KET

KET

홈으로

Privacy Policy

‘KOREA ELECTRIC TERMINAL CO., LTD.’ (hereinafter referred to as 'the Company') values the protection of users' personal information and complies with relevant laws and regulations concerning personal information protection, such as the "PROTECTION OF COMMUNICATIONS SECRETS ACT" and the "PERSONAL INFORMATION PROTECTION ACT" which businesses must adhere to. The Company is committed to protecting user rights by establishing a personal information processing policy in accordance with relevant laws.

Accordingly, the Company hereby establishes and publicly announces this Privacy Policy to inform data subjects about how their personal information is used and processed, what measures are taken for its protection, and to ensure that any related complaints can be handled promptly and smoothly.

This policy takes effect on September 12, 2025.

The order of this Privacy Policy is as follows.

  • Article 1. Items of Personal Information and Collection Methods
  • Article 2. Retention Period and Destruction of Personal Information
  • Article 3. Provision and Sharing of Personal Information
  • Article 4. Consignment of Personal Information Processing
  • Article 5. Rights and Obligations of Data Subjects (Users) and Legal Representatives, and How to Exercise Them
  • Article 6. Chief Privacy Officer
  • Article 7. Purpose and Refusal of Automatic Collection of Personal Information
  • Article 8. Measures to Ensure Security of Personal Information
  • Article 9. Notification of Changes to the Privacy Policy

Article 1. Items of Personal Information and Collection Methods

To provide users with diverse and convenient services, such as product information and A/S, and for recruitment-related inquiries, the Company collects personal information to the minimum necessary extent using the following methods.

1)Items of Personal Information Collected

Purpose of Collection Required Items Optional Items
Product inquiries, recruitment inquiries, etc. Name, Email Company ㅜame, Department, Position, Contact Number

2)Methods of Personal Information Collection

  • Collection through the Company's website (Q&A Board)
  • The Company has established a procedure for users to select "Agree" or "Disagree" for each content of the personal information collection and use consent form or terms of service. By selecting "Agree," users are deemed to have consented to the collection of personal information.

Article 2. Retention Period and Destruction of Personal Information

Once the purpose of personal information collection and use has been achieved, the Company destroys the information without delay, without exception.

Purpose of Personal Information Collection and Retention Retention Period
Records related to website visits 3 months
Website 1:1 inquiries, recruitment/product inquiries 3 months

1)Destruction Procedures and Methods

  • Destruction Procedure : Users' personal information, once its purpose is achieved, is transferred to a separate DB, stored for a certain period according to internal policies and other relevant legal provisions for information protection (refer to Retention and Use Period), and then destroyed. This personal information is not used for any purpose other than retention, unless required by law.
  • Destruction Method : Personal information printed on paper is shredded or incinerated. Personal information stored in electronic file format is deleted using technical methods that prevent reproduction of the record.

Article 3. Provision and Sharing of Personal Information

1)Except with the user's consent or as stipulated by relevant laws, the Company will under no circumstances use or provide users' personal information to others or other companies/institutions beyond the scope notified in "Article 3. Purpose of Collection and Use of Personal Information." However, in the following cases, personal information is used and provided with care:

  • In the event of a complete succession or transfer of the rights and obligations of the service provider, such as through sale or merger, the Company will thoroughly inform the user in advance of the legitimate reasons and procedures, and grant the user the option to withdraw consent for their personal information.
  • In other cases where the user's personal information is to be provided or shared, the Company will notify the user in advance via email or in writing regarding who will receive or share the information, the purpose of their use, the personal information items to be provided or shared, the fact that the user has the right to refuse consent, and the disadvantages of refusing consent, and then seek consent.

2)In the following cases, it is possible to provide personal information without the user's consent in accordance with relevant laws:

  • Fulfillment of contracts related to service provision.
  • When required by relevant laws or when investigative agencies request it for investigative purposes, following legal procedures and methods.

Article 4. Consignment of Personal Information Processing

The Company does not entrust users' information to external companies without the user's consent. Should such a need arise in the future, the Company will notify users of the consignment recipient and the scope of consigned tasks, and obtain prior consent if necessary.

Article 5. Rights and Obligations of Data Subjects (Users) and Legal Representatives, and How to Exercise Them

Users have the right to request access, correction, deletion, or suspension of processing of their personal information related to its protection, and the Company will process such requests without delay. These rights can be exercised through written requests, phone calls, email, fax, etc., and can also be exercised through a legal representative or an authorized agent of the user. If a user requests correction or deletion of personal information errors, the Company will not use the personal information until the correction or deletion is completed. Users and legal representatives have both the right to be protected for their personal information and the obligation to protect their own personal information and not infringe on the personal information of others. Therefore, please ensure that your personal information is not leaked and that the personal information of others, including posts, is not damaged. Failure to fulfill these obligations and infringing or damaging others' personal information may result in penalties according to relevant laws.

Article 6. Chief Privacy Officer

1)To protect users' personal information and handle complaints and inquiries related to personal information, the Company designates the following departments and Chief Privacy Officers:

Chief Privacy Officer (CPO) Personal Information Protection Manager
  • Name : Hong Jong-bum (Head of Department)
  • Department : Management Innovation Office
  • Tel. : +82-32-850-1116
  • Email : webmaster@ket.com
  • Name : Kim Ji Hun (Staff)
  • Department : Legal Affairs Team
  • Tel. : +82-32-850-1116
  • Email : security@ket.com

2)Customer Support Center Information

The Company operates a Customer Support Center to respond to user requests related to personal information.

  • Operating Hours: Weekdays 08:00~17:00
  • Closed on Sundays and public holidays.

3)If you need to report or consult about other personal information infringements, please contact the following organizations

  • Personal Information Dispute Mediation Committee (www.kopico.go.kr)
  • Personal Information Infringement Report Center (www.privacy.kisa.or.kr)
  • Supreme Prosecutors' Office (www.spo.go.kr)
  • National Police Agency (ecrm.police.go.kr)

Article 7. Purpose and Refusal of Automatic Collection of Personal Information

The company uses 'Cookie' information that stores and fetches users' information from time to time.
A cookie is a tiny text file sent to a user's browser by a server used to run a website and is stored on the user's computer hard disk.

1)Purpose of Using Cookies, etc.

To identify user access frequency or duration of stay and use it for service improvement.

2)How to Refuse Cookie Settings

  • Users have the option to allow all cookies, confirm each time a cookie is saved, or refuse to save all cookies by selecting options in their web browser.
  • How to Refuse (for Microsoft Edge Browser): Select 'Settings' > Click on 'Privacy, search, and services' > Under the 'Cookies' section, you can configure your desired settings via 'Cookie permission settings

Article 8. Measures to Ensure Security of Personal Information

When handling users' personal information, the Company takes the following technical, administrative, and physical measures to ensure security and prevent personal information from being lost, stolen, leaked, altered, or damaged:

1)Establishment and implementation of internal management plans

  • The Company establishes internal management plans, including the designation of a Personal Information Protection Officer and the establishment and operation of a personal information protection organization, and annually reviews the implementation of these internal management plans.

2)Encryption Measures for Personal Information

  • The Company encrypts, stores, and manages important personal information.

3)Countermeasures against Hacking, etc.

  • The Company is doing its best to prevent users' personal information from being leaked or damaged by hacking or computer viruses. Data is regularly backed up to prepare for personal information damage, and the latest antivirus programs are used to prevent leakage or damage of users' personal information or data.
  • Personal information can be securely transmitted over the network through encrypted communication.
  • Additionally, the Company uses intrusion prevention systems to control unauthorized access from outside and strives to equip all possible technical devices to secure system security.

4)Minimization and Training of Handling Personnel

  • The Company's personnel handling personal information are limited to specific staff, who are given separate passwords that are regularly updated, and receive frequent training to securely manage personal information.
  • The handover of personal information handling duties is conducted thoroughly under secure conditions, and responsibility for personal information incidents after employment and resignation is clearly defined.
  • Computer rooms and data storage rooms are designated as special protection areas, and access is strictly controlled.

Article 9. Notification of Changes to the Privacy Policy

This Privacy Policy was established on April 25, 2025. In the event of additions, deletions, or modifications due to changes in laws, government policy changes, changes in the Company's internal policies, or changes in security technology, the Company will notify the reasons and contents of such changes through the website at least 7 days prior to the revision. However, in cases where significant matters such as the provision of personal information to third parties, changes in collection/use purposes, or changes in retention periods are altered, the Company will obtain the user's consent.

Privacy Policy version number : V 3.0

Implementation date of Privacy Policy : September 12, 2025