rexsteel

About Us

We open the future value with technology-based challenges and innovations.

Privacy Policy

This Privacy Policy (the "Policy") explains the way of treatment of the information which is provided or collected in the websites on which this Policy is posted. In addition the Policy also explains the information which is provided or collected in the course of using the applications of Rexsteel(“the Company”) which exist in the websites or platforms of other company. Through this Policy, the Company regards personal information of the users as important and inform them of the purpose and method of Company's using the personal information provided by the users and the measures taken by the Company for protection of those personal information.

1. Purpose of Use

The Company uses the collected information of users for the following purposes. The Company agrees that it will obtain consent from the users, if the Company desires to use the information other than those expressly stated in this Policy.

가. Website Membership and Management

The Company collects personal information for the following purposes: confirmation of intention to join the membership, identification/authentication for the provision of membership service, maintenance and management of membership, identification under the Real-name system, prevention of illegal use of services, confirmation of consent of a legal representative when collecting personal information of children under the age of 14, and record-keeping for notice/notification, complaint-handling, and dispute resolution.

나. Complaint handling

The Company collects personal information for the identification of complainant, confirmation of complaint, contact/notice for investigation, notification of process outcome, etc.

c. Provision of goods and services

The Company collects personal information for the provision of service, content customized service, identity authentication, etc.

d. Use in marketing and advertising

The Company collects personal information for the provision of events and advertising information, and participation opportunities.

2. Personal information file

File name : Rexsteel – Items collected: email, mobile phone number, address, password, name, service use history, access log, cookies, access IP information

- Method: via website
- Basis for retention: Act on Promotion of Information and Communications Network Utilization and Information Protection
- Retention period: 3 years
- Relevant statutes: Credit Information Use and Protection Act: 3 years

​3. Use of Personal Information and Retention Period

① Rexsteel collects and retains personal information within the use and retention period under the statutes or within the use and retention period agreed upon when collecting personal information from the users.
② The collection and retention period for personal information is as follows:

1. Website membership and management

Personal information related to website membership and management is retained and used for the above purposes for up to 3 years from the date of consent for collection and use.
- Basis for retention : Act on Promotion of Information and Communications Network Utilization and Information Protection
- Relevant statutes : Credit Information Use and Protection Act: 3 years
- Exception:

4. Rights and obligations of users and legal representatives and how to exercise such rights. Users have the following rights as the data subject of personal information.

① The right to view, correct, delete, and suspend processing of personal information at any time
② The right pursuant to Paragraph 1 may be exercised in writing, e-mail, fax, etc. in accordance with Article 41 Paragraph 1 of the Enforcement Decree of the Personal Information Protection Act, and the Company will take action without delay.
③ The right pursuant to Paragraph 1 can be exercised through the legal representative or delegated person of the data subject. In this case, you must submit a power of attorney in the form of Attachment No. 11 of the Enforcement Rules of the Personal Information Protection Act.
④ The rights to request view and suspend processing of personal information may be restricted in accordance with Article 35 (5) and Article 37 (2) of the Personal Information Protection Act.
⑤ The request for correction and deletion of personal information cannot be requested if the personal information is subject to other laws.
⑥ The Company confirms whether the person who made the request, such as a request for access, a request for correction or deletion, or a request for suspension of processing, is the person or a legitimate agent according to the rights of the data subject.

5. The items collectecd by the Company

① The items collected by the Company are as follws :

1.Website membership and management

- Required : Email address, phone number, address, password, name
- Optional :

​6. Destruction procedure and method of personal informaton

In principle, the Company, without delay, destroys personal information concerned after the achievement of the purpose for the collection and use of personal information. The procedures, deadlines and methods for destruction are as follows.

- Destruction Procedure

The information that users offer is moved to a separate database after the information is used for the intended purpose, stored for a certain period of time under the internal policy and relevant legislation, or immediately destroyed. The information transferred to a separate database is not used for any other purpose than being retained unless specified by law.

- Destruction Period

Personal information is deleted within five days when the retention period expires. Personal information is destroyed within five days from the date on which the personal information is recognized as unnecessary, such as the achievement of the purpose of personal information, the abolition of service, or termination of business.

- Destruction Methods

Personal information in the form of electronic files is deleted in technical ways that prevent any record recovery. The information printed on paper is destroyed through paper shredder or incineration.

7. Automatic personal malformation collection system

The Company does not run ‘cookies’ that often store and search the user information.

8. Accountable department

① The Company is responsible for the overall handling of personal information. The Company designates the person in charge of personal information to handle complaints and remedy for customers in relation to personal information processing as follows :

▶ Personal Information Officer:
Position :
Contact number :
※ Please note you will be directed to the accountable department.
▶ Accountable Department
Department :
Personal Information Officer :
Contact number :

​9. Changes in Privacy Policy

① This privacy policy shall become effective on the effective date. Any addition, deletion, and revision of this policy under the statutes or policy shall be notified through a notice at least seven days before the implementation of such changes.

10. Technological,managerial, physical measures for security of personal information

The Company handles the users’ privacy with technological and managerial, physical approaches to prevent loss, theft, leakages, alteration, and compromise and secure stability of the information as follows:

1. Limited access and training of personnel handling personal information

Measures are taken to manage personal information by designating employees who handle personal information and limiting access to personal information.

2. Countermeasure against hacking

In order to prevent leakage and damage of personal information caused by hacking or computer viruses, the Company installs security programs, periodically updates and checks, installs systems in areas where access is controlled from outside, and technically/physically monitors and blocks them. .

3. Encryption of personal information

User’s personal information is stored and managed with an encrypted password, so only the user can access to it. For important data, a separate security function is used, such as encrypting files and data or using a file lock function.

4. Document security locking

Documents and auxiliary storage media containing personal information are stored in a safe place with a file lock function.

5. Access control for unauthorized persons

A separate physical storage location for personal information is prepared and access control procedures are established and operated.