PRIVACY

Privacy Statement

  In order to protect the personal information of the customer and to prevent the damage caused by leakage of personal information,JoyCoin takes the customer's personal information very seriously, and we comply with the related laws and regulations that information and communication service, such as the Act on Promotion of Information Network Usage and Information Protection, and the Personal Information Protection Act

  Our privacy policy is subject to change due to changes in laws or guidelines related to the protection of personal information or changes in our policies, so please check with us whenever you visit our site

 

General Rules

 JoyCoin(hereinafter referred to as "the Company") is committed to protecting the privacy of users\' personal information and is committed to protecting the personal information that the user provides to the company while using the company\'s services Accordingly, the Company complies with the personal information protection regulations of the related laws and regulations and the personal information protection guidelines established by the Ministry of Information and Communication, which should be complied with by the providers of information and communication services, such as the Promotion of Information Network Usage and Information Protection Act

  The Company will disclose through its Privacy Policy how and in what manner personal information provided by users is being used and what measures are being taken to protect personal information

  The company discloses its privacy policy at the front page of the homepage so that users can easily view it at any time

  The privacy policy of the company may change from time to time due to changes in the laws and guidelines of the government or changes in the company\'s internal policy Users are requested to check the privacy policy on the first page of the website from time to time

1. Agreement to collect personal information

  The Company shall establish a procedure by which users can click the [Accept] button or the [Cancel] button on the contents of the company's personal information handling method or terms and conditions, if you click the [Accept] button, you agree to the collection of personal information

2. Purpose of usage and collection of personal information

Personal information means information about an individual who is alive and includes information that can identify the individual by the name, date of birth, etc included in the information (even if the information alone can not identify a particular individual, including those that can be easily identified and combined with)

Personal information collected about individual customers and the purpose of collection and use are as follows

- Name, ID, Password, Passport number (for foreigners only), Email address: Confirm your identity and confirm your customership

- Your bank account, a copy of your photo ID (cover up the details other than your birth date), mobile number: ID verification for payment and withdrawal

- Optional: Materials to provide personalized services

- Preventing fraudulent use of fraudulent customers and preventing unauthorized use

3. Preventing fraudulent use of fraudulent customers and preventing unauthorized use

When a user joins a customer to use a customership service, the company receives online information that is essential for providing the service   The essential information you receive when you sign up is your name, email address, and so on Also, in order to provide high quality service, user can input optional phone number and bank account number And we can also request personal information for statistical analysis or offer of prizes during surveys or events at the exchange

We do not collect sensitive personal information (such as race and ethnicity, ideology, creed, hometown and homeland, political orientation and criminal record, health status, and sex life) that may be of concern to your basic human rights violations If we collect inevitably, we will ask for your prior consent And, in any case, the information you enter will not be used for any other purpose other than for the purpose previously provided to you, and will not be leaked out

4. Retention and use period of personal information collected

When a company collects personal information of a user, the period of retention is until customership termination (including withdrawal application, withdrawal of directorship) In addition, at the time of termination, the Company destroys the personal information of the user and instructs the third party to destroy the personal information provided to the third party However, if there is a necessity to preserve it in accordance with laws and regulations such as commercial law, we have transaction history and minimum basic information for the period of preservation prescribed by laws and ordinances In addition, we will keep your personal information for the duration of your promised period if you notify the user in advance of the period of retention, if the period of retention has not elapsed and if the individual consents of the user

- Records on contract or withdrawal of subscription: 5 years

- Record of payment and goods supply: 5 years

- Records of consumer complaints or disputes: 3 years

In the event that a user requests access to transaction information, etc, which is held with the consent of the user, the Company shall take measures so that it can be read and confirmed without delay

5 Procedures and methods of personal information destruction

In principle, the personal information of the user is destroyed without delay when the purpose of collecting and using the personal information is achieved And the procedure and method of destroying company's personal information is as follows

Destruction procedure

- The information entered by the user for customership purposes is transferred to a separate DB after the purpose has been achieved (in the case of paper, separate documents) According to internal policies and other relevant laws and regulations, it will be destroyed after a certain period of storage

Destruction Methods

- Personal information printed on paper is crushed or destroyed by crushing

- Personal information stored in the form of electronic files is deleted using a technical method that can not reproduce the record

6 Regarding the user's personal information management (reading, correcting, deleting, etc)

Users can log in to the JoyCoin website (www.joycoin.kr) at any time and read or correct the user's personal information by changing the customer's information In addition, we will correct if you request by e-mail or in writing to the person in charge of personal information management on the company's homepage However, the customer ID and the name can not be corrected

Users may withdraw your consent to withdraw or terminate your consent to the collection and use of your personal information and to withdraw your consent to third parties through e-mail, telephone, fax or other means In this case, the user must provide his / her ID and e-mail address for proof of identity

7 Matters concerning the operation of cookies(cookies)

In order to provide customized services tailored to the customers, the company operates 'cookies' (cookies) to store and retrieve information from time to time The Company identifies your computer with respect to cookie management, but does not personally identify you

The user has a choice of 'cookies' And the user can accept all cookies by selecting [Tools]> [Internet Options]> [Security]> [User Defined Level] in the web browser, check each time a cookie is saved, or refuse to store all cookies However, if you refuse to store all cookies, you will not be able to use the services provided by the company through cookies

8Measures to Ensure the Safety of Personal Information

The Company, pursuant to Article 29 of the Personal Data Protection Act, has the following technical, administrative and physical measures to ensure safety:

Minimization and training of personal information handling staff

We designate employees who handle personal information and limit them to the person in charge, and implement measures to manage personal information

Regular self-audit conducted

We conduct our own audits on a regular basis (quarterly basis) to ensure the safety of handling personal information

Establishment and implementation of internal management plan

We have established and implemented an internal management plan for the safe handling of personal information

Encryption of personal information

The personal information of the user is encrypted and stored and managed so that only the user can know it, and the important data is using separate security functions such as encrypting the file and transmission data or using the file lock function

Technical measures against hacking

The company installs security programs, periodically updates and checks, installs systems from outside controlled areas, and technically and physically monitors and blocks them to prevent leakage and damage of personal information caused by hacking or computer viruses

Restrict access to personal information

We take necessary measures to control access to personal information through granting, modifying, and deleting access to the database system that handles personal information, and we control unauthorized access from outside by using an intrusion prevention system

Keeping connection logs and preventing forgery

We keep and manage the records of access to the personal information processing system for at least six months, and we use security features to prevent forgery, theft and loss of access records

Using a lock for document security

We keep the documents containing the personal information and the auxiliary storage medium in a safe place with a lock

Access control to unauthorized persons

We keep separate physical storage places for personal information and set up access control procedures for them

9 Personal Information Management Officer and Person in Charge

The company is doing its best to make sure that you use the good information securely In case of any incidents that are against the notice to you in protecting personal information, the person in charge of personal information management is responsible

The responsibility for maintaining the security of the password of the user ID is related to the user himself / herself The company does not ask the user directly about the password in any way, so please be careful not to let the password leak to the other person Especially if you are online in a public place

Despite the company's technical remedies, we are not liable for damage to information due to unforeseen accidents caused by basic network dangers such as hacking

The company has designated the personal information administrator and person in charge of collecting opinions and complaints about personal information, and the contact information is as follows [Personal information administrator]