Hyundai Technology Machinary Co., Ltd.
Hyundai Technology Machinary Co., Ltd.
The Company uses the collected information of users for the following purposes. The Company agrees that it will obtain consent from the users, if the Company desires to use the information other than those expressly stated in this Policy.
The Company collects personal information for the following purposes: confirmation of intention to join the membership, identification/authentication for the provision of membership service, maintenance and management of membership, identification under the Real-name system, prevention of illegal use of services, confirmation of consent of a legal representative when collecting personal information of children under the age of 14, and record-keeping for notice/notification, complaint-handling, and dispute resolution.
The Company collects personal information for the identification of complainant, confirmation of complaint, contact/notice for investigation, notification of process outcome, etc.
The Company collects personal information for the provision of service, content customized service, identity authentication, etc.
The Company collects personal information for the provision of events and advertising information, and participation opportunities.
File name : HyundaiTMC Co., Ltd. – Items collected: email, mobile phone number, address, password, name, service use history, access log, cookies, access IP information
- Method: via website
- Basis for retention: Act on Promotion of Information and Communications Network Utilization and Information Protection
- Retention period: 3 years
- Relevant statutes: Credit Information Use and Protection Act: 3 years
① HyundaiTMC Co., Ltd. collects and retains personal information within the use and retention period under the statutes or within the use and retention period agreed upon when collecting personal information from the users.
② The collection and retention period for personal information is as follows:
Personal information related to website membership and management is retained and used for the above purposes for up to 3 years from the date of consent for collection and use.
- Basis for retention : Act on Promotion of Information and Communications Network Utilization and Information Protection
- Relevant statutes : Credit Information Use and Protection Act: 3 years
① The right to view, correct, delete, and suspend processing of personal information at any time
② The right pursuant to Paragraph 1 may be exercised in writing, e-mail, fax, etc. in accordance with Article 41 Paragraph 1 of the Enforcement Decree of the Personal Information Protection Act, and the Company will take action without delay.
③ The right pursuant to Paragraph 1 can be exercised through the legal representative or delegated person of the data subject. In this case, you must submit a power of attorney in the form of Attachment No. 11 of the Enforcement Rules of the Personal Information Protection Act.
④ The rights to request view and suspend processing of personal information may be restricted in accordance with Article 35 (5) and Article 37 (2) of the Personal Information Protection Act.
⑤ The request for correction and deletion of personal information cannot be requested if the personal information is subject to other laws.
⑥ The Company confirms whether the person who made the request, such as a request for access, a request for correction or deletion, or a request for suspension of processing, is the person or a legitimate agent according to the rights of the data subject.
① The items collected by the Company are as follws :
- Required : Email address, phone number, address, password, name
- Optional :
In principle, the Company, without delay, destroys personal information concerned after the achievement of the purpose for the collection and use of personal information. The procedures, deadlines and methods for destruction are as follows.
The information that users offer is moved to a separate database after the information is used for the intended purpose, stored for a certain period of time under the internal policy and relevant legislation, or immediately destroyed. The information transferred to a separate database is not used for any other purpose than being retained unless specified by law.
Personal information is deleted within five days when the retention period expires. Personal information is destroyed within five days from the date on which the personal information is recognized as unnecessary, such as the achievement of the purpose of personal information, the abolition of service, or termination of business.
Personal information in the form of electronic files is deleted in technical ways that prevent any record recovery. The information printed on paper is destroyed through paper shredder or incineration.
The Company does not run ‘cookies’ that often store and search the user information.
▶ Personal Information Officer:
Contact number :
※ Please note you will be directed to the accountable department.
▶ Accountable Department
Personal Information Officer :
Contact number :
The Company handles the users’ privacy with technological and managerial, physical approaches to prevent loss, theft, leakages, alteration, and compromise and secure stability of the information as follows:
Measures are taken to manage personal information by designating employees who handle personal information and limiting access to personal information.
In order to prevent leakage and damage of personal information caused by hacking or computer viruses, the Company installs security programs, periodically updates and checks, installs systems in areas where access is controlled from outside, and technically/physically monitors and blocks them. .
User’s personal information is stored and managed with an encrypted password, so only the user can access to it. For important data, a separate security function is used, such as encrypting files and data or using a file lock function.
Documents and auxiliary storage media containing personal information are stored in a safe place with a file lock function.
A separate physical storage location for personal information is prepared and access control procedures are established and operated.