IFF(Identification Friend or Foe, Upgrade Business)
Refusal of Unauthorized Collection of Electronic Mail Addresses
E-mail addresses posted on this website are prohibited from being collected by an electronic collection program or any other technical devices. Violation of this law is subject to criminal penalties based on the Act on Information and Communications Network.
Related Laws: The Act on Information and Communications Network, Article 50-2 (Prohibition of Unauthorized Collection of Electronic Mail Addresses)
1. No person shall collect e-mail addresses utilizing a program or any other technical devices that automatically collect e-mail addresses from the specified Internet websites that refuse the collection of email addresses.
2. No person shall sell or distribute any e-mail addresses collected in violation of the first regulation.
3. No person shall use the e-mail addresses, known to be prohibited from collection, sale or distribution under the provisions of first and second regulation, for information transmission.
[Posted on January 1, 2020]
Items of Personal Information Collected
1. Items of Personal Information Collected
E-mail/Consultation Inquiry: Applicant’s Name, Corporate Name, Telephone Number(Cellphone), Information Requested(Title, Content)
2. Purpose of Utilization/Collection Method of Personal Information
Method of Collection: Send e-mail from the website
E-mail/Consultation Inquiry (Contact): Check the content of the inquiry and reply, Send acknowledgement SMS of reception of the e-mail inquiry
Procedure and Method of Disposing Personal Information
In principle, the company disposes the related information, once the collection of personal information and the purpose of utilization are achieved.
1. Disposal Procedure
Information entered by the user for consultation/inquiry will be transferred to a separate DB (in case of paper, a separate filing box) after the purpose of collection is achieved and will be disposed in accordance of internal policy and other related regulations based on the reasons of the Information Protection (refer to the retention and usage period) after being saved for a certain period of time.
Personal Information is not used for any other purposes unless required by laws.
2. isposal Method
Personal information printed on paper is disposed by grinding with a shredder or incinerating.
Personal information saved in an electronic format is deleted by a technical method that cannot be replayed.
Information Collected through Cookies and Purpose of Use
The company operates ‘cookies’ that save and retrieve the information of our clients.
Cookies are used to provide marketing and personalized service by analyzing visitor access frequency and time.
Installation/Operation of Cookies and Rejection
Users have the option of installing cookies. You may choose to allow all cookies by setting options in the web browser, check each time the cookies are stored, or refuse to save all cookies.
In case of Internet Explorer, please ensure not to process cookies automatically in the Tools > Internet Options > Privacy column at the top of your web browser. Please note that if you refuse to install cookies, you may experience some difficulties in using our services.
Sharing and Providing Personal Information
However, exceptions are made in the following cases:
In case prior consent has been obtained from the member.
In case it is in accordance with the provisions of laws or requested by the investigation agency according to the procedures and methods prescribed in legislation.
Personal Information Provided on Consignment
In principle, the company does not provide personal information of our clients to others without their consent. However, with the consent of the members, personal information can be provided for consignment to achieve the [Purpose of Collecting and Using Personal Information].
Rights and Duties of the Subject Informant and Exercise Methods
As the subject of personal information, clients can exercise the following rights.
The informant may exercise his or her rights related to the protection of personal information on Kencoa Aerospace, Co. in the following sections at any time for the following:
① Request to view personal information
② Request to correct errors, etc.
③ Request to delete
④ Request to organize
Rights can be exercised on Kencoa Aerospace, Co. in the form of writing, e-mail, or FAX in accordance with the form No. 8 of the Enforcement Rules of the Personal Information Protection Act, and the company will take actions on this matter without delay.
If the subject informant requests correction or deletion of errors on personal information, the company will not use or provide such personal information until correction or deletion is completed.
Rights can be exercised through agents such as legal representatives of the subject informant or those who have been delegated. In this case, a letter of attorney in accordance with Annex 11, Enforcement Regulations of the Privacy Act, must be submitted.
Measures to Secure Safety of Personal Information
In accordance with Article 29 of the Personal Information Protection Act, the company takes technical, managerial and physical actions necessary to secure safety as follows:
1. Minimizing and Training Employees Handling Personal Information
The company has implemented measures to manage personal information by designating employees who handle personal information and minimizing them by limiting the number of people in charge.
2. Establishing and Implementing an Internal Management Plan
The company has established and implemented an internal management plan for safe handling of personal information.
3. Encrypting Personal Information
Personal information and password of users are encrypted and stored and managed, so only they can be aware. The important data uses separate security functions such as encrypting files and transmission data or using the file lock function.
4. Taking Technical Countermeasures Against Hacking
To prevent leakage and damage of personal information by hacking or computer viruses, the company has installs security programs, updates and inspects them regularly, installs system in areas with restricted access from outside, and monitors and blocks them technically and physically.
5. Restricting Access to Personal Information
The company takes necessary measures to control access to personal information through granting, changing, and removing access to the database system that processes personal information, and uses the intrusion prevention system to control unauthorized access from outside.
6. Using Lock Device for Document Security
Documents and auxiliary storage media containing personal information are stored in a secure location with locking devices.
7. Controlling Access of Unauthorized Person
The access control procedures are established and operated for the separate, physical storage location where personal information is stored.
Matters Concerning the Person in Charge of Protecting Personal Information and Methods of Remedies for Infringement of Rights and Interests
The company takes the responsibility of handling personal information and appoints the person responsible for protecting personal information as shown below in order to handle complaints and damage relief of subject informants related to personal information processing.
Customer Service Department: Management Support Team
Phone: +82 55-855-4130
Personal Information Management: Minjoon Sung, Manager
Phone: +82 55-855-4130
Subject informants may inquire all the issues regarding the inquiries, complaints and damage relief related to protection of personal information that occurred while using the company’s services to the manager of personal information management and the department in charge. The company promises to answer and process inquiries from the subject informants without delay.
If you need to report or consult other personal information breaches, please contact the following agencies.
Personal Information Dispute Mediation Committee (www.1336.or.kr/1336)
Information Security mark Certification Committee (www.eprivacy.or.kr/02-580-0533~4)
Prosecution Service, Internet Crime Investigation Center (www.spo.go.kr/02-3480-3600)
National Police Agency, Cyber Terror Response Center (www.ctrc.go.kr/02-392-0330)
Notice Date: January 1, 2020
Execution Date: January 1, 2020