Privacy Policy

The Platform is provided and controlled by EMEL Ventures Co., Ltd (“company”). We are committed to protecting and respecting your privacy.
By accessing or using our website, services, applications, products and content (that include but are not limited to the Platform) (collectively, the “Services”), you acknowledge that you have read this policy and that you understand your rights in relation to your personal data and how we will collect, use and process it. If you do not agree with this policy in general or any part of it, you should not use our Services. 
This policy took effect on February 29, 2019, and was revised on June 7, 2021, the Company will make public notice of it through posting it on the bulletin board of Company's website.

Article 1 (Articles and methods of collection of personal information collected)

The company is collecting personal information as below for customer counseling, etc.
- Name, email, phone number, service history

Article 2 (The purpose of collecting and using personal information)

1.	The company collects personal information in the following ways.
- Customer Call Reception Mail ( 
2.	The company uses the personal information collected for the following purposes.
- Processing and reporting on service request details and answering customer calls

Article 3 (Providing and Sharing Personal Information)

In principle, the company does not provide users' personal information to the outside. However, exceptions are made in the following cases.
- Where a request is made by an investigative agency pursuant to the provisions of Acts and subordinate statutes or in accordance with the procedures and methods prescribed by statutes for the purpose of investigation

Article 4 (Entrustment of handling personal information collected)

1. The company entrusts personal information processing as follows for smooth personal information processing.
Entrusted Company Purpose of Entrustment
2. When signing a contract, the company specifies information prohibition, technical and managerial protection measures, restrictions on re-entrustment, management and supervision of the trustee, and compensation for damages. If the contents of the entrusted work or the trustee are changed, we will disclose it without delay through this personal information processing policy.

Article 5 (Period of Retention and Use of Personal Information)

In principle, after the purpose of collecting and using personal information is achieved, the relevant information shall be destroyed without delay. However, the following information shall be preserved for the period specified for the following reasons.
(Reason for holding information by internal policy)
Login ID, name, email, phone number
¯ Reason for retention: Processing and reporting on customer request tasks and sending operational reports
¯ Preservation period: When the operation contract is terminated

Article 6 (Procedures and Methods for Destruction of Personal Information)

In principle, the company shall destroy such information without delay after the purpose of collecting and using personal information is achieved. The destruction procedure and method are as follows.

1.	Destruction procedure
The information you enter for customer counseling, etc. will be stored for a certain period of time and destroyed according to internal policies and other related laws and regulations. This personal information is not used for any purpose other than being held unless it is under the law.
2.	Destruction method
¯ Personal information printed on paper is shredded with a shredder or destroyed through incineration, and personal information stored in an electronic file format is deleted using a technical method that cannot be played back.

Article 7 (Security)

The Company regard the security of personal information of uses as very important. The company constructs the following security measures to protect the users' personal information from any unauthorized access, release, use or modification. 
• Encryption of personal information
- Transmit users' personal information by using encrypted communication zone
- Store important information such as passwords after encrypting it
• Countermeasures against hacking
- Install a system in the zone the external access to which is controlled so as to prevent leakage or damage of users' personal information by hacking or computer virus.
• Establish and execute internal management plan
• Install and operate access control system
• Take measures to prevent forging or alteration of access record

Article 8 (The rights of users and legal representatives and their methods of exercise)

1.	Users and legal representatives may check or modify the personal information of themselves or children under the age of 14 at any time, and may request deletion.

2.	For personal information inquiry and correction of users or children under the age of 14, you can view, correct, or withdraw directly after the identification process. Or if you contact the person in charge of personal information management by writing, calling or email, we will take action without delay..

3.	If you request correction of an error in personal information, the personal information shall not be used or provided until the correction is completed. In addition, if the wrong personal information is already provided to the third party, we will notify the third party of the correction result without delay so that the correction can be made. Or if you contact the person in charge of personal information management by writing, calling or email, we will take action without delay.

4.	The company shall process personal information revoked or deleted at the request of the user or legal representative as specified in the "Period of Retention and Use of Personal Information collected by the company" and shall not be viewed or used for other purposes.

Article 9 (Matters concerning the installation and operation of automatic personal information collection devices and their refusal)

1.	The company installs and operates devices that automatically collect personal information such as cookies and sessions that store and retrieve your information from time to time. Cookies are tiny text files sent to your browser by the server used to run your company's website, stored on your computer's hard disk.

2.	The company uses cookies, etc. for the following purposes.
1)	Purpose of use, such as cookies
Providing personalized services by analyzing users' frequency of access, visiting hours, etc., identifying users' tastes and areas of interest, tracking traces, and identifying visits;

You have the option of installing cookies. Therefore, you may allow all cookies by setting options in your web browser, go through verification each time they are saved, or refuse to store all cookies.

2)	How to reject cookie settings
Example: Rejecting cookie settings allows you to accept all cookies, go through verification each time you save cookies, or refuse to save all cookies by selecting an option in the web browser you use.

Example of how to set it up (for Internet Explorer)
: Tools at the top of your web browser > Internet Options > Privacy
However, if you refuse to install cookies, there may be difficulties in providing services.

Article 10 (Personal Information Management Manager)

The company designates the relevant departments and the person in charge of personal information management as follows to protect the customer's personal information and deal with complaints related to personal information.

Personal Information Management Manager 
Phone number: 070-4333-1812

You can report any personal information related complaints that arise from using the company's services to the person in charge of personal information management or to the department in charge. The company will quickly and fully respond to the users' reports.

Announcement Date : June 07th, 2021
Effective Date : June 07th, 2021