1. Purpose of processing personal information FCI Inc. processes personal information for the following purposes and does not use it for any purpose other than the following. - Confirmation of the customer's intention to join, identification and authentication for the provision of services to the customer, maintenance and management of membership, payment for the supply of goods or services, supply and delivery of goods or services, etc. 2. Processing and retention period of personal information ① FCI Inc. processes and retains personal information within the personal information retention and use period agreed upon when collecting personal information from the information subject or the personal information retention and use period in accordance with laws and regulations. ② The specific personal information processing and retention periods are as follows. - Customer subscription and management: Until the termination of the service use contract or membership, but in the event of a bond or debt relationship, until the settlement of the bond or debt relationship. - Records of contracts, withdrawal of contracts, payment, and supply of goods in e-commerce: 5 years
3. Rights and obligations of information subjects and legal representatives and how to exercise them Users may exercise the following rights as personal information subjects.
① The information subject may exercise the following rights related to personal information protection at any time against FCI Inc. 1. Request to view personal information 2. Request for correction in case of errors, etc. 3. request for deletion 4. Request for suspension of processing
4. Create an entry for the personal data you process ① FCI Inc. processes the following items of personal information.
1.To provide services, improve services, develop new services, etc. - Required items: service usage records, access logs, cookies, access IP information - Optional items : -.
5. Destruction of personal information In principle, FCI Inc. destroys personal information without delay when the purpose of processing personal information has been fulfilled. The procedure, deadline and method of destruction are as follows.
-Destruction procedure The information entered by the user is transferred to a separate DB after the purpose is achieved (separate documents in the case of paper) and stored for a certain period of time in accordance with internal policies and other related laws, or destroyed immediately. At this time, the personal information transferred to the DB will not be used for any other purpose unless required by law. -Destruction period The user's personal information shall be destroyed within 5 days from the end of the retention period if the retention period of the personal information has elapsed, or within 5 days from the date when it is recognized that the personal information is unnecessary, such as the achievement of the purpose of processing the personal information, the abolition of the service, or the termination of the business.
6. Installation, operation, and rejection of automatic personal information collection devices
FCI Inc. does not use 'cookies' that store and retrieve the usage information of the information subject from time to time.
7. Personal Information Protection Officer
① FCI Inc. designates a personal information protection officer as follows to take overall responsibility for the processing of personal information and to handle complaints and damage relief of information subjects related to the processing of personal information.
▶ Personal Information Protection Officer
Name :Jihwan Kim
Position :Representative
Contact :010-3837-2568, fci.window@gmail.com,
※ This will connect you to the department in charge of personal information protection.
② The information subject may contact the personal information protection officer and the department in charge for all personal information protection-related inquiries, complaints, and damage relief that occurred while using FCI Inc.'s services (or business). FCI Inc. will respond to and handle inquiries from the information subject without delay.
8. Change your privacy policy
①This Privacy Policy applies from the effective date, and if there are any additions, deletions, or corrections to the contents in accordance with laws and policies, we will notify you through a notice 7 days prior to the effective date of the change.
9. Measures to ensure the safety of personal information FCI Inc. takes technical, administrative, and physical measures necessary to ensure safety as follows.
1. Conducting regular self-audits FCI Inc. conducts self-audits on a regular basis (once a year) to ensure stability in the handling of personal information. 2. Minimization and training of employees handling personal information We implement measures to manage personal information by designating and minimizing the number of employees who handle personal information. 3. Establishment and implementation of internal management plan We have established and implemented an internal management plan for the safe handling of personal information. 4. Technical measures against hacking, etc. FCI Inc. installs security programs, periodically updates and inspects them, installs systems in areas with controlled access from the outside, and monitors and blocks them technically and physically in order to prevent leakage and damage of personal information due to hacking or computer viruses. 5. Storage of access records and prevention of falsification We keep and manage records of access to the personal information processing system for at least 6 months, and use security functions to prevent access records from being falsified, stolen, or lost. 6. Restriction of access to personal information We take necessary measures to control access to personal information through granting, changing, and canceling access rights to the database system that processes personal information, and control unauthorized access from the outside using an intrusion prevention system. 7. Use of locks for document security Documents containing personal information and auxiliary storage media are stored in a safe place with a lock. 8. Access control for unauthorized persons We set aside a separate physical storage location for personal information and establish and operate access control procedures for it.