Soltech Co., Ltd. (hereinafter referred to as the ‘Company’) values the personal information of customers and complies with the Act on Utilization Promotion of Information and Communication Network and Information Protection.
Through the personal information handling policy, the company informs you how and what purpose the personal information provided by customers are used, and what measures are taken to protect the personal information.
The use of our website is generally possible without providing the personal data. Personal data such as email addresses are provided voluntarily whenever possible. Such data will not be passed on to third parties without your explicit permission.
* This policy is effective from 23rd October, 2020.
The company collects the following personal information for Q&A, response to quotation inquiries, and sending newsletters.
– Email, password
– Service usage record, access log, cookie, access IP information
The company uses the collected personal information for the following purposes.
The company collects personal information entered by users and information automatically generated by your computer (cookies, IP etc.).
In principle, after the purpose of collecting and using personal information is achieved, the information is destroyed without delay. However, if it is necessary to preserve it according to the provisions of the relevant laws and regulations, the company keeps the personal information for a certain period stipulated by the relevant laws and regulations as follows.
In principle, after the purpose of collecting and using personal information is achieved, the company destroys the information without delay. The destruction procedure and method are as follows.
The information provided by the subscriber for membership registration, etc., is transferred to a separate DB (separate filing cabinet in the case of paper form) after the purpose is achieved and it is destroyed after certain storage period scheduled according to the reasons for information protection based on internal policies and other related laws (refer to retention and use period).
Personal information transferred to a separate DB is not used for any purpose other than abovementioned, unless required by law.
The personal information of users shall be within 5 days from the end of the retention period, if the retention period of personal information has elapsed, and when the personal information becomes unnecessary, such as achieving the purpose of processing personal information, abolition of the service, or the end of the business, etc. The personal information will be destroyed within 5 days from the date it is recognized as unnecessary to process.
Personal information stored in electronic file format is deleted using a technical method that cannot reproduce the record.Personal information printed on paper is destroyed by shredding or incineration
In order to protect customer’s personal information and to handle complaints related to personal information, the company appoints the relevant department and personal information manager as follows.
Personal Information Protection Officer
Overseas Business Team Olivia Kim
Tel : +82-70-4628-5223
You can report all personal information protection-related complaints arising from using the company’s services to the person in charge of personal information or the department in charge. The company will provide prompt and sufficient answers to users’ reports.
The following organizations are separate from the company, and if you are not satisfied with the results of handling the personal information complaint and damage relief, or if you need more help, please contact below.
– Responsibility: Report of personal information infringement, request for consultation– Homepage: privacy.kisa.or.kr– Phone: (without area code) 118– Address: (138-950) Personal Information Infringement Report Center, Korea Internet & Security Agency, 135 Jung-daero, Songpa-gu, Seoul
Personal Information Dispute Mediation Committee (operated by Korea Internet & Security Agency)– Responsibility: Report of personal information infringement, request for consultation– Homepage: privacy.kisa.or.kr– Phone: (without area code) 118– Address: (138-950) Personal Information Infringement Report Center, Korea Internet & Security Agency, 135 Jung-daero, Songpa-gu, Seoul
Supreme Prosecutors’ Office Cyber Crime Investigation Division: 02-3480-3573 (www.spo.go.kr)
The company operates ‘cookies’ that store and retrieve your information from time to time. Cookies are very small text files that the server used to operate the website sends to your browser and are stored on your computer’s hard disk.
You have the option of installing cookies. Therefore, you can allow all cookies by setting options in your web browser, check each time a cookie is saved, or refuse to save all cookies.
Provides targeted marketing and personalized services through analysis of the access frequency and visit time of members and non-members, identifying users’ tastes and interests and tracking traces, and identifying the degree of participation in various events and the number of visits
As a method of rejecting cookie settings, you have the option of selecting at your web browser that can accept all cookies, check each time you save cookies, or refuse to save all cookies.
Example of setting method (for Internet Explorer) : Tools at the top of the web browser> Internet Options> Personal InformationHowever, if you refuse to install cookies, there may be difficulties in providing the service.
We are implementing measures to manage personal information by designating employees who is in charge of handling personal information and limiting the management to the person in charge only.
In order to prevent leakage and damage of personal information by hacking or computer viruses, we install security programs, perform periodic updates and inspections, install systems in areas where access is controlled from outside, and monitor and block technically and physically.
The records of access to the personal information processing system are kept and managed for at least 6 months, and the security function is used to prevent forgery, theft, and loss of access records.
Necessary measures are taken to control access to personal information by granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.
Documents and auxiliary storage media containing personal information are stored in a safe place.
A separate physical storage place where personal information is stored is established and access control procedures are established and operated.
Only fill in if you are not human
Already have an account? Sign in