Privacy Policy

Privacy Policy

The company ABKO complies with the Constitution's 'privacy, freedom and confidentiality of communications.' Avoid risks that may arise from illegal activities caused by leaks from some immoral companies and individuals, and provide quality information services to members of ABKO to protect the members ' personal information. This is in accordance with Article 7 of the Privacy Guide designated by the Ministry of Information and Communication, which is set out below.

-This privacy policy may change in response to changes in government laws and guidelines and policy changes by ABKO.F13

The ABKO is very important to our members ' privacy and has 'privacy regulations and privacy guidelines' established by the Ministry of Information and Communication under the Act on Promotion of Information and Communications Network Utilization. Through the Privacy Policy, ABKO will inform you of the uses and methods for which the personal information provided by the members is used and what actions are being taken to protect their privacy.

1. Purpose and use of personal information

Member information and log information obtained from the member registration and data obtained at the time of sign - in by ABKO is used as statistical data to operate the company ABKO, Advertisements and events posted on the ABKO’s homepage are intended to provide a better service to members and never use their personal information commercially with any organization, In the event that the scope, purpose and purpose of use of information collected by ABKO is changed, we will certainly ask for your prior consent and provide quality service for each individual member, etc.

2. Retention and utilization of personal information collected

In principle, after the purpose of personal information collection and utilization has been achieved, the information shall be destroyed without delay.
However, the following information shall be retained for the period specified for the following reasons :

  • ① Privacy information on withdrawal from membership
  • - Preservation items : Name, resident registration number, ID, email address, address, phone number provided by the member
  • - The reasons for preservation : to prevent bad users from rejoining and to cooperate with investigation and to violate their rights, such as defamation.
  • - Retention period : 1 month after withdrawal from membership
  • ② Commercial-related personal information
  • - Preservation items : Commerce history
  • - Conservation grounds : laws on consumer protection in commercial law, electronic commerce, etc.
  • - Retention period : Records on contract or subscription withdrawal : 5 years
  • - Records on payments and supply of goods : 5 years
  • - Records on consumer complaints or dispute handling : 3 years

3. Procedures and methods of personal information destruction

In principle, the company destroys such information without delay after the purpose of personal information collection and utilization has been achieved or the period of retention and utilization has expired. The destruction procedures and methods are as follows.

  • ① Procedure for destruction
  • The information you enter for membership registration is subject to internal policy and other related laws after the purpose has been achieved (see Retention and utilization period). It is stored and destroyed for a period of time.
    This personal information shall not be used for any purpose other than its existence except by law.
  • ② Methods of destruction
  • The personal information printed on paper is crushed or destroyed through a grinder or incineration, and personal information stored in electronic file form is deleted using technical methods that can’t reproduce the records.

4. Providing and sharing personal information

In principle, we use your personal information only for the purpose of collecting and using it and do not disclose it to others or other agencies. Except in the following cases.

  • ① In case users agree in advance
  • Before information is collected or provided, you will be informed of who your business partner is, why and how long you need it and how it is protected and managed. 
    If you do not agree, we will not collect any additional information or share it with your business partners.
  • ② In case there is a request from the investigation agency in accordance with the regulations of the Act or in accordance with the procedures and methods set forth in the Act for investigation purposes ;

5. Information on the installation, operation, and refusal of a personal information automatic collection device

To provide personalized and personalized service to each of you, we use a ' cookie ' to store and retrieve your information from time to time. 
Cookies are stored on your computer's hard disk as a small set of data that the server used to run the website sends to your browser.

  • ① Purpose of use of cookies
  • Target marketing and personalized services are provided through analysis of the frequency of members and non-members ' access or visit times, tracking and tracking their tastes and interests, as well as the degree of participation in various events and the number of visits
  • ② How to reject cookie settings
  • ② How to reject cookie settings
  • Examples of how to set up (for Internet Explorer)
  • - Tools at the top of the web browser > Internet Options > Privacy
  • - However, if cookies are not installed, some services that require login may not be available.

6. Technological and administrative measures for personal information protection

  • ① Technical countermeasures
  • - Your personal information is password protected, and sensitive data is protected through separate security functions by encrypting files and transfer data or by using the File Lock function.
  • - We are taking steps to prevent damage caused by computer viruses by using a vaccine program. The vaccine program is updated periodically.
    In the event of a sudden outbreak of a virus, it is applied immediately after the vaccine is released to prevent personal information from being compromised.
  • - We use a security device (SSL or SET) to securely transmit personal information on the network using a cryptographic algorithm.
  • - To prevent your personal information from leaking by hacking, we are using devices that block intrusion from outside and install intrusion detection systems on every major server for 24 hours..
  • ② Management measures
  • - In addition to the above efforts, you should also be careful not to expose your password to third parties. Always be careful not to let passwords,
  • especially passwords, go through PCs installed in public places.
  • . It is recommended that you use your ID and password only and change your password frequently.
  • - We strictly limit employees who handle personal information to those who are responsible for the management of personal information, and those who are responsible for the business's handling of personal information, and highlight compliance with this policy through frequent training.

7. The rights of users and legal representatives and how they are exercised

You and your legal representative may check or modify the personal information registered to you at any time, or may request you to terminate your subscription.
To check and modify personal information of users or children under 14 years of age, click 'My Information Management' 'at our home and' 'Help Desk' 'at the time of sign - up to view personal information.Or, please contact the Director of Personal Information Management by writing, phone or e-mail without delay.
If you have requested correction for errors in your personal information, you will not use or provide such personal information until you have completed the correction.
In addition, if the wrong personal information has already been provided to a third party, the results of the correction will be notified to the third party without delay to ensure the correction takes place.
The company shall not process personal information that has been revoked or deleted at the request of the user or legal representative as specified in' 'Retention and utilization period of personal information collected by the Company' and shall use such information for other purposes.

8. . Personal Information Management Manager and Consultation Report

In order to protect our customers ' personal information and to handle complaints regarding personal information, we have a personal information management manager.
If you have any questions regarding your customer's personal information, please contact your personal information manager or personal information manager below.

  • • Director of Personal Information Management
  • - Statement : Lee Seung-heon
  • - Member : Design planning team
  • - Contact us at 02-749-131111 /
  • - Fax : 02-749-2221

  • • Personnel in charge of personal information management
  • - Statement : Lee Seung-heon
  • - Member : Design planning team
  • - Contact us at 02-749-131111 /
  • - Fax : 02-749-2221

If you need consultation on personal information breaches, you can contact the Personal Information Infresh Report Center, the Internet Crime Investigation Center, and the Cyber Terror Response Center of the National Police Agency.

  • - Personal Information Infresh Reporting Center (tel : 1336)
  • - Internet Crime Investigation Center (tel : 02-3480-3600
  • - Police Agency Cyber Terror Response Center (tel : 02-392-0330)

9. Attachment

A jurisdictional actIn the event of addition, deletion, or modification of the contents as a result of a change in policy or security technology, we will notify you through a notice on our site from 7 days before the date of the change.
This Privacy Policy will take effect on 16 February 2009.
Privacy Policy Change Notice Date : 9 February 2009
Date of implementation of Privacy Policy : 16 February 2009

  • • Youth Protection Policies and Activities
  • We believe that in order to ensure that young people can grow into healthy individuals, we can not provide information to adolescents under 19 years of age, based on the Act on the Utilization of Information Networks and the Protection of Information Act. In order to strictly punish harmful information, such as pornography and illegal acts, and unethical and reflective acts, the company conducts the following activities.
  • - Establishing plans to protect young people from harmful information
  • - restrictions on access to and administrative measures for youth harmful information
  • - Education for the protection of youth from information trends for information and communication workers
    - Damage counseling and high-story treatment due to harmful information on teenagers
    - Other items necessary to protect young people from the trend of youth
  • • Child protection manager
  • - Statement : Lee Seung-heon
  • - Member : Design planning team
  • - Contact us at 02-749-131111 /
  • - Fax : 02-749-2221

  • • Youth protection personnel
  • - Statement : Lee Seung-heon
  • - Member : Design planning team
  • - Contact us at 02-749-131111 /
  • - Fax : 02-749-2221

  • • Date of final revision : 10 March 2017