Privacy Policy

 

Chainbridge (the "company") places importance on the personal information of the users of the service provided by the "company" and complies with the laws on promotion of information, communication network use and protection of information, the laws on the protection of consumers in electronic commerce, the telecommunications business act, and the personal information protection act.

The "company" privacy policy can be changed according to changes in laws or guidelines regarding personal information protection or changes in our policy, therefore, we encourage the "members' to frequently check the homepage and services.

 

1. Items of personal information collected and methods of collection

  • The personal information of the users collected by the company is as follows:

  1. (Required) Email, mobile phone number, password, name

  2. (Information automatically generated during service use or processing) Service usage records, access logs, access IP information, purchase information, deposit and remittance of cryptocurrencies

  3. (In the event of identification tasks) copy of ID (other than the date of birth, information is masked and provided.)

 

  • The company collects personal information by the following methods.

  1. Personal information is collected in the event that the user agrees to the collection of personal information and enters the information directly in the process of membership registration and service use.

  2. The members' personal information is collected through the webpage, e-mail, faxes, and phone during the customer center consultation process.

  3. Personal information can be collected through documents from offline events and seminars.

  4. Generating information, such as device information, can be generated and collected automatically during PC web, and mobile web use (access IP information, cookies, service use records, connection logs, etc.).

 

2. Purpose of collecting and using personal information

  • Member management

  1. Identification of the members based on their use of service and identification

  2. Prevention of fraudulent use and unauthorized use of fraudulent members

  3. Confirmation of intention to sign up, registration and limitation of subscriptions

  4. Underage Identification

  5. Consultation with "members"; receipt and handling of "members" complaints; preservation of records for dispute settlement

  6. Transfer of notice

 

  • Implementation of the agreement on service delivery and the settlement of charges

  1. Delivering services and contents

  2. Payment and settlement of charges

  3. Event/gift equivalents guide and product delivery

 

  • Used in marketing and advertising

  1. Provide optimized service to "members"

  2. Developing and specializing new services(products)

  3. Service provision and advertisement according to demographic characteristics

  4. Web page access frequency

  5. Statistics on service utilization

  6. Sending periodicals, and guides to new products or services

  7. Planning for web services and events corresponding to "members" interest

  8. Operate a space for members to participate or deliver advertising information such as prize events and other events

  9. Survey of "members"

 

3. Providing a third party of personal information

The 'company" shall not use or provide to any third party the personal information of "members" beyond the scope notified to the "members" or the scope specified in terms and conditions of service. Exceptions shall be made if the consent of the "members" is obtained or if:

  • Alliance: To provide a better service, the personal information of the "members" may be provided to or shared with affiliates. If the personal information is provided or shared, it will go through the process of notifying the "members" in writing or e-mailing them individually about who the affiliates are, why such personal information should be provided or shared, and how long they are protected or shared and managed. If the "member" doesn't agree with sharing their personal information, we do not share the personal information with the affiliates. Notifications or consent shall be obtained through the same procedures when the partnership changes or the partnership closes.

 

  • Sale and M&A: In the event the rights and obligations of the service provider are transferred in whole or in part, or the rights and obligations of the service provider are transferred through a merger or acquisition, the member shall be notified in order to guarantee the rights of the "members' in relation to the protection of personal information.

 

  • In case of need for settlement of charges based on the provision of information and communication services.

 

  • In cases where there are special provisions in other laws such as; the 'Protection of Communications Secrets Act', 'The Framework Act on National Taxes', 'the law regarding the promotion of information and communication network use and protection of information', 'law of real name financial transaction', 'Telecommunications Business Act', 'local tax law', 'Framework Act on Consumers', 'Banking Act', and the 'Criminal Procedure Law'.  However, even if the administrative office or investigative agency has requested it for administrative purposes or investigation purposes, it does not provide personal information of the "members" according to the request and is provided in accordance with due process, such as by a warrant or by a letter with the authority's seal of approval as provided under the Act.

 

4. Handling personal information

The "company" may entrust personal information to other companies in a limited scope for smooth and improvement of the service. Currently, the following companies are entrusted with the processing of personal information by the company for the implementation of the service contract with the "members." The related statutes stipulated necessary matters for the safety of management of personal information in the consigned contracts.

 

Trustee : ALIGO

Consignment Purpose : SMS Certification service.

Holding Period : Delete immediately after SMS is sent (If it is necessary to preserve it according to relevant laws, the period of preservation)

 

 

5. Personal information retention and period of use

  • Personal information of the "members" shall be retained and used during the period when the "company" provides the services to the "members." However, if there is a need to preserve it according to the provisions of the relevant statutes, it shall be preserved in accordance with the following related statutes:

 

  1. Records of contracts or withdrawal of subscriptions: 5 years

  2. Records on big payments and supply of goods: 5 Years

  3. Records on consumer complaints or dispute handling: 3 years

 

  • If the "members" request access to the transaction information held with by the "members'" consent, they shall be allowed to access or verify the transaction information without delay.

 

  • If a member has withdrawn from the service then the member's name, date of birth, ID, and password identification shall be kept for one month after the member's withdrawal for the purpose of preventing illegal or expedient activities, as the member may illegally receive economic benefits such as discount coupons and event benefits provided by the company or prevent such illegal or expedient activities.

 

6. Methods for personal information disposal and procedures

In principle, the "company" destroys personal information without delay if the purpose of handling personal information has been achieved. However, if the personal information needs to be preserved continuously in accordance with other statutes, personal information shall be transferred to a separate database or stored in a safe storage place.

 

  • Revocation procedure: The company selects personal information for which the reason for revocation has occurred and destroys the personal information after obtaining approval from the company's personal information protection manager.

 

  • Revocation method: Information in the form of electronic files uses a technical method that does not allow recording to be replayed. Personal information printed on paper  is shredded and destroyed.

 

 

7. Actions to secure personal information

According to the technical and administrative protective measures of personal information, the company takes technical, administrative, and physical actions necessary to secure safety as follows:

 

  • Technical measures for hacking

In order to prevent personal information leakage or damage caused by hacking or computer viruses, the company installs security programs, periodically updates and checks, installs systems for the areas with restricted access from the outside, and monitors and blocks them technically and physically.

 

  • Encryption of personal information

The user's personal information is encrypted, stored, and managed, so only he or she can know. Important data uses separate security functions such as encrypting files and transmission date or using file locking.

 

  • Restrictions on access to personal information

Through granting, changing, and terminating access authority to database systems that processes the personal information, the government is taking necessary measures to control access to personal information and controlling unauthorized access from the outside using the intrusion prevention system.

 

  • Use of locking information for document security

Documents and auxiliary storage media containing personal information are stored in a secure place with a lock tool.

 

  • Controlling the access of unauthorized persons

We set aside physical storage locations where personal information is stored and set up and operate procedures for access control.

 

  • Control actions in accordance with internal management plan

The company establishes and implements an internal management plan and regularly conducts employee training.

 

  • Other security measures

In addition to the items above, we also implement measures to secure personal information safety based on technical and administrative protective measures.

 

 

8. Personal information protection officer

The company is responsible for handling personal information and designates the person in charge of personal information protection as follows to handle complaints and remedy damages by the information subjects involved in the processing of personal information.

Personal Information Protection Officer

Name: Brian Park

Email: brian.park@chain-bridge.io

Position: Personal information protection officer

 

 

9. Information subject and legal representative’s rights and obligations and methods of exercising those rights and obligations

  • The information principal can exercise his or her rights to access, correct, delete, and suspend personal information at any time.

 

  • The exercising rights pursuant to paragraph 1 above can be done through the website account information menu, or through the company's personal information protection manager, and the company will take actions without delay.

 

  • The exercising rights under paragraph 1 above can be conducted through an agent, such as a legal representative of the information subject or a person who has been delegated. In this case, you must submit a letter of attorney according to the form No. 11 attached to the enforcement rules of the personal information protection act.

 

  • If the information subject asks for correction or deletion of personal information errors, the company shall not use the personal information or provide it to a third party until correction or deletion is completed.

 

  • The exercising rights pursuant to paragraph 1 above may be limited if their personal information is specified in other statutes for collection or preservation.

  • The "company" may confirm whether the person who exercised the rights under paragraph 1 above is a principal or a legitimate agent.

 

10. Legal remedy for infringement of rights

The following organizations are separate from the company. If you are not satisfied with the results of the company's own personal information complaints and damage relief, or if you need more assistance, please contact us.

 

11. Changing the privacy policy

This privacy policy applies from the effective date, and if there is any additional, deletion or correction of the changes following the statutes and policies, the changes will be notified through the notice board seven days before any modifications are implemented.

 

 

 

 

These terms and conditions have been updated on August 1, 2019,

and is effective with the consent of "members".