PRIVACY POLICY
Privacy Policy
I-MEDEX Co., Ltd. (hereafter referred to as "We" or "Our") sets forth this privacy policy (hereafter referred to as "this Policy") regarding the handling of personal information collected through our website and services (hereafter referred to as "Services").
1. Information to Be Collected and Methods of Collection
We will collect your personal information (as defined in Article 2, Paragraph 1 of the Personal Information Protection Act, hereinafter referred to as "Personal Information") through the services we provide and operate (hereinafter referred to as "Our Services") using appropriate means.
If you do not agree to the collection and handling of personal information in accordance with this policy, you will not be able to use Our Services. By using Our Services, you are deemed to have agreed to this policy.
2. Purpose of Using Personal Information
We collect and use personal information for the following purposes
(1) To provide and operate our Services
(2) To respond to inquiries (including identity verification)
(3) To send information about new features, updates, promotions, campaigns, and other services
(4) To notify you of maintenance, important updates, and other necessary communications
(5) To identify and refuse customers violating terms of use or attempting to misuse our Services
(6) To allow you to access, modify, delete, or view your registration information and usage history
(7) To create non-identifiable statistical data
(8) To research and develop new services and products
(9) To charge customers for paid services
(10) For any purpose related to the above
3. Implementation of Appropriate Security Management Measures
1. Organizational Security Management Measures
We will implement the following measures as part of our organizational security management
(1) Establishment of Organizational Structure
We will establish an organizational structure to implement security management measures.
(2) Operation in Accordance with Information Handling Regulations
We will handle information in accordance with pre-established information handling regulations. To confirm compliance with these regulations, we will record usage and other relevant details.
(3) Establishment of Methods to Monitor Information Handling
We will establish methods to monitor the handling of information.
(4) Establishment of a System to Respond to Breaches and Incidents
In the event of a breach or signs of one, we will establish a system to respond appropriately and promptly.
(5) Monitoring Information Handling and Reviewing Security Management Measures
We will monitor information handling practices and work on evaluating, reviewing, and improving security management measures.
2. Human Security Management Measures
As part of our human security management measures, we will thoroughly inform and educate our employees on the proper handling of information. Additionally, when assigning employees to handle information, we will supervise them in accordance with the Personal Information Protection Act, Article 24, and other applicable laws and regulations.
3. Physical Security Management Measures
As part of our physical security management measures, we will implement the following actions:
(1) Management of Areas Handling Information
We will ensure appropriate management of areas that handle critical information systems, such as servers and main computers, as well as other office areas where information is processed.
(2) Prevention of Theft or Loss of Equipment and Electronic Media
To prevent theft or loss of equipment, electronic media, documents, and other items containing information, we will implement appropriate management measures.
(3) Prevention of Data Leakage When Transporting Electronic Media
When transporting electronic media or documents containing information, we will take secure measures to prevent easy access to the information.
(4) Deletion of Information and Disposal of Equipment or Electronic Media
When deleting information or disposing of equipment, electronic media, or similar items containing information, we will use irreversible methods to ensure the data cannot be recovered.
4. Technical Security Management Measures
When handling information using information systems (including devices such as computers), including transmitting and receiving information via the internet or other external means, we will implement the following technical security management measures:
(1) Access Control
We will implement appropriate access control to limit the scope of access for personnel and the information databases they handle.
(2) Identification and Authentication of Accessors
We will authenticate that employees using information systems to handle information have legitimate access rights, based on the results of identification.
(3) Prevention of Unauthorized Access from External Sources
We will introduce systems to protect information systems from unauthorized external access or malicious software, and operate these systems appropriately.
(4) Prevention of Data Leakage Associated with Information System Use
We will implement measures to prevent data leakage and other incidents arising from the use of information systems, and will operate these measures appropriately.
5.Understanding of External Environments
When handling information in foreign countries, we will first understand the personal information protection systems and regulations in those countries, and then take necessary and appropriate measures to ensure the security management of the information.
4.Provision of Personal Information to Third Parties
Except as provided by the Personal Information Protection Act and other applicable laws, we will not provide personal information to third parties without obtaining prior consent from the customer.
5.Response to Requests for Disclosure, Correction, Suspension of Use, etc. of Personal Information
If a customer requests notification of the purpose of use, disclosure, correction, addition, deletion, suspension of use, or erasure of personal information (hereinafter referred to as "Disclosure, etc."), we will verify the identity of the requester and respond in accordance with the provisions of the Personal Information Protection Act. For such requests, please contact the designated window outlined in Section 8.
However, if we are not obligated to provide Disclosure, etc. under the Personal Information Protection Act or other applicable laws, this will not apply.
Please note that any costs incurred for communication, transportation, or documents required for identity verification in connection with such requests will be borne by the customer.
6.Changes to This Policy
We may change the contents of this policy based on customer feedback or our own reasonable judgment.
7.Disclaimer
While we make every effort to ensure the accuracy of the information published on our website, we accept no responsibility for any actions taken by users based on the information provided on our site.
We also disclaim any responsibility for any damage caused to users or third parties as a result of the use of our website.
CONTACT
Please feel free to contact us.