personal information, the personal information shall not be used or provided until the correction is completed. In addition, if incorrect personal information has already been provided to a third party, the correction processing result will be notified to the third party without delay for correction.

    • G. The protocol processes personal information canceled or deleted at the request of the user or legal representative as specified in the "Period of Retention and Use of Personal Information" and prevents it from being viewed or used for other purposes.

    10. Privacy Commissioner and Administrator

    Uijong is doing its best to ensure that users can safely use good information. In the event of an accident that goes against the information notified to the user in protecting personal information, the personal information protection officer is fully responsible. However, despite technical security measures, we are not responsible for damage to information caused by unexpected accidents caused by basic network risks such as hacking and various disputes caused by posts written by visitors.

    • [A personal data protector]

      • ㆍ Name :

      • ㆍ Position :

      • ㆍ Contact :

      • ㆍ E-mail :

    Users can report all personal information protection-related complaints arising from using our service to the personal information protection manager or the department in charge. If you need other reports or consultations on personal information infringement, please contact the agency below.

    • ㆍ Personal Dispute Mediation Committee (http://www.1336.or.kr/1336)

    • ㆍ Information Protection Mark Certification Committee (http://www.eprivacy.or.kr/02-580-0533~4)

    • ㆍ Cyber Investigation Division of the Supreme Prosecutors' Office (http://www.spo.go.kr/02-3480-3570)

    • ㆍ Cyber Security Bureau of the National Police Agency (http://www.ctrc.go.kr/02-392-0330)

    11. Notification due to change of personal information handling policy

    The current personal information handling policy was revised on April 1, 2016, and if there is any addition, deletion, or modification of the contents due to changes in the government's policy or security technology, it will be notified through the website.

    • ㆍ Personal Information Protection Policy Version Number : v3.0

    • ㆍ Date of implementation of the personal information protection policy : 2019-06-03

    • ㆍ Personal Information Protection Policy Version Number : v3.0

    I agree with the privacy policy