개인정보 보호정책 | controlbit
top of page

<Controlbit> ('www.control-bit.com', hereinafter 'controlbit') is to protect users' personal information and rights and interests in accordance with the Personal Information Protection Act, and to smoothly handle users' grievances related to personal information. We have the following handling policy in place to do this.

<Controlbit> ('controlbit') will notify you through the website notice (or individual notice) when the company revises the privacy policy.

○ This policy is effective from January 1, 2019.

 

1. Purpose of processing personal information <controlbit> ('www.control-bit.com', hereinafter 'controlbit') processes personal information for the following purposes. The processed personal information will not be used for any purpose other than the following, and prior consent will be sought when the purpose of use is changed.

go. Website membership registration and management

Personal information is processed for the purpose of confirming the intention to become a member.



 

2. Personal information file status
The purpose of processing personal information files registered and disclosed by ('www.control-bit.com', hereinafter referred to as 'controlbit') in accordance with Article 32 of the Personal Information Protection Act is as follows.

1. Personal information file name: personal information file
- Personal information item: Email
- Collection method: website
- Basis for retention: None
- Retention period: 3 years
- Relevant laws: Records on collection/processing and use of credit information: 3 years



※ For other ('www.control-bit.com' or 'controlbit') personal information file registration information disclosure, the Ministry of Public Administration and Security's Personal Information Protection Comprehensive Support Portal (www.privacy.go.kr) → Personal Information Complaints → Personal Information Reading Requests, etc. → Please use the personal information file list search menu.
 

3. Processing and retention period of personal information

① <controlbit> ('controlbit') processes and retains personal information within the period of retention and use of personal information in accordance with laws and regulations or the retention and use of personal information agreed upon when collecting personal information from the information subject .

② Each personal information processing and retention period is as follows.

1.<Website membership registration and management>
Personal information related to <Website membership registration and management> is retained and used for the above purposes from the date of consent to collection and use until <3 years>.
- Basis of retention: None
-Related laws: Records on collection/processing and use of credit information: 3 years
- Reason for exception: None
 

4. Rights and obligations of information subjects and legal representatives and how to exercise them A user can exercise the following rights as a personal information subject.

① The information subject can exercise the right to view, correct, delete, and suspend processing of personal information at any time with respect to the control bit.
② The exercise of rights pursuant to Paragraph 1 can be done in writing, e-mail, fax, etc. in accordance with Article 41 Paragraph 1 of the Enforcement Decree of the Personal Information Protection Act for ControlBit, and ControlBit takes action without delay. I'll do it.
③ The exercise of rights pursuant to Paragraph 1 may be done through an agent such as a legal representative of the information subject or a person who has been delegated. In this case, you must submit a power of attorney in the form of Attachment No. 11 of the Enforcement Regulations of the Personal Information Protection Act.
④ The rights of the information subject may be restricted in accordance with Article 35 (5) and Article 37 (2) of the Personal Information Protection Act to request to view and suspend processing of personal information.
⑤ Request for correction and deletion of personal information cannot be requested if the personal information is specified as a collection target in other laws.
⑥ ControlBit confirms whether the person who made the request, such as a request for viewing, a request for correction or deletion, or a request for suspension of processing, is the person or a legitimate agent according to the rights of the information subject.


 

5. Create items of personal information to be processed

① <controlbit> ('www.control-bit.com', hereinafter 'controlbit') processes the following personal information items.

1<Website membership registration and management>
- Required items: Email
- Optional items:



 

6. Destruction of personal information <controlbit> ('controlbit'), in principle, destroys the personal information without delay when the purpose of processing personal information is achieved. The procedures, deadlines and methods of destruction are as follows.

-Destruction procedure
The information entered by the user is transferred to a separate DB (a separate document in the case of paper) after the purpose is achieved, and is stored for a certain period according to internal policies and other related laws or immediately destroyed. At this time, the personal information transferred to the DB will not be used for any other purpose unless it is in accordance with the law.

- Deadline
If the retention period of the personal information has elapsed, the user's personal information shall be stored within 5 days from the end of the retention period, when the personal information becomes unnecessary, such as achieving the purpose of processing personal information, abolishing the service, or terminating the business. The personal information is destroyed within 5 days from the date the processing is deemed unnecessary.

- Destruction method
Personal information printed on paper is shredded with a shredder or destroyed through incineration.


 

7. Matters concerning the installation, operation and rejection of automatic personal information collection devices

ControlBit does not use 'cookies' that store and retrieve the usage information of the information subject from time to time.
 

8. Created by the person in charge of personal information protection


① Controlbit ('www.control-bit.com', hereinafter 'controlbit') is responsible for overall personal information processing, and for handling complaints and damage relief from information subjects related to personal information processing, We also designate a person in charge of personal information protection.


▶ Person in charge of personal information protection
Name: Han Won-seop
Position: Team leader
Position: general manager
Contact:010-9117-4658, wshan@control-bit.com,
※ You will be connected to the department in charge of personal information protection.

▶ Department in charge of personal information protection
Department Name: Management Department
Contact Person : Wonseop Han
Contact:010-9117-4658, wshan@control-bit.com,
② The information subject is responsible for personal information protection for all personal information protection-related inquiries, complaint handling, damage relief, etc. and the department in charge. Controlbit ('www.control-bit.com' hereafter 'controlbit') will respond and handle inquiries from information subjects without delay.


 

9. Changes to the Privacy Policy

① This personal information processing policy is effective from the effective date, and if there are additions, deletions, or corrections of changes in accordance with laws and policies, we will notify you through a notice 7 days before the enforcement of the changes.


 

10. Measures to ensure the safety of personal information <controlbit> ('controlbit') is taking the following technical/administrative and physical measures necessary to ensure safety in accordance with Article 29 of the Personal Information Protection Act.

1. Conduct regular self-audits
To ensure the stability of personal information handling, we conduct regular (quarterly) self-audits.

2. Technical measures against hacking, etc.
<Controlbit> ('controlbit') installs a security program to prevent leakage and damage of personal information caused by hacking or computer viruses, and periodically updates and inspects it, installs the system in an area where access is controlled from outside, and It is physically monitored and blocked.

3. Access control for unauthorized persons
A separate physical storage location for personal information is established and access control procedures are established and operated.
 

bottom of page