Privacy Policy

SOLTECH protects your privacy

Privacy Policy

Soltech Co., Ltd. (hereinafter referred to as the ‘Company’) values ​​the personal information of customers and complies with the Act on Utilization Promotion of Information and Communication Network and Information Protection.

Through the personal information handling policy, the company informs you how and what purpose the personal information provided by customers are used, and what measures are taken to protect the personal information.

The use of our website is generally possible without providing the personal data. Personal data such as email addresses are provided voluntarily whenever possible. Such data will not be passed on to third parties without your explicit permission.

* This policy is effective from 23rd October, 2020.

1. Items of personal information processed

The company collects the following personal information for Q&A, response to quotation inquiries, and sending newsletters.

  1. Required information

    – Your name, Delivery address, Phone number, Email address

  2. The following information may be generated and collected during the service use process or business processing process.

    – Service usage record, access log, cookie, access IP information

2. Purpose of collecting personal information

The company uses the collected personal information for the following purposes.

  1. Quotations, sample requests, Q&A service
  2. Use for marketing and advertisement:Delivery of advertising information such as events, identification of access frequency, or statistics on service use of subscribers

3. Method of collecting personal information

The company collects personal information entered by users and information automatically generated by your computer (cookies, IP etc.).

4. Processing and retention period of personal information

In principle, after the purpose of collecting and using personal information is achieved, the information is destroyed without delay. However, if it is necessary to preserve it according to the provisions of the relevant laws and regulations, the company keeps the personal information for a certain period stipulated by the relevant laws and regulations as follows.

  1. Customer e-mail and counseling details provided at the time of Q&A/quotation inquiry  – Preservation grounds: collection of records for customer inquiries and estimates, identification of access frequency, or statistics on service use of subscribers
      – Retention period: 3 years
  2. Customer’s e-mail based on application of newsletter subscription  – Preservation grounds: advertising information such as events, identification of access frequency, or statistics on service use of subscribers
      – Retention period: After the purpose of use is achieved, the information is destroyed without delay
  3. Delivery of advertising information such as events, identification of access frequency, or statistics on member service use
      – Preservation grounds: Protection of Communications Secrets Act
      – Retention period: 3 months

5. Matters concerning the destruction of personal information

In principle, after the purpose of collecting and using personal information is achieved, the company destroys the information without delay. The destruction procedure and method are as follows.

  1. Destruction procedure

    The information provided by the subscriber for membership registration, etc., is transferred to a separate DB (separate filing cabinet in the case of paper form) after the purpose is achieved and it is destroyed after certain storage period scheduled according to the reasons for information protection based on internal policies and other related laws (refer to retention and use period).

    Personal information transferred to a separate DB is not used for any purpose other than abovementioned, unless required by law.

  2. Expiration date

    The personal information of users shall be within 5 days from the end of the retention period, if the retention period of personal information has elapsed, and when the personal information becomes unnecessary, such as achieving the purpose of processing personal information, abolition of the service, or the end of the business, etc. The personal information will be destroyed within 5 days from the date it is recognized as unnecessary to process.

  3. Method of destruction

    Personal information stored in electronic file format is deleted using a technical method that cannot reproduce the record.
    Personal information printed on paper is destroyed by shredding or incineration

6. Matters concerning the rights and duties of the subject of information and legal representative and how to exercise the rights

  1. The subject of information may exercise the following rights related to personal information protection at any time.
    • Request to view personal information
    • Request for correction in case of errors
    • Delete request
  2. Rights can be exercised in writing, e-mail, fax, etc. in accordance with the form of Attachment No. 8 of the Enforcement Regulations of the Personal Information Protection Act, and the company will take action without delay.
  3. If the information subject requests correction or deletion of personal information errors, etc., the Company will not use or provide the personal information until the correction or deletion is completed.
  4. The exercise of rights can be done through an agent such as the legal representative of the subject of information or a person who has been delegated. In this case, you must submit a power of attorney in accordance with the form of Attachment 11 of the Enforcement Regulations of the Personal Information Protection Act.

7. Information on the person in charge of personal information protection and the department in charge

In order to protect customer’s personal information and to handle complaints related to personal information, the company appoints the relevant department and personal information manager as follows.

Personal Information Protection Officer

  • Overseas Business Team Olivia Kim

  • Tel : +82-70-4628-5223
  • E-mail : wkim@soltech.co.kr

Personal Information Protection Officer

  • Overseas Business Team Olivia Kim

  • Tel : +82-70-4628-5223

  • E-mail : wkim@soltech.co.kr

You can report all personal information protection-related complaints arising from using the company’s services to the person in charge of personal information or the department in charge. The company will provide prompt and sufficient answers to users’ reports.

The following organizations are separate from the company, and if you are not satisfied with the results of handling the personal information complaint and damage relief, or if you need more help, please contact below.

  • Personal Information Infringement Report Center (operated by Korea Internet & Security Agency)

    – Responsibility: Report of personal information infringement, request for consultation
    – Homepage: privacy.kisa.or.kr
    – Phone: (without area code) 118
    – Address: (138-950) Personal Information Infringement Report Center, Korea Internet & Security Agency, 135 Jung-daero, Songpa-gu, Seoul

  • Personal Information Dispute Mediation Committee (operated by Korea Internet & Security Agency)
    – Responsibility: Report of personal information infringement, request for consultation
    – Homepage: privacy.kisa.or.kr
    – Phone: (without area code) 118
    – Address: (138-950) Personal Information Infringement Report Center, Korea Internet & Security Agency, 135 Jung-daero, Songpa-gu, Seoul

  • Supreme Prosecutors’ Office Cyber ​​Crime Investigation Division: 02-3480-3573 (www.spo.go.kr)

  • National Police Agency Cyber ​​Security Bureau: (without area code) 182 (http://www.police.go.kr/www/security/cyber.jsp)

8. Matters concerning the installation, operation of automatic personal information collection devices and rejection

The company operates ‘cookies’ that store and retrieve your information from time to time. Cookies are very small text files that the server used to operate the website sends to your browser and are stored on your computer’s hard disk.

The company uses cookies for the following purposes.

  1. Purpose of use of cookies or such

    You have the option of installing cookies. Therefore, you can allow all cookies by setting options in your web browser, check each time a cookie is saved, or refuse to save all cookies.

    Provides targeted marketing and personalized services through analysis of the access frequency and visit time of members and non-members, identifying users’ tastes and interests and tracking traces, and identifying the degree of participation in various events and the number of visits

  2. How to reject cookie settings

    As a method of rejecting cookie settings, you have the option of selecting at your web browser that can accept all cookies, check each time you save cookies, or refuse to save all cookies.

    Example of setting method (for Internet Explorer) : Tools at the top of the web browser> Internet Options> Personal Information
    However, if you refuse to install cookies, there may be difficulties in providing the service.

9. Measures to secure the safety of personal information

  1. Minimization and training of personnel handling personal information

    We are implementing measures to manage personal information by designating employees who is in charge of handling personal information and limiting the management to the person in charge only.

  2. Technical measures against hacking, etc.

    In order to prevent leakage and damage of personal information by hacking or computer viruses, we install security programs, perform periodic updates and inspections, install systems in areas where access is controlled from outside, and monitor and block technically and physically.

  3. Encryption of personal information
    For important data, separate security functions such as encrypting files and transmission data or using a file lock function are used.

  4. Storage of access records and prevention of forgery

    The records of access to the personal information processing system are kept and managed for at least 6 months, and the security function is used to prevent forgery, theft, and loss of access records.

  5. Restricted access to personal information

    Necessary measures are taken to control access to personal information by granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.

  6. Use of locking device for document security

    Documents and auxiliary storage media containing personal information are stored in a safe place.

  7. Access control for unauthorized persons

    A separate physical storage place where personal information is stored is established and access control procedures are established and operated.