PRIVACY POLICY Article 30 Of The Personal Information Protection Act Of The Republic Of Korea.


(Note) Elim Block chain establishes and publishes the privacy policy as follows to protect personal information of the information subjects and to ensure that the related grievances can be dealt with quickly and smoothly in accordance with Article 30 of the Personal Information Protection Act:

  • A. The purpose of handling personal information ('http://withcoin.biz/' or 'WTHC]') is to process personal information for the following purposes, and shall not be used for any other purpose than the following:
      - Identify and certify yourself as a result of confirming the intention to join the customer and providing services to the customer, and maintain membership. management, provision of their services, etc
  • B. The period of processing and retention of personal information
      1. (WITHCoin [WTHC]) has personal information agreed upon when collecting personal information from the information entity? Do you have personal information according to the period of use or laws? Processing personal information within the service period? Hold it.
      2. Specific personal information processing and retention periods are as follows:
       - Customer subscription and management: Until service contract or member registration cancellation
  • C. Users of the information subjects, legal representatives' rights, duties and methods of exercise can exercise the following rights as personal information subjects:
      - Information subject may exercise the following rights concerning personal information protection at any time in the Elim Blockchain ('http://withcoin.biz/' or 'WTHC') of the company:
       1. Requesting access to personal information
       2. Request correction if an error exists, etc
       3. Deletion request
       4. Request to stop processing
  • D. Preparation of personal information items handled
      1. (WITHCoin [WTHC]) under 'http://withcoin.biz/)' deals with the following personal information items:
      - Required items: name, mobile phone number, and electronic wallet address
  • E. The destruction of personal information (WITHCoin [WTHC]) in principle destroys personal information without delay if the purpose of processing personal information has been achieved. A procedure, expiration date, and procedure for decommissioning are as follows.
      - The process of destruction
       The information entered by the user is transferred to a separate database (separate documents in case of paper) after its goal is achieved and stored for a period of time or immediately destroyed in accordance with the internal policies and other related statutes. At this time, personal information transferred to the DB shall not be used for any other purpose except in the case of law.
      - Exploded
       The user's personal information shall destroy personal information within five days from the date of the end of the retention period, or within five days from the date when the personal information is deemed to be unnecessary, such as achieving the purpose of handling the personal information, abolishing the service, or terminating the business.
  • F. Installation of an automatic personal information collection device? Items on Operation and Reject
      Elim Blockchain, a company, does not use 'cookies' that store information from the information subjects and retrieve information from time to time.
  • G. Preparation of a person in charge of personal information protection
      1. Elim Block Chain (WITHCoin[WTHC]) is responsible for handling personal information and designates a person in charge of personal information protection as shown below to address complaints and to remedy damages related to the processing of personal information.

        ▶ Privacy Officer
        Name: An Yeon Geun
        Position: Representative
        Contact: 1899-8713 / E-mail: elimblockchain@gmail.com,
        ▶ The department in charge of personal information protection
        Department Name: Marketing department
        The person in charge: An Hee-Kyung
        Contact: 010-7759-4533 / E-mail: ahkangel@naver.com,

      ※ It is connected to the department in charge of personal information protection.

      2. The person in charge of information can contact the personal information protection manager and the responsible department for all inquiries related to personal information protection, complaints, and relief caused by using the service (or business) of Elim Blockchain ('W' or 'WTHC]). Elim Blockchain, Inc. (http://withcoin.biz/) will answer and process inquiries from informants without delay.
  • H. Changing the privacy policy
      - This Privacy Policy is applied from the date of enforcement. If there is an addition, deletion, and correction of changes in accordance with laws and policies, the change will be notified in advance of 7 days before the enforcement of the change.
  • I. In accordance with Article 29 of the Privacy Act, the measures to secure personal information (WITHCoin [WTHC]) take the technical, administrative, and physical measures necessary to ensure safety as follows:
      1. Conducting regular self-audit
      In order to secure stability in relation to personal information handling, we conduct our own audit on a regular basis (once a quarter).
      2. Minimization and training of personnel handling personal information
      Specifying employees who handle personal information and minimize them by limiting them to those in charge and measures are implemented to manage personal information.
      3. Establishing and implementing an internal management plan
      The internal management plan is established and implemented for the safe handling of personal information.
      4. Encryption of personal information
      The user's personal information is encrypted and stored and managed. Only the user knows the password, and important data is used for separate security functions, such as encrypting file and transmission data or using the file lock function.
      5. Restricting access to personal information
      Measures are taken to control access to personal information through granting, changing, and terminating access to database systems that handle personal information. Unauthorized access from outside is controlled using the intrusion prevention system.