Kakao Games
Game Design MaintenanceVận hành thiết kế nhiều game đa dạng của Kakao Games
Design
Experience.
Vui lòng tham khảo
Company Brochure
để hiểu rõ hơn về chúng tôi!. :-)
BROCHURETải xuống
Vận hành thiết kế nhiều game đa dạng của Kakao Games
Vui lòng tham khảo
Company Brochure
để hiểu rõ hơn về chúng tôi!. :-)
HIVELAB Corporation (hereinafter “Company”) uses and provides the user’s personal information based on the user’s consent, and complies with personal information protection regulations and guidelines of the Republic of Korea.
The company collects only a minimal amount of personal information required for service use.
The following personal information is collected via the web page, paper, phone, fax, e-mail, electronic method, etc.
[Recruiting]Also, the following information may be generated and collected during service use or business processing.
The method to collect personal information is as follows.
The company uses the user’s valuable personal information as the following. The company shall seek prior consent if the purpose changes.
[Recruiting]The user's personal information is to be destroyed immediately once the purpose of the collection and use of personal information is fulfilled.
[Recruiting]For job candidates, the stored personal information will be destroyed after being kept for one (1) year from the day of job application, or five (5) years if there is additional consent from the candidate. However, if the job candidate withdraws the consent and requests for destruction, the company destroys the stored personal information without delay.
[Project Inquiry or Request]The company retains personal information of a client who makes an inquiry or requests a project for 3 years and destroys the information after the retention period ends.
The company uses personal information within a scope mentioned in “2. Use of Collected Personal Information”. The Company shall provide no personal information to any third party without the user’s prior consent. However, exceptions are as follows.
The company destroys the user’s personal information immediately once the purpose of the collection and use of personal information is fulfilled. The procedure and method of destruction are as follows.
[Procedure of Destruction]The user’s personal information is transferred to a separate DB (or a document box if it’s a paper record) and destroyed
after being stored for a certain period under internal policies or applicable laws (see section 3).
The company shall not use collected personal information for other purposes unless demanded by applicable laws.
Personal information printed on paper records, printed matters, and documents is to be destroyed through shredding or
incineration.
Personal information stored in electronic file formats is to be deleted using technical means which makes the
information unrecoverable.
The company is taking the following measures to ensure the safety of personal information.
Users may view and edit their personal information and have the rights to transmit the information, request modification
or destruction of the information, suspend the processing of the information, or withdraw consent to the processing of the personal information at any time.
Provided, under applicable law, that the company may deny a user’s request to suspend processing. In such case, the company shall provide the reason for the denial to the user.
Please write, call, or email and the Privacy Protection Officer will take measures without delay.
If any user requests for the revision of personal information, such information shall not be used or provided until the
revision is completed. If the wrong information is already provided to the third party, the company will notify them
immediately and request a revision.
Personal information that was destroyed due to the user’s request is processed as mentioned in “3” and is not allowed to be browsed or used for other purposes.
For a child under 14 years of age, their legal representatives may view or modify the child's personal information. They may also request to destroy the child's information or suspend processing.
Personal information that was destroyed due to the request of users or legal representatives is processed as mentioned in “3. Personal Information Processing and Period of Storage " and is not allowed to be browsed or used for other purposes.
Under applicable law, users have the right to deny automatic collection of personal information or to request an explanation for such collection.
The company installs and operates cookies that save and retrieve user information to provide personal customized service. A cookie is a small piece of text file usually set by the web server, sent from a website, and stored in a User's computer hard disk while the user is browsing that website.
Cookies are used for the following purposes.
Cookies help the users browse the website easily and support convenient use by saving the user’s preferred environment settings.
[Rejection of Cookies]Users can decide whether to install or reject cookies. Hence, users may install all cookies by setting an option on the web browser or may reject the installation of all cookies. However, when a user rejects the installation of a cookie, the user may have some difficulties in using certain services that require signing in.
[How to Reject Cookies]Users can set options in browsers to install all cookies or choose whether to install or reject cookies whenever a cookie is sent or reject the installation of all cookies.
Examples of Settings are as follows.
However, when a user rejects the storage of a cookie, the user may have some difficulties in using certain services provided by the company.
For any inquiries, complaints, feedback, or other matters related to personal information protection that arise while you use the services, please contact the Privacy Protection Officer or the responsible department. The company will do its best to listen to you and promptly answer any questions you may have.
[Privacy Protection Officer and Responsible Department]Contact the organizations shown below to file reports or seek consultation for other privacy infringements.
Under applicable law, the company installs and operates visual data processing devices for the following purposes.
If data subjects submit a request to view, destroy, or confirm the existence of their personal visual information, they can do so by contacting the designated contact point. Provided, however, that this applies to personal visual information of the subject being recorded or the information that is clearly necessary for urgent protection of life, body, or property of the subject. The company shall take measures to process the request to view, destroy, or confirm visual information without delay.
[Process for Security of Visual Information]To ensure the physical security of personal visual information, the company stores and manages the information in a restricted area that prohibits unauthorized entry. Only a minimum number of authorized personnel are granted to have access to the information. Further, to prevent forgery or tampering, the company records the creation date of information, the purpose of access, the accessing person, and the date of access whenever someone accesses information.
Previous policy from July 13, 2020, to April 09, 2024 | Amended policy from April 10, 2024 |
---|---|
1. Collection of Personal Information
The following personal information is collected via the web page, paper, phone, fax, etc. |
1. Collection of Personal Information
(revised)
The following personal information is collected via the web page, paper, phone, fax, email, and other electronic method, etc. |
2. Use of Collected Personal Information
|
2. Use of Collected Personal Information
(revised)
[Recruiting]
|
3. Personal Information Processing and Period of storage
The stored personal information will be destroyed after being kept for one (1) year from the day of consent, or five (5) years if there was an additional consent. However, if the job candidate withdraws the consent and request for destruction, the company destroys the stored personal information without delay. |
3. Personal Information Processing and Period of storage
(revised)
[Recruiting]
For job candidates, the stored personal information will be destroyed after being kept for one (1) year from the day of job application, or five (5) years if there is additional consent from the candidate. However, if the job candidate withdraws the consent and requests for destruction, the company destroys the stored personal information without delay. [Project Inquiry or Request]The company retains personal information of a client who makes an inquiry or requests a project for 3 years and destroys the information after the retention period ends. |
7. The Users’ Rights and Obligations
Users may view and edit his/her personal information and may request for destruction or withdrawal of the information at any time. Please write, call or email and the Privacy Protection Officer will take measures without delay. If any user requests for the revision of personal information, such information shall not be used or provided until the revision is completed. If the wrong information is already provided to the third party, the company will notify them immediately and request a revision. Personal information that was destroyed due to the user’s request is processed as mentioned in “3", and is not allowed to browse or use for other purposes. |
7. The Users’ Rights and Obligations
(revised)
Users may view and edit their personal information and have the rights to transmit the information, request modification or destruction of the information, suspend the processing of the information, or withdraw consent to the processing of the personal information at any time. Provided, under applicable law, that the company may deny a user’s request to suspend processing. In such case, the company shall provide the reason for the denial to the user. Please write, call, or email and the Privacy Protection Officer will take measures without delay. If any user requests for the revision of personal information, such information shall not be used or provided until the revision is completed. If the wrong information is already provided to the third party, the company will notify them immediately and request a revision. For a child under 14 years of age, their legal representatives may view or modify the child's personal information. They may also request to destroy the child's information or suspend processing. Personal information that was destroyed due to the request of users or legal representatives is processed as mentioned in “3. Personal Information Processing and Period of Storage" and is not allowed to be browsed or used for other purposes. Under applicable law, users have the right to deny automatic collection of personal information or to request an explanation for such collection. |
9. Privacy Protection Officer and Responsible Department
[Privacy Protection Officer and Responsible Department]
|
9. Privacy Protection Officer and Responsible Department
(revised)
[Privacy Protection Officer and Responsible Department]
|
10. Installation and Operation of Visual Data Processing Devices
(newly added in the amended policy) |
10. Installation and Operation of Visual Data Processing Devices
(newly added)
Under applicable law, the company installs and operates visual data processing devices for the following purposes.
If data subjects submit a request to view, destroy, or confirm the existence of their personal visual information, they can do so by contacting the designated contact point. Provided, however, that this applies to personal visual information of the subject being recorded or the information that is clearly necessary for urgent protection of life, body, or property of the subject. The company shall take measures to process the request to view, destroy, or confirm visual information without delay. [Process for Security of Visual Information]To ensure the physical security of personal visual information, the company stores and manages the information in a restricted area that prohibits unauthorized entry. Only a minimum number of authorized personnel are granted to have access to the information. Further, to prevent forgery or tampering, the company records the creation date of information, the purpose of access, the accessing person, and the date of access whenever someone accesses information. |