Sungshin CM Co., Ltd. Privacy Statement

Privacy Statement

Sungshin CM Co., Ltd. (http://sungshincm.co.kr/ hereinafter referred to as the “Company”) complies with the personal information protection regulations of the relevant laws and regulations that information communication service providers must comply with, such as the Protection of Communications Secrets Act, the Telecommunications Business Act, and the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. We are doing our best to protect the rights and interests of users by establishing a personal information handling policy in accordance with relevant laws and regulations.

Company's privacy policy contains the following information.

1. Items of personal information to be collected and method of collection
  • First, the company collects the following personal information for job application, response to inquiries related to employment, and identification of persons subject to employment protection.
  • -

    Name, resident registration number, e-mail, application history, phone number (wired/wireless), date of birth, photo, address, school attended, education, major, career, qualifications, awards, family, marital status, military service (Reasons for non-completion), veterans (Including veterans' numbers), and disabilities

  • Second, the company collects the following personal information to receive voices of customers and cyber reports.
  • -

    The following information may be automatically generated and collected during the process of using the service, including name, phone number, e-mail, and business process.

  • -

    The user's browser type, OS, visit history (IP Address, access time), and cookie company collect personal information by user input method through homepage web documents, and in some cases, some information may be collected by printed paper documents or e-mails.

Top

2. Purpose of collection and use of personal information
  • A.

    Admission screening process, job application correction, pass/fail confirmation, communication with job applicants, verification of certificate

  • B.

    Voice of Customer and cyber report consultation/receipt of report and reply to processing results

Top

3. Sharing and provision of personal information
  • The company uses personal information within the scope notified in "2. Purpose of collection and use of personal information", and does not use it beyond the scope or disclose it to the outside world in principle without the user's prior consent. However, the following cases are exceptions.
  • -

    When users have agreed to the disclosure in advance

  • -

    If it is judged to be required by other laws

  • (ex. when requested by the government/investigative agency by due process in accordance with relevant laws and regulations, etc.)
  • Occasionally, applicants may be offered a job to a company that has a special relationship with the company (Subsidiaries, affiliates, etc.). In this case, the applicant must be contacted in advance, and the application form is transferred to the company after obtaining consent.

Top

4. Retention and use period of personal information
In principle, personal information of users is destroyed without delay when the purpose of collection and use of personal information is achieved.

Top

5. Personal information destruction procedure and method
  • In principle, personal information of users is destroyed without delay when the purpose of collection and use of personal information is achieved. The company's personal information destruction procedures and methods are as follows.
  • A.

    Destruction procedure

  • -

    The information entered by the user for job application is transferred to a separate DB after the purpose is achieved (separate filing cabinet in the case of paper) and stored for a certain period of time in accordance with the information protection of internal policies and other related laws (Refer to retention and use period) and then destroyed.

  • -

    This personal information shall not be used for any purpose other than to be retained unless it is under the law.

  • B.

    Destruction method

  • -

    Personal information printed on paper is shredded with a shredder or destroyed by incineration.

  • -

    Personal information stored in electronic files is deleted using a technical method that cannot reproduce the record.

Top

6. Rights of users and legal representatives and how to exercise them
Users can view or modify their registered personal information at any time, and may request deletion of information. If you wish to delete, please contact the person in charge of personal information management in writing, by phone or e-mail, and we will take action without delay.

Top

7. Matters concerning the installation/operation and rejection of automatic personal information collection devices
  • Company uses 'cookies' that store and retrieve user information from time to time in order to provide services to visitors to the company's homepage. Cookies are a small amount of information that the server (HTTP) used to run the website sends to the user's computer browser, and could be also stored on the hard disk of the user's computer.

  • A.

    Purpose of use of cookies

  • -

    Cookies are used to prevent duplicate pop-up notice

  • B.

    Installation/Operation and Rejection of Cookies

  • -

    Users have the option to install cookies. Therefore, users could allow all cookies in their web browser, go through confirmation whenever cookies are saved, or refuse to save all cookies by setting options.

  • -

    As a method of rejecting cookies, you can allow all cookies used by the user, go through confirmation every time a cookie is saved, or refuse to save all cookies by selecting the option of the web browser.

  • -

    How to set (in case of Internet Explorer): Tools at the top of the web browser <Internet Options> Personal Information

Top

8. Technical/administrative protection measures for personal information
  • When handling personal information of users, the company is taking the following technical/managerial measures to ensure safety so that personal information is not lost, stolen, leaked, altered or damaged.

  • A.

    Password encryption

  • The password set when applying for a job at the company is encrypted and stored and managed so that only the applicant knows it. Confirmation and change of personal information can only be done by the person who knows the password.
  • B.

    Countermeasures against hacking

  • Company is doing its best to prevent leakage or damage of members' personal information due to hacking or computer viruses. In preparation for damage to personal information, data is backed up from time to time. The latest vaccine program is used to prevent users' personal information or data from being leaked or damaged. Through encrypted communication, etc., personal information can be safely transmitted over the network. And we control unauthorized access from outside with an intrusion prevention system, and we are trying to equip all possible technical devices to secure security with other systems.
  • C.

    Minimum number of handling staff and training

  • Company's personal information handling staff is limited to the person in charge, and a separate password is assigned and regularly updated. We conduct regular training for the person in charge and emphasize protection of the personal information of job applicants.
  • D.

    Operation of an organization dedicated to personal information protection

  • Through the in-house personal information protection organization, we check the compliance of the company's personal information handling policy and the person in charge, and if a problem is found, we strive to correct it immediately. However, the company does not take any responsibility for problems caused by leakage of personal information such as passwords and resident registration numbers due to user negligence or Internet problems.

Top

9. Contact information of personal information manager and concerned person

Any complaints related to personal information protection arising from using the company's online job application, etc. can be reported to the person in charge of personal information management or the department. Company will respond quickly to users' reports.

Personal information manager
ㆍName : Choi Jisung ㆍDept. : Planning and Management Team
ㆍPosition : Team Leader ㆍE-mail : choi@sscmco.com
Person in charge of personal information management
ㆍName : Park Youngju ㆍDept. : Planning and Management Team
ㆍPosition : Assistant Manager ㆍE-mail : kate@sscmco.com
  • If you need to report or consult about other personal information infringement, please contact the organizations below.
  • -

    Personal Dispute Mediation Committee (http://www.1336.or.kr / 1336)

  • -

    Information Protection Mark Certification Committee (http://www.eprivacy.or.kr / 02-580-0533~4)

  • -

    Internet Crime Investigation Center, Supreme Prosecutor’s Office (http://icic.sppo.go.kr / 02-3480-3600)

  • -

    National police agency cyber terror response center (http://www.ctrc.go.kr / 02-392-0330)

Top

10. Duty of notice

If there is an addition, deletion or modification of the current privacy policy, it will be notified through 'Notice' on the website.

  • Date of announcement :

    June 9, 2021

  • Effective Date :

    June 20, 2021

Top