<Raon Software> ('boomchiki.com', 'dokebicloud.com', 'DOKEBI, harmful content blocking artificial intelligence system', 'DOKEBI agent', 'SentinAl', hereinafter referred to as 'Raon Software') has the following processing policy to protect the personal information and rights and interests of users in accordance with the Personal Information Protection Act and to smoothly handle user grievances related to personal information.
Raon Software will notify you through the website announcement (or individual notice) if the company revises the privacy policy.
1. Purpose of processing personal information Raon Software processes personal information for the following purposes. The processed personal information will not be used for any purpose other than the following purposes, and prior consent will be sought if the purpose of use is changed.
1-1. Homepage membership and management
Personal information is processed for the purpose of confirming the member's intention to join, identifying and authenticating the person in accordance with the provision of membership services, maintaining and managing membership, identifying the person in accordance with the implementation of the limited identification system, preventing unauthorized use of services, and preserving records for various notices and notifications, grievance handling, and dispute settlement.
1-2. Provision of goods or services
We process personal information for the purpose of providing services, sending invoices, providing content, providing customized services, age verification, etc.
1-3. Utilization for marketing and advertising
Personal information is processed for the purpose of developing new services (products) and providing customized services, providing event and advertising information and participation opportunities, verifying the validity of the service, identifying the frequency of access or statistics on the member's use of the service, etc.
2. Status of personal information
2-1. Personal information items
- Email, password, login ID, and other personal settings necessary for the operation of the Daekobi app. - Collection method: Collection through the Daekobi membership registration screen, personalization items set when using the Daekobi app
3. Processing and retention period of personal information
3-1. Raon Software processes and retains personal information within the period of retention and use of personal information in accordance with laws and regulations or the period of retention and use of personal information agreed upon when collecting personal information from the information subject.
3-2. The period of processing and retention of each personal information is as follows.
-Rationale for retention: Use of personal information to provide services
- Retention period: For the duration of membership. (Immediate deletion in case of any form of withdrawal (voluntary withdrawal, forced withdrawal, etc.))
However, in the event of measures such as forced withdrawal due to fraudulent behavior of the user, the personal information (collected personal information items) of the user may be retained for 3 years in order to block the member from rejoining the service in order to protect the rights and interests of other users and to protect the property rights and services of Raon Software.
3-3. Storage place
Personal information is stored and managed in electronic form by using a separate specialized management company and is encrypted, and there is no documented personal information.
4. Rights and obligations of information subjects and legal representatives and how to exercise them The user may exercise the following rights as a personal information subject.
4-1. The information subject may exercise the right to view, correct, delete, or request the suspension of processing of personal information at any time against Raon Software.
4-2. The exercise of the rights under Paragraph (1) may be made to Raon Software in writing, by e-mail, or by facsimile transmission (FAX) in accordance with Article 41, Paragraph 1 of the Enforcement Decree of the Personal Information Protection Act, and Raon Software will take action without delay.
4-3. The exercise of the rights under Paragraph (1) may be made through an agent, such as the legal representative of the information subject or a person who has been delegated. In this case, you must submit a power of attorney in the form of Appendix No. 11 to the Enforcement Rules of the Personal Information Protection Act.
4-4. The rights of the information subject may be restricted in accordance with Article 35 (5) and Article 37 (2) of the Personal Information Protection Act.
4-5. A request for correction and deletion of personal information cannot be made if the personal information is specified as the subject of collection in another statute.
4-6. Raon Software shall verify whether the person making the request, such as a request for access, a request for correction or deletion, or a request for suspension of processing, is the person or a legitimate representative in accordance with the rights of the information subject.
5. Destruction of personal information
In principle, Raon Software destroys personal information without delay when the purpose of processing personal information is achieved. The procedure, deadline, and method of destruction are as follows.
5-1. Destruction Procedure
When a member voluntarily withdraws, personal information is immediately destroyed in accordance with internal policies and other relevant laws. However, in the event of measures such as forced withdrawal due to fraudulent behavior of the user, the personal information of the user (collected personal information items) may be retained for 3 years to block the re-subscription of the member in order to protect the rights and interests of other users and to protect the property rights and services of Raon Software.
5-2. Destroyed
The user's personal information will be immediately destroyed, which may take up to 7 business days due to operational conditions.
5-3. Destruction method
Information in the form of electronic files uses a technical method that makes it impossible to reproduce the records.
6. Matters concerning the installation, operation, and rejection of automatic personal information collection devices
Raon Software does not use 'cookies' that store and retrieve the usage information of the information subject from time to time.
7. Creating a personal information protection officer
Raon Software designates a personal information protection officer as follows to take overall responsibility for the processing of personal information and to handle complaints and damage relief of information subjects related to the processing of personal information.
<Personal Information Protection Officer> Name: Kim Min-suk Title: CEO Position: CEO Contact: [email protected] (* This links to the Personal Information Protection Department.)
You can contact the personal information protection officer and the department in charge for all personal information protection-related inquiries, complaints, and damage relief that occurred while using Raon Software's services (or business). Raon Software will answer and process inquiries from information subjects without delay
The Privacy Policy shall be applied from the effective date, and if there are any additions, deletions, and corrections of changes in accordance with laws and policies, we will notify you through a notice 7 days before the implementation of the changes.
8. Measures to ensure the safety of personal information
In accordance with Article 29 of the Personal Information Protection Act, Raon Software takes technical/administrative and physical measures necessary to ensure safety as follows.
8-1. Minimization and training of employees handling personal informationWe implement measures to minimize personal information by designating and limiting employees who handle personal information to those in charge.
8-2. Technical measures against hacking, etc.
To prevent leakage and damage of personal information by hacking or computer viruses, Raon Software installs security programs, periodically updates and inspects them, installs systems in areas with controlled access from the outside, and monitors and blocks them technically and physically.
8-3. Encryption of personal information
The user's personal information is stored and managed with encrypted passwords, so only the user can know it, and important data uses separate security functions such as encrypting file and transmission data or using a file lock function.
8-4. Restriction of access to personal information
Necessary measures are taken to control access to personal information by granting, changing, or canceling access rights to the database system that processes personal information, and unauthorized access from the outside is controlled using an intrusion prevention system.
8-5. Document Security
For documents that inevitably contain personal information (e.g., contracts), we store them in a safe place with a lock.
8-6. Access control for unauthorized persons
We establish and operate procedures to control access to unauthorized persons.