ONEWallet Privacy Policy
This Privacy Policy (the “Policy”) explains the way of treatment of the information which is provided or collected in the websites on which this Policy is posted. In addition the Policy also explains the information which is provided or collected in the course of using the applications of the Company which exist in the websites or platforms of other company.
Through this Policy, the Company regards personal information of the users as important and inform them of the purpose and method of Company’s using the personal information provided by the users and the measures taken by the Company for protection of those personal information.
This Policy will be effective on the 3th day of 1, 2020 and, in case of modification thereof, the Company will make public notice of it through posting it on the bulletin board of Company’s website or individual notice through sending mails, fax or e-mails).
1. Information to be collected and method of collection
(1) Personal information items to be collected Personal information items to be collected by the Company are as follows:
• Information provided by the users The Company may collect the information directly provided by the users.
- Name, email address, ID, national information, encoded identification information (CI), identification information of overlapped membership (DI)
• Information collected while the users use services Besides of information directly provided by the users, the Company may collect information in the course that the users use the service provided by the Company.
- Equipment identifier, operation system, hardware version, Log data
• You can explicitly back up data related to app usage. Data collected at this time is as follows. This data is encrypted and stored with a user identification number.
- a) Card Data: To use the function of the app, you need to enter the card number such as point card, loyalty card, membership card, etc. This card data is converted to Barcode or QR Code and used for scanning.
- b) Location Data: When registering a card, you can register location information as needed. It is only used to inform users when approaching a nearby location using location information.
- c) Image Data: The image associated with the card is uploaded by the user to the server, and the URL of the image can only be viewed by the user.
(2) Method of collection The Company collects the information of users in a way of the followings:
2. Use of collected information
The Company uses the collected information of users for the following purposes:
- Member management and identification
- Improvement of existing services and development of new services The Company agrees that it will obtain consent from the users, if the Company desires to use the information other than those expressly stated in this Policy.
3. Sharing collected information
Except for the following cases, the Company will not share personal information with a 3rd party: • when the sharing is required by the laws
- if required to be disclosed by the laws and regulations; or
- if required to be disclosed by the investigative agencies for detecting crimes in accordance with the procedure and method as prescribed in the laws and regulations
4. Cookies, Beacons and Similar Technologies
The Company may collect collective and impersonal information through ‘cookies’ or ‘web beacons’.
Cookies are very small text files to be sent to the browser of the users by the server used for operation of the websites of the Company and will be stored in hard-disks of the users’ computer.
Web beacon is a small quantity of code which exists on the websites and e-mails. By using web beacons, we may know whether a user has interacted with certain webs or the contents of email.
These functions are used for evaluating, improving services and setting-up users’ experiences so that much improved services can be provided by the Company to the users The items of cookies to be collected by the Company and the purpose of such collection are as follows:
- This cookie is connected with the services provided by a 3rd party such as the buttons of 'good' and 'share'. The 3rd party provides these services by recognizing that the users visit the website of the Company. (Examples of targeting cookies or advertising cookies)
- carry out PR to the users as targets in other websites by connecting through social networks and these networks use the information of users' visit
- provide the information of users' visit to ad agencies so that they can suggest an ad which may attract the interest of the users
The users have an option for cookie installation. So, they may either allow all cookies by setting option in web browser, make each cookie checked whenever it is saved, or refuses all cookies to be saved: Provided that, if the user rejects the installation of cookies, it may be difficult for that user to use the parts of services provided by the Company.
5. Users’ right to access and option
The users or their legal representatives, as main agents of the information, may exercise the following options regarding the collection, use and sharing of personal information by the Company:
• exercise right to access to personal information;
• make corrections or deletion;
• make temporary suspension of treatment of personal information; or
• request the withdrawal of their consent provided before
If, in order to exercise the above options, you, as an user, use the menu of ‘amendment of member information of webpage or contact the Company by using representative telephone or sending a document or e-mails, or using telephone to the responsible department (or person in charge of management of personal information), the Company will take measures without delay:
Provided that the Company may reject the request of you only to the extent that there exists either proper cause as prescribed in the laws or equivalent cause.
6. Security
The Company regards the security of personal information of uses as very important. The company constructs the following security measures to protect the users’ personal information from any unauthorized access, release, use or modification
- Encryption of personal information Transmit users' personal information by using encrypted communication zone Store important information such as passwords after encrypting it
- Countermeasures against hacking Install a system in the zone the external access to which is controlled so as to prevent leakage or damage of users' personal information by hacking or computer virus
- Establish and execute internal management plan
- Install and operate access control system
- Take measures to prevent forging or alteration of access record
7. Modification of Privacy Protection Policy
The Company has the right to amend or modify this Policy from time to time and, in such case, the Company will make a public notice of it through bulletin board of its website (or through individual notice such as written document, fax or e-mail) and obtain consent from the users if required by relevant laws.
8. Responsible department of Company
The Company designates the following department and person in charge of personal information in order to protect personal information of customers and deal with complaints
E-mail: [email protected] The latest update date: 1/28, 2021