个人信息处理方针

SEMICS Inc. (hereinafter referred to as the "Company") establishes and discloses the following personal information processing policies to protect users' personal information in accordance with relevant laws such as the "Act on Promotion of Information and Communication Network Utilization and Information Protection, etc." and the "Personal Information Protection Act.

Article 1. Purpose of Personal Information Processing (Establishment and Use)

The company processes personal information for the following purposes. The collected personal information shall not be used for any purpose other than the following purposes, and if the purpose of use changes, necessary measures such as obtaining separate prior consent shall be implemented in accordance with Article 18 of the Personal Information Protection Act.

[Product inquiry]

The Company processes personal information for the purpose of processing product inquiries received through [CONTACT US] on its website.

[Online report for ethical management]

The company processes personal information to respond to reports and check facts received through [Whistleblow] on the website.

[Recruitment]

The company processes personal information provided through Job Matching Platform, JOBDA, to review the application according to the purpose of hiring

Article 2. Items Subject to Personal Information Processing and Period of Retention

The company collects only the minimum range of personal information for using the website and applying for a job.

 

Website

Service name

Category

Items for collection

Retention period

Website

CONTACT US

Required

Name, phone number, email

When purposes are fulfilled

Whistleblow

Required

Name, phone number, email

When purposes are fulfilled

Website for
recruitment

e

Recruitment system

Required

Name, phone number, email, date of birth, gender, current address

When purposes are fulfilled

Optional

military service information, education, career, foreign language tests, qualifications

When purposes are fulfilled

 

Article 3. Provision of Personal Information to a Third Party

In principle, the company does not provide the user's personal information to the outside world. However, exceptions are made when users agree in advance in accordance with the provisions of the law or when there is a request from an investigative agency according to the procedures and methods prescribed by the law for investigation purposes.

Article 4. Entrustment of Personal Information

The company entrusts the personal information processing work as follows for smooth personal information processing.

-      Consignee : Midas Group

-      Details of consignment: Operation of SEMICS Inc. recruitment site and handling related civil complaints

-      Personal information items entrusted: all personal information collected in the course of service delivery

-      Consignment period: Until the end of the consignment contract between the company and Midas

Article 5. Rights and Obligations of the Subject of Information and Method of Exercise

①    Users can exercise their rights to view, correct, delete, and suspend personal information processed by the company at any time.

②    The exercise of rights under paragraph (1) may be made to the company in writing, e-mail, fax, etc. in accordance with attached Form 8 of the Enforcement Rules of the Personal Information Protection Act, and the company will take measures without delay (within five business days) after going through the identification process.

③    The exercise of rights under paragraph (1) may be carried out through an agent, such as a legal representative of the data subject or a person who has been delegated. In such cases, the power of attorney under attached Form 11 of the Enforcement Rules of the Personal Information Protection Act shall be submitted.

④    In any of the following cases, the company may notify the user of the reason and restrict or refuse access.

1.     If access is prohibited or restricted by law

2.     Where there is a risk of unreasonably infringing on other property and other interests

3.     Where the user does not have information requesting access or has been destroyed and stored

4.     If you request correction of the contents after the deadline for submitting the job application

⑤    If the information subject requests correction or deletion of errors in personal information, the company will not use or provide the personal information until the correction or deletion is completed.

Article 6. Destruction of Personal Information

The company will destroy the personal information without delay when it becomes unnecessary, such as the expiration of the personal information retention period and the achievement of the processing purpose.

Article 7. Measures to Secure Safety of Personal Information

The company takes the following administrative, technical, and physical measures to ensure the safety of users' personal information so that it is not lost, stolen, leaked, tampered with or damaged.

[Administrative measures]

  • The company has prepared personal information protection guidelines for personal information protection so that its employees are familiar with and comply with them.
  • The company checks the implementation of personal information protection measures and compliance with the person in charge through in-house information protection organizations, etc., and takes corrective action as soon as a problem is found.
  • The company limits employees who process personal information to those in charge and manages personal information safely through regular training for personal information controllers.
  • When hiring new employees, the company receives signatures on the personal information protection agreement and prevents personal information leakage by its employees in advance, and prevents the person in charge of handling users' personal information from damaging, infringing, or leaking personal information.

[Technical measures]

  • The company is taking measures to prevent personal information infringement by hacking or computer viruses using the latest antivirus program.
  • The company uses an intrusion prevention system to control unauthorized access from the outside, to provide in-house networks, and to ensure systematic security, we are committed to having all possible technical devices.

[Physical measures]

  • The Server room and data storage room are designated as special protected areas to control access.

[ETC.]

  • The company is not responsible for things that happen because of the user's personal mistakes or the risks of the internet.

Article 8. Designation of Manager in Charge of Personal Information Protection

The Company has designated the Chief Privacy Officer and Privacy Manager as follows to handle complaints related to the protection of your personal information.

Category

The person in charge

CPO

Department and position

Planning Division / Managing Director

Name

Mihwa Jeong

Privacy Manager

Department and position

HR Team / Manager

Name

Hyeongcheol Kim

Phone number

+82 31-697-6600

email

coordinator@semics.com

Article 9. Methods of Remedy for the Infringement of the Rights and Interests of Users

Users may apply to the Personal Information Dispute Mediation Committee, the Personal Information Infringement Reporting Centre of the Korea Internet & Security Agency, etc. to receive relief from personal information infringement. For other reports and consultations on personal information infringement, please contact the following organizations.

  • Korea Internet & Security Agency Personal Information Infringement Report Centre  (http://privacy.kisa.or.kr) : 118
  • Privacy Dispute Resolution Board (http://kopico.go.kr) : +82-2-2100-2499
  • Cybercrime Investigation Unit, Crown Prosecution Service (http://spo.go.kr) : +82-2-3480-3571
  • National Cybercrime Reporting System (https://ecrm.police.go.kr/minwon/main) : 182

Article 10. Installation and Operation of Personal Information Automatic Collection Device and Cookie Rejection

The Company does not use “cookies” that store and retrieve the usage information of the data subject from time to time.

Article 11. Changes in Personal Information Processing Guidelines

The Privacy Policy is effective as of 20 May 2025.