HAIMK Privacy Policy
HAIMK Co., Ltd. (the “Company”) complies with applicable personal data protection laws and regulations, including the Act on Promotion of Information and Communications Network Utilization and Information Protection and the Personal Information Protection Act (PIPA). The Company establishes and follows this Privacy Policy to protect data subjects’ personal information and rights, and to handle privacy-related inquiries and complaints smoothly.
Data subjects may refuse to consent to the collection, use, provision, and outsourcing of personal information (collectively, “processing”) described below. However, if consent is refused, all or part of the services may be unavailable.
This Privacy Policy includes the following:
1. Purpose of Processing Personal Information
The Company collects and processes personal information to the minimum extent necessary to provide services for the purposes below:
The Company collects the following categories of personal information as necessary to provide services:
· Main website – Customer Support → Online Inquiry
· Recruitment site
· New vendor registration
· ERP / QMS
3. Rentention and Destruction of Personal Information
Once the purposes of collection and use have been achieved, the Company destroys the relevant personal information without delay, as follows:
Website Online Inquiry: After the inquiry has been processed and completed
Recruitment site: Until the statutory retention period expires as required under the Labor Standards Act, the Act on the Fairness of Recruitment Procedure, and PIPA
New vendor registration: After the partner company ceases business, or upon the data subject’s request for deletion
ERP / QMS: After membership withdrawal (account deletion)
4. Outsourcing of Personal Information Processing
To provide services, the Company outsources certain IT-related tasks and real-name/identity verification tasks to external professional service providers as follows:
| Service Provider | Outsourced Processing Activities |
| LS ITC | Security operations; ERP data processing and maintenance; groupware and business system development; network management |
| Five Pro | Website administration and operation |
| Mpower System | PC maintenance/repair and security system operation |
| Solva Technology | Quality Management System (QMS) administration, operation, and maintenance |
| Somansa | Data Loss Prevention (DLP) solution administration and outsourced operation |
The Company enters into a written or electronic outsourcing agreement in accordance with applicable personal information protection laws and regulations. Such agreements clearly specify matters including: compliance with data protection requirements, prohibition of providing personal information to third parties, allocation of liability in the event of an incident, the outsourcing period, and the return or destruction of personal information upon completion of processing. The Company retains the agreement (in writing or electronically).
If the outsourced tasks or service providers change, the Company will disclose such changes without delay through this Privacy Policy.
5. Provision of Personal Information to Third Parties
In principle, the Company does not provide users’ personal information to third parties. However, exceptions apply in the following cases:
6. Destruction of Personal Information
In principle, once the retention period has expired or the purpose of processing has been achieved, the Company destroys the relevant personal information without delay. The procedures and methods are as follows:
1) Destruction Procedure
2) Destruction Methods
7. Rights and Obligations of Data Subjects and How to Exercise Them
Data subjects may exercise their rights at any time with respect to the Company, including the right to request access to, correction of, deletion of, and suspension of processing of their personal information.
1) Requests may be submitted to the Company’s personal information protection contact/handling department via the website inquiry channel, in writing, by email, or by fax. The Company will take action without delay after completing verification procedures for the requester (the data subject or an authorized representative).
2) Rights may also be exercised through a representative, such as a legal guardian or an authorized agent. In such cases, a power of attorney in the form prescribed under Appendix Form No. 11 of the Enforcement Rules of the Personal Information Protection Act must be submitted.
3) Requests for access to personal information and for suspension of processing may be restricted pursuant to Article 35(4) and Article 37(2) of the Personal Information Protection Act.
4) Requests for correction or deletion may be denied where other laws require the relevant personal information to be collected/retained.
5) In principle, the Company does not collect personal information of children under the age of 14; however, if collection is unavoidable for business purposes, the Company obtains prior consent from the child’s legal guardian.
6) If a data subject requests correction of an error in personal information, the Company will not use or provide the relevant personal information until the correction is completed.
8. Measures to Ensure the Security of Personal Information
In processing personal information, the Company implements technical, administrative, and physical safeguards necessary under Article 29 of the Personal Information Protection Act to prevent loss, theft, leakage, alteration, or damage of personal information. However, the Company shall not be liable for issues arising from personal information leakage caused by an individual’s negligence or internet-related problems.
1) Establishment and implementation of an internal management plan: The Company establishes and implements internal policies and plans to prevent loss, theft, leakage, forgery, alteration, or damage of personal information.
2) Minimization and training of personnel handling personal information: The Company designates personnel authorized to handle personal information, limits such personnel to the minimum necessary, and provides periodic training to ensure safe management.
3) Access control to personal information: The Company controls access to database systems processing personal information by granting, changing, and revoking access rights as necessary, and uses intrusion prevention systems to control unauthorized external access.
4) Retention of access logs and prevention of tampering: The Company retains and manages records of access to personal information processing systems (e.g., web logs and summary information) for at least one year, and uses security measures to prevent forgery/tampering, theft, or loss of such records.
5) Encryption of personal information: Important personal information is encrypted for storage and management. The Company also applies separate security measures such as encryption during storage and transmission of important data.
6) Technical safeguards against hacking, etc.: The Company installs security programs, performs periodic updates and inspections, places systems in areas with controlled external access, and monitors/blocks threats through technical and physical measures. The Company also monitors and controls network traffic and detects attempts to illegally alter information.
7) Physical measures for secure storage: The Company maintains separate physical locations for systems storing personal information and establishes and operates access control procedures. The Company also implements physical safeguards such as locks to securely store documents containing personal information.
9. Automatic Collection of Personal Inforamtion and How to Refuse
A cookie is a very small text file sent by the server operating a website to a user’s computer and stored on the computer’s hard drive. Users can choose whether to allow the installation and collection of cookies and may refuse cookie collection.
2) How to Disable or Manage Cookies
10. Chief Privacy Officer / Privacy Contact
The Company appoints a person responsible for protecting the personal information it processes and for handling privacy-related complaints. For inquiries regarding personal information, please contact:
To facilitate communication regarding requests for access to personal information, the Company operates a personal information management function. Contact details are as follows:
If your rights or interests related to personal information have been infringed, or if you need consultation, you may contact the following organizations:
This Privacy Policy is effective as of 2023-07-25. If this Privacy Policy is amended, the timing and details of the changes will be continuously disclosed.