The Jecheon Mobility Manufacturing Engineering Center (hereinafter referred to as the 'Company') regards the personal information of users as important and complies with the "Act on Promotion of Information and Communication Network Utilization and Information Protection" and the Personal Information Protection Act. Through the Privacy Policy, we inform you of the purposes and methods of using the personal information you provide, as well as the measures taken to protect personal information. The Company will announce any changes to the Privacy Policy through website notices (or individual notices). The Company's Privacy Policy contains the following contents.
- 1. Personal information collected and collection methods
- 2. Purposes of collecting and using personal information
- 3. Sharing and provision of collected personal information
- 4. Outsourcing of personal information processing
- 5. Retention and use period of collected personal information
- 6. Procedures and methods of personal information destruction
- 7. Measures to ensure the security of personal information
- 8. Rights of users and legal representatives and methods of exercise
- 9. Installation, operation, and refusal of automatic collection devices for personal information
- 10. Personal information management officer and department in charge of personal information
- 11. Obligation to notify
This policy will be effective from May 1, 2024.
1. Personal information collected and collection methods
2. Collection and Use of Personal Information
The company utilizes the collected personal information for the following purposes:
- Providing feedback and management for customer inquiries such as inquiries related to the company, service/product inquiries, and website inquiries.
3. Sharing and Provision of Collected Personal Information
The company does not generally provide the user's personal information to external parties. However, exceptions may apply in the following cases:
- When users have given prior consent.
- When there are requests from investigative agencies in accordance with legal procedures and methods prescribed by law for investigative purposes.
4. Outsourcing of Personal Information Processing
The company does not generally outsource the processing of user's personal information to external parties. However, exceptions may apply in the following cases:
- When users have given prior consent.
- When there are requests from investigative agencies in accordance with legal procedures and methods prescribed by law for investigative purposes.
5. Retention and Use Period of Collected Personal Information
The information related to customer inquiries such as inquiries related to the company, service/product inquiries, and website inquiries is destroyed promptly upon the provision of feedback.
6. Procedure and Method of Personal Information Destruction
The company promptly destroys the collected personal information once the purpose of collection and use has been achieved. The procedure and method of destruction are as follows:
- Procedure: The information provided by customers is stored for a certain period according to internal policies for information protection (refer to retention and use period) and then destroyed.
- Method: Personal information in paper form is shredded or incinerated, and electronic files are deleted using technical methods that cannot regenerate records.
7. Measures for Ensuring the Security of Personal Information
The company implements the following technical, managerial, and physical measures to ensure the security:
- 1) Establishment and Implementation of Internal Management Plans: The company establishes internal management plans to protect personal information.
- 2) Minimization and Education of Personnel Handling Personal Information: Access control to the database system handling personal information is managed by granting, changing, and revoking access rights, and intrusion prevention systems are used to control unauthorized access from external sources.
- 3) Storage and Prevention of Tampering of Access Records: Access records (web logs, summary information, etc.) are stored and managed for at least 6 months, and security functions are used to prevent tampering, theft, or loss of access records.
- 4) Technical Measures against Hacking and Access Control for Unauthorized Individuals: The company installs security programs and conducts regular updates and checks to prevent leakage and damage of personal information due to hacking or computer viruses. Systems are installed and monitored and blocked technically/physically in restricted areas to prevent unauthorized access. Network traffic control (monitoring) is conducted to detect attempts such as illegal modification of information.
8. Rights of Users and Legal Representatives, and Method of Exercise
Users and legal representatives can view or correct personal information registered at any time. Requests for viewing, correcting, and deleting personal information can be made by contacting the personal information manager by phone or email. After confirming the identity, actions will be taken promptly. If a user requests correction of personal information errors, the information will not be used or provided until the correction is completed. Furthermore, if incorrect personal information has already been provided to a third party, the correction results will be promptly notified to the third party for correction. The company handles personal information that has been terminated or deleted at the request of users or legal representatives in accordance with the "Retention and Use Period of Personal Information Collected by the Company" and ensures that it cannot be accessed or used for other purposes.
9. Installation, Operation, and Refusal of Automatic Collection Devices for Personal Information
The company does not operate devices that automatically collect personal information generated during the use of internet services such as cookies.
10. Personal Information Manager and Department in Charge of Personal Information
In order to protect users' personal information and handle complaints related to personal information, the company has designated the following relevant department and personal information manager:
- 1) Department in Charge of Personal Information Management
- Department :
- Phone Number :
- Email :
- 2) Personal Information Manager
- Name :
- Phone Number :
- Email :
Users can report all complaints related to personal information protection while using the company's services to the personal information manager or the department in charge. The company will provide prompt and sufficient responses to users' complaints. For any other needs regarding reports or consultations related to personal information infringement, please contact the following organizations:
- 1. Personal Information Dispute Mediation Committee (www.kopico.go.kr): 02-2100-2499
- 2. Cyber Crime Investigation Division, Supreme Prosecutors' Office: 02-3480-3571 (http://www.spo.go.kr/)
- 3. Cyber Safety Bureau, National Police Agency: 182 (without area code) (http://cyberbureau.police.go.kr/)
Individuals who have suffered damage to their rights or interests due to actions taken by the head of a public institution or unauthorized actions in violation of the provisions of Article 35 (Access to Personal Information), Article 36 (Correction or Deletion of Personal Information), or Article 37 (Suspension of Processing of Personal Information) of the Personal Information Protection Act may request administrative adjudication in accordance with the Administrative Adjudication Act. For more information about administrative adjudication, please refer to the website of the Legislation and Judiciary (http://www.moleg.go.kr).
11. Obligation of Notification
If there are any additions, deletions, or modifications to the current privacy policy, the company will notify the changes through the 'Notice' section on the homepage at least 7 days prior to the revision.