Personal information processing policy
'VAM' (hereinafter referred to as the'Company') places importance on user information, and related information and communication service providers must comply with the Act on Promotion of Information and Communication Network Utilization and Information Protection, Personal Information Protection Act, Communication Secret Protection Act, and Telecommunication Business Act. We are complying with the information protection regulations of the law.
The company informs you of the purpose and method of using the'information provided by users' (hereinafter'information') through the personal information processing policy (hereinafter referred to as'Terms and Conditions'), and what measures are being taken to protect information. In the event of revising these'Terms', we will notify you through the application.
1. Items and methods of collected information
end. The company collects when registering this application and the items to be collected are as follows.
1) User contact information (contact number)
2) Serial code for card user registration (noted separately)
3) User ID (created user ID)
4) User area (current residential area)
5) User type (therapist or guardian)
6) User application installation information (UDID)
I. The company collects'information' from the moment the user agrees after downloading and installing this application.
All. 'Information' is collected and stored through de-identification processing in a state in which a specific individual cannot be identified.
2. Purpose of use of collected information
end. The company collects'information' in a state where it is impossible to identify a specific individual to operate the website and application usage statistics service on a mobile terminal, and the collected'information' cannot be used for other purposes.
However, if the purpose and purpose of using the'information' changes in the future, we will notify you of the changed'Terms and Conditions' through the program or company's notice.
I. In principle,'information' cannot be provided to third parties and third parties that are not related to the service without the consent of the user. However, according to the'Terms and Conditions', information may be provided and sold without the consent of the user in the following cases.
1) When a specific individual is processed in a form that cannot be identified and provided to an individual or customer who has contracted with the company
2) When it is necessary for statistical writing, academic research, or market research, and it is provided in a form that cannot identify a specific individual
3. Period of retention and use of information
end. The retention period of'information' is until the user deletes the program, and if the user agrees to the privacy policy after reinstalling the program,'information' is collected again.
I. Users can withdraw their consent to the'Terms and Conditions' by deleting the application at any time, and if the user deletes this program, the company no longer collects'information'.
However,'information' collected before deletion and processed in a form that cannot identify a specific individual is not deleted.
4. Installation, operation and rejection of automatic personal information collection devices
The company does not collect users' cookies.
5. Information destruction procedure and method
In principle, after the purpose of collecting and using information is achieved, the Company destroys the information without delay, and the destruction procedure and method are as follows.
end. Destruction procedure
1)'Information' is transferred to a separate DB after the purpose is achieved (separate filing cabinet in the case of paper) and is stored for a certain period of time and then destroyed according to the reasons for information protection according to internal policies and other related laws (refer to the retention and use period) .
2) The'information' transferred to a separate DB is not used for any purpose other than retained unless required by law.
I. Method of destruction
1)'Information' stored in electronic file format is deleted using a technical method that cannot reproduce the record.
2) The'information' printed on paper is crushed with a shredder or destroyed by incineration.
6. Consignment of collected information
The company does not entrust'information' to external companies without the consent of the user. If such a need arises in the future, we will notify the user of the consignment target and the contents of the consignment business and obtain prior consent if necessary.
7. Information subject's rights and obligations and how to exercise them
end. The information subject can exercise the rights related to the protection of personal information to the company at any time, such as accessing, correcting and deleting personal information, and suspension of processing.
I. The exercise of the rights pursuant to paragraph (a) can be done in writing, e-mail, or fax in accordance with the form designated by the Personal Information Protection Act for the company, and the company will take action without delay.
All. If you submit a power of attorney in the form specified in the Personal Information Protection Act, you can exercise your rights in accordance with Paragraph A through your agent.
8. Measures to ensure the safety of information
The company is taking the following measures to ensure the safety of information.
end. Application of encryption technology when processing information
I. Unique identification information is processed after processing in a form in which a specific individual cannot be identified except for collection items.
All. Access rights and access control to the personal information processing system
la. Regular employee training
9. Technical/administrative protection measures for personal information
The company is taking the following technical/administrative measures to ensure safety so that personal information is not lost, stolen, leaked, forged or damaged when processing users' personal information.
end. Password encryption
The company does not collect passwords of platform members who are affiliated with the service provision.
I. Countermeasures such as hacking
In order to prevent leakage of user's personal information due to hacking, a device that blocks intrusion from outside is installed and operated to prevent external attacks and hacking.In particular, the server containing the user's personal information is an external Internet line. It maintains the highest level of security, such as managing it separately without directly connecting to it. In addition, we have a system to back up system and data in case of emergency, and take measures to prevent damage from computer viruses by using anti-virus programs. The vaccine program is updated periodically, and if a virus suddenly appears, we provide it as soon as the vaccine is released to prevent personal information from being infringed.
All. Restrictions and training of handling staff
The personal information processing staff is limited to a minimum, and compliance with this policy is emphasized through frequent training for the staff in charge.
la. Operation of a dedicated personal information protection organization
Through an in-house personal information protection organization, etc., the implementation of this policy and compliance with the person in charge are checked, and if any problems are found, corrective actions are taken immediately. However, the Company is not responsible for any problems caused by the leakage of personal information such as account (ID), password, nickname, e-mail, etc. of the platform affiliated with the service provision due to the user's carelessness or
10. Supplementary provisions
These'Terms and Conditions' will be effective from August 22, 2019, and if there is any addition, deletion or modification of the contents due to changes in statutory policies or security technology, we will notify you through the notice of the service operated by the company.