Effective Date: February 1, 2024.
CJ 4DPLEX Co., Ltd. (hereinafter referred to as the "Company" ) has established and implemented a privacy policy (hereinafter referred to as the "Privacy Policy" ) to protect the personal information of Users (hereinafter referred to as "Users" ) of the Company's web site (hereinafter referred to as the "Site" ) and to comply with all laws and regulations related to personal information. In addition, through the Privacy Policy posted below, the Company will inform Users of the purpose and method of using the personal information provided by Users and what measures are being taken to protect personal information. This Privacy Policy is disclosed on the website operated by the Company and is always available to Users. The Company's Privacy Policy includes the following contents.
1. How to consent to the collection and use of personal information
The method of consenting to the collection and use of Users' personal information and the provision to third parties and the consignment of processing tasks is completed by reading the 'Privacy Policy' posted on the Site (https://cj4dplex.com) and clicking the 'Consent to Collection and Use of Personal Information' button provided on the site.
2. Items of personal information the Company collects and the purposes for which the Company collects and uses it
The Company collects and uses the Users' personal information within the minimum scope necessary to provide the service. In addition, the personal information provided will not be used for any purpose other than the consented purpose, and if the purpose of use is changed after the Users' consent, the Company will take necessary measures such as obtaining additional consent from the Users in advance.
2.1 Collection Methods
Collecting information through the use of PC and mobile website services
Collecting information generated through log analysis programs
Collecting information by 'Cookies'
2.2 Purpose of collection/use, collected items, retention period
Purpose of collection/use | To use the Contact Us service (the "Service"), to receive and process inquiries, to notify Users of processing results and respond to related inquiries, and to analyze site statistics and improve the quality of the Service. | To use the Contact Us service (the "Service"), to receive and process inquiries, to notify Users of processing results and respond to related inquiries, and to analyze site statistics and improve the quality of the Service. |
Collections | Name, email address, and other personal information that Users have voluntarily agreed to collect and use by including in their inquiry and attachments. | |
Retention period | Within [2] years or [5] business days from the date of the data subject's (Users') request for withdrawal. |
2.3 Information generated and collected in the course of using or processing the Services
In the process of using or processing the Service, the following information may be generated and collected to handle inquiries related to the Users' use of the Service.
Usage frequency, time spent on the Service, and usage history
Access logs and access IP information, cookies, usage history, session information, device information, and MAC address
3. Retention, period of use and destruction of personal information
3.1 Terms of Use and Retention
The Company shall utilize the Users' personal information provided by the Users for the period of time agreed upon by the Users (period of use) for the purpose of providing services and handling inquiries in accordance with the purpose of collection/use.
3.2 Storage and retention period of personal information
If it is necessary to preserve the Users' personal information due to the Users' consent or other relevant laws and regulations, the Company shall keep the Users' personal information for the period agreed to by the Users or for a certain period of time stipulated by other relevant laws and regulations.
Records of visitor access (logs) / access point tracking data that can confirm the location of information and communication devices: 3 months (each period of communication fact verification data pursuant to Article 15(2) of the Protection of Communications Secrets Act and Article 41 of the Enforcement Decree of the same Act)
Other storage and retention periods: If the Company has received separate consent from the Users, the period of consent
3.3 Procedures and methods for destroying personal information
(a) Destruction Procedures
The personal information that the Users have agreed to provide for the use of the service is transferred to a separate DB after the purpose is achieved and stored for a period of time in accordance with '3.2 Storage and retention period of personal information' above, and then destroyed in the method specified in (c) Destruction Methods' below. Personal information transferred to a separate DB will not be used for any other purpose except as permitted by law.
(b) Subject of destruction
Information after the '3.2 Storage and retention period of personal information' above has expired
(c) Destruction Methods
Written or printed personal information: shredding or incineration
Personal information stored in the form of electronic files such as DBs: Deleted by technical means that do not allow the records to be reproduced.
4. Installation, operation, and opt-out of automatic personal information collection devices
Cookie information, service usage records, and access device information may be automatically generated and collected and stored on the Users' PC device (hard disk drive, etc.) in the course of the Users' use of the Company's services. Cookies are data that a website (Company) sends to Users' web browser (Internet Explorer, Chrome, Firefox, etc.). The Company provides cookies to Users who visit the Site, and when Users revisit the Site, the Company shall read the contents of cookies stored on the Users' PC device and analyzes the records of past visits to the Site, service information used, time and frequency of service access, and information generated or provided (input) in the process of using the service to improve the service, prevent unauthorized use, and check Users errors.
4.1 Essential cookies
Cookies | Purpose | About | Expiration date | Placer |
Cookie Consent | Stores the Users' cookie consent status | HTTP Cookies | 1 day | cj4dplex.com |
-ga | Register a unique ID, which is used to generate statistical data about how visitors use thier website. | 2 years | ||
-gat | Used to throttle the rate at which Google Analytics makes requests | 1 day | ||
-gid | Register a unique ID, which is used to generate statistical data about how visitors use their website. | 1 day | ||
_lang | Remember the website language version selected by the Users | Immediately after exiting the web browser | cj4dplex.com |
4.2 Cookie Notice and Scope of Validity, Third Party Cookies
Cookie Notice is only valid for use of the Site, https://cj4dplex.com. When the Users use the Site, they may also receive third-party cookies from companies that provide services to the Company. However, the Company does not provide the cookies it collects to third parties. The Company is required to send Users a notice when it serves cookies, and the Users have the right to opt-out of the collection of cookies the Company serves. However, if the Users refuse to accept cookies, they may not be able to use some of Site services.
4.3 How to opt out of cookie collection
(a) For Chrome:
Settings menu on the right side of your web browser → Security & privacy → Cookies and other site data
(b) For Internet Explorer:
Tools menu at the top of your web browser → Internet Options → Privacy → Settings → Advanced
(c) For Microsoft Edge:
Settings menu at the top of your web browser →Cookies and site permissions →Manage and delete cookies and site data
5. Users’ rights to their personal information and how to exercise them
Users can always visit the Site to request correction and access to their stored personal information.
5.1 Users may request access to and verification of their personal information through the Site or the Privacy Grievance Department in Article 6.
5.2 If the Users request to view or verify their personal information, the Company will verify their identity by presenting a copy of an identification document such as a national ID card, passport, or driver's license (new version) that can prove their identity.
5.3 If the Users' representative requests to view or verify the Users' personal information, the Company will verify the representation by presenting a power of attorney indicating the representative relationship between the Users and the representative, a seal certificate in the Users' name, and an identification card of the representative.
5.4 If the Users request correction of an error in their personal information, the Company will not use or provide that personal information until the Company has completed the correction.
5.5 However, the Company may exceptionally restrict access to and correction of personal information in the following cases.
(a) There is a substantial risk of harm to the life, body, property, or rights of the person or a third party. (b) There is a risk of significant disruption to the service provider's business. (c) Violates any applicable law
6. Privacy Officer and Responsible Department
The Company has designated the Privacy Officer and the department in charge as follows, and operates a personal information-related consultation center for smooth communication with Users.
- Privacy Officer : Hyung Jin Tak
- Affiliation/Full Name : Tech Solution Team
- Contacts : +82)02-371-5659
- Responsible Department : Brand Marketing Team
- Contacts : +82)02-371-5659
For consultation and reporting of privacy breaches, please contact the Personal Information Protection Officer by phone or in writing, or contact the following organizations
Organization Name | URL | Contact |
Personal Information Infringement Report Center | http://privacy.kisa.or.kr | 118 without area code |
Cyber Crime Investigation Division, Supreme Prosecutors’ Office | http://www.spo.go.kr | 02-3480-3570 or 1301 without area code |
Cyber Investigation Bureau , National Police Agency Electronic Cybercrime Reports & Management System | https://ecrm.police.go.kr/minwon.main | Without an area code 182 |
Personal Information Dispute Mediation Committee | http://kopico.go.kr | 1833-6972 without area code |
7. Provision of personal information to third parties
The Company uses the Users' personal information within the scope specified in the 'Privacy Policy' and does not use the personal information beyond the specified scope or provide it to third parties. However, it may be provided exceptionally with the prior consent of the Users or upon request in accordance with the regulations and procedures set forth in relevant laws and regulations.
8. Entrustment of personal information processing
The Company does not have a separate entrustment regarding the processing of personal information. However, the Company may entrust the processing of personal information for the operation and maintenance of the service, convenience and management of Users, and in this case, the contents of the entrusted work and the entrusted party are posted on the site, and the entrusted party is managed and supervised to comply with relevant laws and guidelines.
9. Withdrawal of consent to the collection and use or provision of personal information.
Withdrawal of consent to the collection and use or provision of personal information.
9.1 Users may request to view, correct, or delete the Users’ personal information at any time. To access, correct, or delete personal information, please contact the Privacy Officer and the responsible department in writing or by phone, and the Company will take action without delay after verifying their identity. However, access may be restricted or denied in the following cases.
(a) If there is any special provision in the law, or if access is prohibited or restricted to comply with the law
(b) If it is likely to harm the life, body, or property of another person or unreasonably infringe on the property and other interests of another person
(c) If there is a risk of significant disruption to the service provider's business
9.2 Users may request to withdraw their consent to the collection and use of Users’ personal information, delete it, and suspend its processing. If the Users contact the Privacy Officer, it will be processed immediately after verifying their identity.
10. Guidance on collecting personal information from children under the age of 14
10.1 In principle, the Company does not collect personal information of children under the age of 14 ("children"), but if it is necessary to collect it for the provision of services, the consent of the legal representative is always sought.
10.2 The Company collects minimum personal information such as the name and contact information of the legal representative (parent, etc.) from the children in order to obtain the consent of the legal representative (parent, etc.). The legal representative (parent, etc.) can view, correct, and delete the children’s personal information, and if the legal representative wishes to view, correct, or delete the children's personal information, please contact Privacy Officer by phone or e-mail, and the Company will take necessary measures.
11. Technical and administrative protection of personal information
The Company takes the following technical and administrative measures to ensure the safety of Users’ personal information so that it is not lost, stolen, leaked, altered or damaged.
11.1 Technical safeguards
(a) Personal information is protected by passwords, and sensitive data is protected by additional security features, such as encrypting file and transfer data or using file locks.
(b) The Company takes measures to prevent damage from computer viruses by using antivirus programs. Antivirus programs are updated regularly, and in the event of a sudden virus outbreak, the Company introduces and applies vaccines as soon as they become available to prevent personal information from being compromised.
(c) The Company uses Secure Sockets Layer (SSL) to securely transmit personal information over the network.
(d) In order to prevent the leakage of Users' personal information due to hacking, etc., the system is installed in an area with controlled access from the outside, and devices are used to block external intrusion.
11.2 Administrative safeguards
(a) The Company has established procedures for managing and accessing the Users' personal information, ensures that employees are familiar with and comply with them, and periodically checks compliance.
(b) The Company minimizes the number of persons who can process the Users’ personal information, manages access rights, and ensures compliance with laws and policies through training. The following persons process Users’ personal information:
Anyone who works directly or indirectly with Users.
Person in charge of personal information management and protection, such as the Privacy Officer
Others who need to access personal information for their business.
(c) The Company proactively prevents leakage of information (including personal information) by employees by signing an information protection pledge when hiring new employees and has established and implemented internal procedures to remind employees of their obligations to protect personal information from time to time and to audit compliance.
(d) The handover of personal information processors is conducted in a secure and thorough manner, and the responsibilities for personal information breaches after joining and leaving the Company are clearly defined. Notice obligations.
12. Notice obligations.
In the event of any additions, deletions, or modifications to this Privacy Policy due to the enactment or revision of personal information protection related laws and regulations, changes in government policies or security technologies, and changes in company policies, the Company will notify Users through the homepage prior to the revision.
Current Privacy Policy version: v.1 (view previous policy)
Notice Date: Jan.31.2024 / Effective Date: Feb.1.2024