WILLTECH

  • Privacy Policy

Privacy Policy

1. Purpose of processing personal information

('hereinafter 'WillTech') processes personal information for the following purposes and shall not be used for any purpose other than the following
- Identifying yourself by confirming your intention to sign up, providing services to customers, certifying yourself, and maintaining your membership.The supply of goods or services, payment of the amount due to the provision of management, goods or services.Shipping, etc.

2. Processing and retention period of personal information

  • ① When collecting personal information from the information subjects, Wiltech processes and retains personal information within the period of personal information retention and use or the period of personal information under the Act and subordinate statutes.
  • ② Specific personal information processing and retention periods are as follows. Refer to the examples below and record the retention period, relevant laws, and grounds for the personal information processing and personal information processing. (Example) Subscription and management of customers: Until the service use contract or cancellation of membership subscription, but if the bond/debt relationship remains, until the settlement of the relevant bond/debt relationship
    - Supply records, such as withdrawal of contracts and subscriptions, payment, goods, etc. in e-commerce: 5 years
  • 3.The changes and details of the terms and conditions shall be disclosed by posting them on the operator's website.

3. The rights and obligations of the information subject and legal representatives and the users of the method of exercise may exercise the following rights as personal information subjects

  • ① The information entity may exercise the following privacy-related rights to Wiltech at any time
    • A. Request for reading personal information
    • B. Request correction in case of errors, etc.
    • C. Delete request
    • D. Request stop processing
  • ②Wiltech checks whether the person who made the request, such as a request for access, a request for correction or deletion, and a request for suspension of processing, is himself/herself or a legitimate representative.

4. Creating entries for personal information you process

  • ① Wiltech is processing the following personal information items
    • - Required: Email, mobile phone number, password, login ID, gender, date of birth, name
    • - Optional: Home address, hobbies
  • 2.Members who wish to join must apply for use with their real name and resident registration number, and only one ID can be applied.

The destruction of personal information ('WillTech') shall, in principle, destroy personal information without delay if the purpose of processing personal information has been achieved. The procedures, deadlines, and methods for destruction are as follows

  • - Destruction procedure
    • The information entered by the user is transferred to a separate DB after the purpose is achieved (in case of paper, separate documents) and stored for a certain period of time or immediately destroyed in accordance with internal policies and other related laws. At this time, personal information transferred to DB is not used for any other purpose except under the law.
  • - destroyed
    • If the user's personal information is unnecessary, such as achieving the purpose of processing personal information, abolishing the service, or terminating the project, the user's personal information shall destroy the personal information within five days from the date it is deemed unnecessary.

6. Matters concerning the installation, operation, and refusal of automatic personal information collection devices

  • ① To provide individual customized services, Wiltech uses 'cookies' that store usage information and bring it up frequently.
  • ② Cookies are small amounts of information that the server (http) used to run the website sends to the user's computer browser and can also be stored on a hard disk within the user's PC computer.
    • A. Purpose of using cookies: It is used to provide optimized information to users by identifying the types of visits and use of each service and website visited by users, popular search terms, security access, etc.
    • B. Installation•Operation and Rejection of Cookies: Tools at the top of the Web browser>Internet Options>Setting Options on the Privacy menu lets you refuse to save cookies.
    • C. Refusing to store cookies can cause difficulties in using customized services.

7. Create a person in charge of privacy

  • ① Wiltech is responsible for personal information processing and designates a person in charge of personal information protection as follows to handle complaints from information subjects and to remedy damages related to personal information processing.
    • ▶ Personal Information Protection Officer
    • name :
    • official responsibilities :
    • position :
    • contact information :
    • ※ You are connected to the department responsible for privacy.
    • ▶ Department of Privacy Department
    • Department name :
    • The person in charge :
    • contact information :
  • ② The information authority may contact the person in charge of personal information protection and the department in charge of all personal information protection inquiries, complaints, and damage relief caused by using Wiltech's service (or business). Wiltech will respond and handle inquiries from the information subjects without delay.

8. Change Privacy Policy

①This personal information processing policy shall be applied from the effective date, and if there is any addition, deletion, or correction of changes according to laws and regulations, it will be notified seven days before the change is implemented.

Under Article 29 of the Personal Information Protection Act, the 'WillTech' takes technical, management and physical measures necessary to ensure safety as follows

  • A. Minimize and train personal information handling personnel
    We are implementing measures to manage personal information by designating employees who handle personal information and limiting them to those in charge.
  • B. Establishing and implementing an internal management plan
    Internal management plans are established and implemented for safe handling of personal information.
  • C. Technical countermeasures against hacking, etc.
    In order to prevent personal information leakage and damage caused by hacking or computer viruses, installs security programs, periodically updates and inspections, and installs systems in areas with restricted access from outside, technically and physically.
  • D. Restricting access to personal information
    We are taking necessary measures to control access to personal information through granting, changing, and eliminating access to the database system that processes personal information, and we control unauthorized access from outside by using the intrusion prevention system.
  • E. Using locks for document security
    Documents containing personal information, auxiliary storage media, etc. are stored in a safe place with locks.
  • F. Access control for unauthorized persons
    We have a separate physical storage area for personal information and establish and operate access control procedures.