Birex Shop (hereinafter referred to as "company") considers your information important and has the following personal information processing policy. The company complies with the "Act on Promotion of Information and Communication Network Utilization and Information Protection" and informs you of the purpose and method of use of your information and what measures are taken to protect your personal information.
1. Items and methods of collecting personal information
The company collects personal information for membership, service provision, and other counseling, and may request personal information for collective statistical analysis or for the purpose of sending prizes during surveys or events. However, the company does not collect sensitive personal information (race and ethnicity, ideology and creed, origin and home, political orientation, and criminal records) that is feared to violate the user's basic human rights, and it must seek prior consent from the user if necessary. We would like to inform you that the information you have filled out will not be used for any other purpose other than the provision of the service or the purpose you have previously stated.
The collection of personal information is as follows.
1) Required items
- Personal members: name, trade name, email address, phone number, address
2) Personal information collection method
- Homepage, App
2, Purpose of collection and use of personal information
The company collects personal information for the following purposes:
1. Marketing and advertising of service information, etc.
- Development and specialization of new services, provision of services and advertising according to demographic characteristics,
Check product information and order information and settlement,
Communicate advertising information such as frequency of access, statistics on service use, events, etc.
3. Consent to collecting personal information
The company has received consent for the collection of personal information from you, and has prepared consent procedures for the collection of personal information in terms of use and personal information processing policies during the membership process within the company. If you check the "I agree with the Personal Information Processing Policy" section, I think you agree to collect personal information.
4. Providing and sharing personal information
The company shares its membership information with the merchant to provide better service to its members. The contents of the information you share are personal identification (name, contact number, email address, UID), etc. and do not share the information for any purpose other than service delivery and marketing purposes.
The company shall use users' personal information within the scope notified by "2. Purpose of Collection and Use of Personal Information" and shall not use beyond the scope or disclose users' personal information to the outside world in principle without prior consent from the users. However, exceptions are made in the following cases.
1. In case users agree to disclose it in advance
2. Where there is a request from the investigative agency in accordance with the provisions of the Act or in accordance with the procedures and methods prescribed in the Act for the purpose of investigation;
5. The period of retention and use of personal information
While the service user continues to use the service as a member of our company, the company will continue to hold the user's personal information and use it to provide the service.
If there is a request for abuse of the user's rights, prevention of abuse, violation of rights/reputation dispute, and investigation cooperation, the Company may keep the member's personal information for one year from the termination of the member's contract in preparation for the recurrence.
If it is necessary to preserve it under the regulations of the relevant statutes, such as the Consumer Protection Act, e-commerce Act, etc., the Company shall keep member information for a certain period of time prescribed by the relevant statutes. In this case, the company uses the information it keeps for the purpose of storing it, and the retention period is as follows:
A. Reasons for holding information according to the company's internal policy
The retention period of personal information for membership withdrawal is as follows.
1. Grounds for preservation: Disputes for violation of users' rights and cooperation in investigation
2. Retention period: 1 year
B. Reasons for the possession of information under relevant statutes
If it is necessary to preserve it under the regulations of the relevant statutes, such as the Consumer Protection Act, e-commerce Act, etc., the company shall keep member information for a certain period of time prescribed by the relevant statutes. In this case, the company uses the information stored only for the purpose of storage, and the retention period is as follows:
1. Records of consumer complaints or disputes
Reasons for Conservation: Consumer Protection Act in e-commerce, etc.
Retention period: 3 years
2. Records of visits
Reasons for Preservation: Act on the Promotion of Information and Communication Network Utilization and Information Protection, etc.
Retention period: 3 months
6. Procedures and methods for destroying personal information
In principle, the company shall destroy the personal information without delay after the purpose of collecting and using it has been achieved or the retention and use period has elapsed.
However, the information to be kept by the relevant statutes shall be stored for the period prescribed by the Act and then destroyed.
According to the Act on Promotion and Information Protection, the company shall safely store members' personal information separately from the members' personal information for one year. After the purpose of collecting and using personal information is achieved, the information shall be destroyed without delay.At this time, personal information separately stored and managed shall never be used for any other purpose except as otherwise provided in the statute.
Personal information that has been collected and used is destroyed in a way that cannot be reproduced, such as the end of the service and the arrival of a period of personal information retention agreed to by users.
The information imposed by the Act and the Act shall be separately stored and destroyed in a way that cannot be regenerated without delay after the period.
1. Destruction procedure
It will be destroyed after being saved for a certain period of time according to internal policies and other reasons for information protection under related laws and regulations.
This personal information shall not be used for any other purpose than it is held under the law.
2. Destruction method
Personal information printed on paper is pulverized with a grinder or destroyed through incineration.
Personal information stored in the form of electronic files is deleted using a technical method that cannot play history.
7. Matters concerning the installation and operation of an automatic personal information collection device and its refusal;
Cookie is a small data file that the HTTP server sends to your browser and is stored on your computer. The company will use these cookies to obtain your browser format or service usage, which will be used to provide you with customized services that are useful and more convenient for you.
You have a choice of cookies. By selecting an option from your web browser, you can accept all cookies, go through verification each time the cookies are saved, or refuse to save all cookies. However, if you refuse to save cookies, all services from the company that requires Log-in will be unavailable.
8. Technical and administrative measures for the protection of personal information
Your personal information is protected by a password. Only you can know the password of your account, and you can check and change your personal information only by yourself who knows the password. Therefore, you should not give your password to anyone. It is also recommended that you log out and exit the web browser after completing the operation. In particular, this procedure is more necessary to prevent personal information from being known to others when sharing or using computers in public places. The company is not responsible for personal information leakage due to user carelessness or Internet problems.
The company implements technical management measures for personal information protection as follows:
1. We are making every effort to prevent hacking in firewalls and security systems.
2. Secure information by installing SSL security server certificates when sending and receiving personal information.
3. Access to personal information is restricted to those who perform their duties and those who are forced to handle personal information when performing their duties, so that other employees cannot access it.
4. Personal information providers provide regular and frequent training.
5. We maintain the access records of the personal information processing system and regularly check and supervise them.
6. Protection measures are in place when printing and copying personal information.
9. Personal Information Management Officer
If you have any comments regarding the company's personal information processing policy, please send me an email and I will take action immediately and let you know the result of the processing. Personal information management manager and personal information protection manager are as follows.
Personal Information Management Officer
Privacy Manager
Name:
E-mail:
If you need to report or consult other personal information breaches, please contact the relevant agency.
1. Personal Information Dispute Mediation Committee: 02-2100-2499 (https://www.kopico.go.kr/)
2. Personal Information Infringement Report Center: 118 without number (http://privacy.kisa.or.kr)
3. Supreme Prosecutors' Office Advanced Crime Investigation Center: 02-3480-3571 (http://www.spo.go.kr/)
4. Cyber Terrorism Response Center, National Police Agency: 1566-0112 (http://www.netan.go.kr)
10. Schedule
The existing privacy policy will be revised to the privacy policy.
Any modifications or changes to the current privacy policy will be notified at least 7 days prior to the notice on the site.
Personal information processing policy implementation date: 01/12/2021
This Birex Shop Service Terms and Conditions (hereinafter referred to as "Terms") stipulates the rights and obligations of users (hereinafter referred to as "Member") who have become members of Birex Shop Services (hereinafter referred to as "Company") through prescribed procedures (Membership, etc.).
Therefore, please be aware of these terms and conditions when signing up as members and make sure that there is no inconvenience in using the service.
Article 1 [Purpose of Terms and Conditions]
These Terms and Conditions are intended to prescribe the terms and conditions of use and procedures of the app services provided by Birex Shop, the rights, obligations and responsibilities of the members and Birex Shop, and other necessary matters.
Article 2 [Posting and Revising Terms and Conditions]
1. The company posts the contents of these terms and conditions on the company's website or app so that those who want to become members of the company (hereinafter referred to as "subscription applicants") can easily understand the contents of these terms when they sign up.
2. If necessary, the company may amend these terms and conditions to the extent that they do not violate the relevant laws, such as the Regulation of Terms and Conditions Act and the Act on Promotion and Information Protection, etc. However, if the company revises the terms and conditions, it shall notify the members of the amendment by specifying the details of the amendment, the date and time of application, and the reason for the amendment, etc. seven days before the application date.
3. If a member does not explicitly express his/her intention of refusal until the time of application of the revised terms and conditions despite the company's announcement of the amendment under the preceding paragraph, the member shall agree to the revised terms and conditions, and it shall take effect. However, a member may express his/her intention to refuse the revised terms and conditions to the company and terminate the service use contract before the application of the revised terms and conditions.
Article 3 [Sign up for membership and contract for use]
1. The applicant agrees to the company's terms and conditions, activates the account through its unique (identification) account, password, and email address, and the company approves the application to obtain membership.
Article 4 [Precautions for Service Use]
1. If an accessor accesses a company's application by entering information that matches the access information approved by the company to use the service, all transactions made during that period are considered to be based on the member's true intention, and all transactions are recorded in the company's service system.
2. In relation to the service, the company grants the members the right to use the service according to the conditions set by the company. The company shall not lend, transfer, contribute, or provide contractual status to others, and shall not be liable for damages or disadvantages caused by such acts.
3. The company strives to provide services 24 hours a day 365 days a year, but if the telecommunication service is suspended by the telecommunication service provider for maintenance and maintenance of the equipment, or for other reasonable reasons, the service may be temporarily suspended. However, if an unavoidable reason arises that the company cannot notify or notify in advance, it may be notified or notified after the service resumes.
4. The company may exercise its right to claim damages by law against the members if damages are caused by their illegal activities.
5. The contents of the service may be changed or terminated due to the termination and modification of the contract with the partner company contracted to provide the service, and the commencement of the new service.
6. Recently, cryptocurrency has been increasingly used as a means of telecommunications fraud such as smishing and farming. The company considers the security of services a top priority to protect members' cryptocurrency from such crimes, but the actual security incidents are largely due to the member's personal disconnection, hacking of Wi-Fi networking, and hacking of personal information recorded in cloud services. To prevent such crimes, I would like to ask the members to actively cooperate with the company's security policy.
View the status of provision of personal information to third parties
Destruction of personal information
When and how should we destroy the personal information collected from the user?
The user's personal information shall be destroyed without delay after the purpose of collecting and using personal information has been achieved.
However, the information that must be kept by the relevant statutes shall be stored for the period prescribed by the Act and then destroyed. At this time, personal information separately stored and managed shall never be used for any other purpose except as otherwise provided in the statute.
In the case of electronic files, completely delete them using a technical method to prevent them from being restored and reproduced, and in the case of records, prints, written documents, etc., they shall be pulverized or destroyed by incinerated.
Long-term unused information according to the personal information validity system is managed as follows:
• A long-term unused user means a member who has no record of use for one year after using the company's service.
• For these members, personal information is separated into separate DBs and kept in a safe manner.
• Long-term hairdressers can reuse their accounts on request.
Other matters
The rights of users are protected as follows:
1. You can inquire and modify your personal information at any time.
• Company App: Menu > Settings
2. You can request withdrawal of consent/subscription regarding personal information provision at any time.
3. We do not collect personal information of children under the age of 14. However, if there is a request from a legal representative, the legal rights shall be guaranteed. (Reading, correction, deletion of children's personal information, and suspension of personal information processing)Old Power)
4. User's personal information will not be used or provided until correct modification is completed to use and provide accurate personal information when requesting correction or suspension of processing of personal information. If it is already provided to a third party, we will inform the recipient of the fact without delay so that the correction can be made.
5. Users (including legal representatives) may view, correct, suspend, withdraw consent, contact the person in charge or person in charge of the contract through customer center inquiries, written, telephone, e-mail, parent transmission, etc., and the company will take action without delay.
6. Users must keep their personal information up to date, and the user himself/herself is responsible for any problems caused by the user's inaccurate information input.
7. If you steal other people's personal information and sign up for membership and use of services, you may lose your qualification for users or be punished by laws related to privacy.
8. Users are responsible for maintaining security for their personal information, passwords, authentication information, etc. and cannot transfer or lend them to third parties.
We are making the following efforts to protect users' valuable personal information.
The company considers the user's personal information as the most valuable value and makes the following efforts in handling personal information:
We're encrypting your personal information.
The company sends users' personal information using encrypted communication sections, and encrypts and keeps important information such as passwords.
We're trying to protect against hacking or computer viruses.
The company is installing a system in an area where access from outside is controlled to prevent user's personal information from being leaked or damaged by hacking or computer viruses.
We have installed systems that can detect and block intrusions such as hackers to monitor them 24 hours a day, and we have installed a vaccine program to prevent the system from being infected with the latest malware or viruses.
We also continue to study new hacking/security technologies and apply them to our services. We minimize the number of people who have access to valuable personal information.
The company minimizes personnel handling personal information, establishes systematic standards for creating and changing passwords for database systems that hold personal information, and the ability to access personal information.
Executives and employees are regularly trained on the protection of users' personal information.
We conduct regular education and campaigns on personal information protection obligations and security for all employees who handle personal information.
We operate an organization dedicated to protecting personal information protection.
The company designates and operates the person in charge as follows to protect users' personal information, solve questions, and deal with complaints. Please feel free to contact us and we'll give you a quick and sufficient answer.
Director of Privacy
• Director:
• Position: Person in charge of personal information protection
• Contact:
Other. Additional policies
If there is additional, deletion, or modification of the above contents, the company will explain it to the users through the company's app notice at least 7 days before the date of implementation. However, we will let you know at least 30 days in advance of any changes that are important to your valuable rights or obligations.