BLACKVUE
CLOUD Privacy Policy
Pittasoft Co., Ltd
(hereinafter referred to as Ôthe CompanyÕ) does not collect or store resident
registration number, passport number, driverÕs license number, alien
registration number and other sensitive, unique identification information in
accordance with the Personal Information Protection Act for Service on the
CompanyÕs Terms of Service. However, information which enables the
identification of the subject of personal information of Ôthe MemberÕ may be
included in combination with other information. The Company makes all efforts
to protect the rights and interests of users by observing the provisions of
personal information protection under the relevant laws, including the Act on
Promotion of Utilization of Information and Communications Network and the
Personal Information Protection Act. The Company has also established its
Privacy Policy in accordance with the relevant laws.
This Privacy Policy is incorporated
as part of the BLACKVUE CLOUD Terms of Service. Your use of the services is subject
to the Terms of Service and this Privacy Policy, and indicates your consent to
them. Additionally, personal information regarding location is given further protection
by the Terms of Location-Based Service Use.
1. Items of
personal information to be gathered:
A. The Company collects the
following minimum personal information as required items at the time of initial
membership subscription in order to facilitate smooth customer consulting and the
provision of various services.
i.
When subscribing for membership:
- E-mail address
ii.
When using a charged service:
- Name, date of birth,
address, gender, nationality, duplication information (DI), connecting
information (CI), telephone number, shipping address, name and telephone number
of recipient, etc.
iii.
The following payment information may be gathered in the
process of using a charged service:
- When making a payment with
a credit card: name of credit card company and credit card number, etc.
- When making a payment with
a cell phone: cell phone number, name of mobile carrier, payment approval
number, etc.
- When transferring from the
bank account: name of bank, account number, etc.
- When making a deposit
without a bankbook: name of remitter, contact information, etc.
B.
The following information may be automatically created and
gathered in the process of using a mobile service and the regular operation of
the Company. This information is in a form in which the individual cannot be
identified, and the Company does not carry out any activity to identify a
specific individual with the information gathered from vehicle-mounted
dashboard cameras.
i.
Possible information to be collected automatically:
- Vehicle-mounted dashboard
camera model, serial number, basic statistics of service use, log information,
service use record, browser information, network information
2. Purpose of
collecting and using personal information
A.
Execution of the agreement for the provision of service and
settlement of payment.
Provision of contents, user authentication, fee payment, and collection of fees.
B.
Membership management.
Provision of membership service,
membership certification/identification, prevention of abuse and unauthorized
access, checking the intention of subscription, restricting subscription and
number of subscriptions, checking the consent of a legal representative when
collecting personal information of a child under the age of 14, checking the identity
of the legal representative afterwards, keeping records for dispute resolution,
handling complaints such as grievance handling, delivering notifications, and confirming
the memberÕs intention of withdrawal.
C.
Developing a new service, marketing and utilizing
advertisements.
Developing a new service, providing customized services, providing services and
posting advertisements according to statistical characteristics, checking the
validity of a service, providing event and advertising information and
opportunities to participate, identifying access frequency, and statistics
regarding membersÕ service use, etc.
3. Sharing
and providing personal information
The Company uses the
personal information of users within the range declared in Article 2 ÒPurpose
of collecting and using personal informationÓ and the Company will not use the
personal information of a user beyond such range or release the personal
information of user to a third party without the prior consent of the user.
However, the following exceptions apply:
A.
If a user has agreed individually; or
B.
Based on the provisions of laws or if there is a request
from an investigation agency for the purpose of investigation according to the
procedure and method stipulated by laws.
4. Entrusting
the management of personal information and providing it to a third party
The Company may entrust the
personal information management task for service improvement, and in such a
case, the Company observes relevant laws including Article 25 of the Act on
Promotion of Utilization of Information and Communications Network and Article
26 of the Personal Information Protection Act.
5. Period of
storing and using personal information
In principle, the personal
information of member is destroyed without delay after the purpose of
collecting and using personal information has been achieved. However, in case
it is necessary to keep personal information according to the provisions of
relevant laws, the Company keeps the information of members for a certain
period stipulated in the relevant laws. In such a case, the Company uses such
stored information only for the purpose of storing, and the period of storing
is as follows:
A. Act on the Consumer
Protection in Electronic Commerce, Etc.
i.
Record of the withdrawal of contracts or subscriptions
(Storage period: 5 years)
ii.
Record of the payments and supply of goods (Storage period:
5 years)
iii.
Record of the handing of customer complaints or disputes
(Storage period: 3 years)
B. Use and Protection of
Credit Information Act
i.
Record of collection, handling and use, etc. of credit
information (Storage period: 3 years)
C. Protection of
Communications Secrets Act
i.
Log record of user such as Internet/UserÕs access point
tracking data (Storage period: 3 months)
6. Procedure
and method of destroying personal information
In principle, the personal
information of the user is destroyed without delay after the purpose of
collecting and using personal information has been achieved. The CompanyÕ
procedure and method of destroying personal information are as follows:
A. Procedure of destroying
i.
When the purpose of collecting and using the information
which a user enters for membership subscription, etc. has been achieved, such
information is destroyed without delay, and in case it is necessary to keep
such information according to the provisions of relevant laws, it is removed to
a separate database (a separate filing cabinet in the case of paper) for
storing and managing, and it is destroyed immediately after the period
stipulated by law
ii.
Such personal information is not used for purposes other than
the lawful purpose of collecting and using it except as required or allowed by
law.
B. Method of destroying
i.
Personal information printed on paper is destroyed using a
paper shredder or through incineration
ii.
Personal information stored in the form of electronic file
is deleted using a technical and physical method which ensures that the record
cannot be restored or reproduced.
7. Rights and
how to exercise those rights of a member and his/her legal representative
A. A member and his/her legal representative
may inquire or modify his/her registered personal information or that of a
child under the age of 14 at any time, and if the member does not agree with
the personal information management of the Company, the member may refuse to
agree, request to terminate the subscription (withdrawal from the membership)
and delete his/her personal information. However, his/her legal representative
must prove that he/she is the legal representative of a person who is under the
age of 14.
B. If you contact the responsible
personal information manager by writing, phone or E-mail, he/she will take
measures without delay.
C. If a member requests a
correction on an error in his/her personal information, the relevant personal
information will not be used or provided until the correction is made. In
addition, if incorrect personal information has been already provided to a
third party, the result of the correction will be notified to the third party
without delay to make corrections.
D. The Company handles
terminated or deleted personal information according to a request from a member
or his/her legal representative as specified in Article 5 ÒPeriod of storing
and using personal informationÓ and Article 6 ÒProcedure and method of
destroying personal informationÓ and prevents such information from being read or
used for any other purposes.
8. Matters
regarding the collection of location-based information
The Company may gather
location-based information in order to provide a smooth service. Refer to the Terms of Location-Based
Service Use for this information.
9. Technical
and managerial protection measures of personal information
The Company takes the
following technical and managerial measures and observes the relevant laws and
notifications such as Personal Information Protection Act and Act on Promotion
of Utilization of Information and Communications Network to ensure the safety
of the personal information and prevent it from being lost, stolen, leaked,
altered, or damaged when handling the gathered personal information of users.
A.
Encryption of password
The password of a memberÕs account is stored and managed after being encrypted
so that only the user himself/herself knows the password, and only the user who
knows the password is allowed to check and modify his/her personal information.
B.
Measures against hacking, etc.
The Company makes all efforts to prevent the personal information of members
from being leaked or damaged by hacking or computer viruses, etc. Data is
backed up frequently in case there is damage of personal information and
up-to-date anti-virus software is used to prevent personal information or data
of users from being leaked or damaged, allowing users to transmit personal
information safely on the network through encrypted communication, etc. In
addition, a firewall system is used to control unauthorized access from the
outside and efforts are made to provide all possible technical devices for
securing the system security.
C.
Minimizing employees who handle personal information
Employees of the Company who handle personal information are limited to
managers and a separate password for such purpose is granted and updated
periodically. The strict observation of the Privacy Policy is always emphasized
through frequent manager training
10. Contact
us
You may contact us if you
have any questions concerning this Privacy Policy. Please contact us at cs@pittasoft.com, or call us at +82-26947-4670.
11. Obligation
of notification
If there is an addition,
deletion or revision in the contents of the current Privacy Policy, it shall be
notified at least 7 days prior to the revision through the ÔNewsÕ or ÔAnnouncementsÕ
menu of the Service. This Privacy Policy comes into effect on the date of
announcement.
A.
Date of announcement: October 20, 2015
B.
Effective Date: October 20, 2015