Fleekβs Privacy Policy
π°π·Β κ°μΈμ 보 μ²λ¦¬λ°©μΉ¨
ν리λ©λ‘(μ΄ν βνμ¬β)λ Fleek(μ΄ν βμλΉμ€")λ₯Ό μ 곡νλ©΄μ μ¬μ©μμ κ°μΈμ 보보νΈλ₯Ό λ§€μ° μ€μνκ² μκ°νλ©°, γμ 보ν΅μ λ§ μ΄μ©μ΄μ§ λ° μ λ³΄λ³΄νΈ λ±μ κ΄ν λ²λ₯ γ, γκ°μΈμ 보 보νΈλ²γ λ± κ΄λ ¨λ²κ·λ₯Ό μ€μνκΈ° μνμ¬ κ°μΈμ 보μ²λ¦¬λ°©μΉ¨(μ΄ν βλ°©μΉ¨β)μ μ μ νκ³ μ΄λ₯Ό μ€μνκ³ μμ΅λλ€.
νμ¬μ κ°μΈμ 보μ²λ¦¬λ°©μΉ¨μ κ΄λ ¨ λ²λ₯ λ° μ§μΉ¨μ λ³κ²½μ΄λ νμ¬ λ΄λΆ μ΄μλ°©μΉ¨μ λ³κ²½ λ±μΌλ‘ μΈνμ¬ κ°μ λ μ μμ΅λλ€. λ³Έ λ°©μΉ¨μ΄ λ³κ²½λ κ²½μ° λ³κ²½μ¬νμ ννμ΄μ§μ κ²μλ©λλ€. λ³Έ λ°©μΉ¨μ λν΄ λ¬Έμκ° μλ κ²½μ° μλΉμ€ ννμ΄μ§ λ° νμ¬ ννμ΄μ§ λ΄ κ³ κ°λ¬Έμ μ±λμ ν΅ν΄ μ견μ μ 곡νμ€ μ μμ΅λλ€.
1. κ°μΈμ 보μ μμ§ νλͺ© λ° μ΄μ© λͺ©μ
- νμ¬λ μλΉμ€λ₯Ό μ 곡νκΈ° μν΄μ λ€μκ³Ό κ°μ΄ μ΅μνμ κ°μΈμ 보λ§μ μμ§νκ³ μμ΅λλ€.
User ID λ° μ΄λ©μΌ
- νμ¬λ μ μ λΆμ λ° μλΉμ€ κ°μ λͺ©μ μΌλ‘ User IDλ₯Ό μμ§ν©λλ€. User IDλ κ° μλΉμ€ μ¬μ©μλ₯Ό ꡬλΆνκΈ° μν μ©λλ‘ μ¬μ©λλ μ΅λͺ
IDμ΄λ©°, κ°μΈ μλ³ μ©λλ‘ μ¬μ©ν μ μμ΅λλ€.
- νμ¬λ λ³΄λ€ λμ μλΉμ€λ₯Ό μ 곡νκΈ° μν μλΉμ€ μλ΄ λͺ©μ μΌλ‘ μ¬μ©μμ λ¬Έμλ₯Ό μμ νλ κ³Όμ μμ κ³ κ°λ¬Έμ μ¬νμ νμ
λ° νμ μ μνμ¬ μ΄λ©μΌ μ£Όμ λλ μ νλ²νΈ λ± μ΅μνμ κ°μΈμ 보λ₯Ό μμ§ν©λλ€. λν κ³ κ°μ λ³΄λ€ μ νν μ€λ₯ μ§λ¨μ λ°κΈ° μν΄ μλΉμ€ μ΄μ©μμ λ°μν μ€λ₯ λ°μ΄ν°λ₯Ό νμ¬μ μ μ‘ν μ μμ΅λλ€. μ΄λ νμλ‘ μμ§νλ μ¬νμ μλλ©°, νμ¬λ μλ λͺ
μν λͺ©μ μ΄μΈλ‘λ ν΄λΉ κ°μΈμ 보λ₯Ό μ΄μ©νμ§ μμ΅λλ€.
μμΉ
- νμ¬λ μ μ κ° μλΉμ€ μ΄μ© μ, μλΉμ€ μ΄μ© μμΉλ₯Ό κΈ°λ‘νκΈ° μν΄ λλ΅μ μΈ μμΉ, μ νν μμΉ κΆνμ νμλ‘ ν©λλ€. μμΉ μ 보λ κΈ°λ‘μ ꡬ체μ±μ μν΄μλ§ μ¬μ©ν μ μμ΅λλ€.
- κΆνμ μ 곡νμ§ μμλ μλΉμ€λ₯Ό μ΄μ©ν μ μμ΅λλ€.
ꡬ맀λ΄μ
- νμ¬λ μΈμ± κ²°μ λ₯Ό ν΅ν ꡬλ
μλΉμ€λ₯Ό μ 곡νκΈ° μν΄, μ μ μ ꡬ맀 μ 보 λ°μ΄ν°λ₯Ό μμ§ν©λλ€.
- κΆνμ μ 곡νμ§ μμλ μλΉμ€λ₯Ό μ΄μ©ν μ μμ΅λλ€.
κ±΄κ° λ°μ΄ν°
- νμ¬λ μ μ μ μλΉμ€ μ΄μ© λ΄μμ λͺ¨λ°μΌ λλ°μ΄μ€μ κΈ°λ‘νκΈ° μν΄ κ±΄κ° λ°μ΄ν°μ λν μ κ·Ό κΆνμ νμλ‘ ν©λλ€. κ±΄κ° μ 보λ κ°μΈνλ μλΉμ€ μ 곡과 κΈ°λ‘μ μν΄μλ§ μ¬μ©λ©λλ€.
- κΆνμ μ 곡νμ§ μμλ μλΉμ€λ₯Ό μ΄μ©ν μ μμ΅λλ€.
μ¬μ§
- μλΉμ€μ 컨ν
μΈ λ₯Ό μ
λ‘λνκΈ° μν΄ λλ°μ΄μ€ μ¬μ§ 보κ΄ν¨μ μ κ·Ό κΆνμ νμλ‘ν©λλ€.
- κΆνμ μ 곡νμ§ μμλ μλΉμ€λ₯Ό μ΄μ©ν μ μμ΅λλ€.
κΈ°ν
- κ·Έλ°μ νμ¬λ μ¬μ©μμ λ³Έ μλΉμ€ μ΄μ©κ³Όμ μ΄λ μ¬μ
μ²λ¦¬ κ³Όμ μμ μλΉμ€ μ΄μ©κΈ°λ‘, OS μ’
λ₯ λ° λ²μ , μ μλ‘κ·Έ, κ΄κ³ μλ³μ 보, λ¨λ§κΈ° μ 보 λ± μλμΌλ‘ μμ±λ μ 보λ₯Ό μμ§ν μ μμΌλ©°, νμ¬λ ν΄λΉ μ 보λ₯Ό μ μ λΆμ λ° μλΉμ€ κ°μ λͺ©μ μΌλ‘ μ΄μ©ν μ μμ΅λλ€.
2. κ°μΈμ 보μ μμ§ λ°©λ²
νμ¬λ μνν μλΉμ€ μ 곡μ μν΄ λ€μκ³Ό κ°μ λ°©λ²μΌλ‘ λ³Έ λ°©μΉ¨ μ 1μ‘°μμ λͺ
μν κ°μΈμ 보λ₯Ό μμ§ν©λλ€.
- λͺ¨λ°μΌ μ΄ν리μΌμ΄μ
ν΅ν νμκ°μ
μ νμμ΄ μ§μ μ
λ ₯
- μλΉμ€ μ€μΉ λ° μ¬μ© κ³Όμ μμ μμ§, μμ± μ 보 μμ§ ν΄(μΏ ν€λ₯Ό ν¬ν¨)μ ν΅ν μμ§
- μ¬μ© μ€ νμμ μλ°μ μ 곡μ ν΅ν μμ§ λ±
3. κ°μΈμ 보μ 보μ λ° μ΄μ© κΈ°κ°
- νμ¬λ μμΉμ μΌλ‘ κ°μΈμ 보μ μμ§ λ° μ΄μ©λͺ©μ μ΄ λ¬μ±λλ©΄ μ¬μ©μμ κ°μΈμ 보λ₯Ό μ§μ²΄μμ΄ νκΈ°ν©λλ€. λ€λ§, νμ¬ λ΄λΆ λ°©μΉ¨μ μνμ¬ νμ¬λ νμμ΄ νν΄νκ±°λ νμ¬κ° νμκ³Όμ μ΄μ©κ³μ½μ ν΄μ§νλ κ²½μ° κΆλ¦¬λ¨μ©λ°©μ§, μ
μ©λ°©μ§, κ°μ’
λΆμ λ° μμ¬νμ‘° μλ’°μ λλΉνκΈ° μνμ¬ μ΄μ©κ³μ½ ν΄μ§μΌλ‘λΆν° 1λ
λμ κ°μΈμ 보λ₯Ό 보쑴ν©λλ€.
- μ 1νμλ λΆκ΅¬νκ³ γν΅μ λΉλ°λ³΄νΈλ²γ λ± κ΄λ ¨ λ²λ Ήμ μνμ¬ λ³΄μ‘΄ν νμκ° μλ κ²½μ°μλ κ·Έ κΈ°κ° λμ 보쑴ν©λλ€. μ΄ κ²½μ°, νμ¬λ 보κ΄νλ μ 보λ₯Ό κ·Έ λ³΄κ΄ λͺ©μ μΌλ‘λ§ μ΄μ©ν©λλ€.
- κΈ°ν λ²λ₯ μμ κ·μ ν μ무λ₯Ό μ€μνκΈ° μν΄ μ²λ¦¬ν κ°μΈμ 보 μ΄λ ₯μ κ·Έ μ±
μμ μ
μ¦νκΈ° μν κΈ°κ° λμ 보κ΄ν μ μμ΅λλ€.
4. κ°μΈμ 보μ μ²λ¦¬ μν λ° κ΅μΈ μ΄μ
νμ¬λ μλΉμ€ ν₯μμ μν΄ κ΄κ³λ²λ Ήμ λ°λΌ μ¬μ©μμ λμλ₯Ό μ»κ±°λ κ΄λ ¨ μ¬νμ κ³΅κ° λλ κ³ μ§ ν νμμ κ°μΈμ 보λ₯Ό μΈλΆμ μννμ¬ μ²λ¦¬νκ³ μμ΅λλ€. νμ¬λ κ°μΈμ 보보νΈλ² μ 26μ‘° μ 1ν κ° νΈμ λ΄μ©μ΄ ν¬ν¨λ λ¬Έμμ μνμ¬ μνκ³μ½μ 체결νκ³ μνμκ° κ°μΈμ 보λ₯Ό μμ νκ² μ²λ¦¬νλμ§λ₯Ό κ°λ
νκ³ μμ΅λλ€. νμ¬, μ¬μ©μμ κ°μΈμ 보 μ²λ¦¬ μνμμ κ·Έ μ
무μ λ΄μ©μ μλμ κ°μ΅λλ€.
Fleekλ κ°μΈμ 보λ₯Ό κ΅μΈμ λ€λ₯Έ μ¬μ
μμκ² μ 곡νμ§ μμ΅λλ€. λ€λ§, μ 보ν΅μ μλΉμ€μ μ 곡μ κ΄ν κ³μ½ μ΄ν λ° μ¬μ©μ νΈμλ₯Ό μνμ¬ λ€μκ³Ό κ°μ΄ κ°μΈμ 보 μ²λ¦¬ μ
무λ₯Ό κ΅μΈμ μννκ³ μμ΅λλ€.
- μλΉμ€ μ΄μ©μ λ°λΌ μ¬μ©μμ λμλ₯Ό μ»μ΄ μμ§ν κ°μΈμ 보, μμ±λ μ€μΉμ 보, κ°μΈμλ³λΆκ°μ 보 λ° ν΅κ³ μ 보λ νμ΄μ΄λ² μ΄μ€(Firebase) μνλ² μ΄μ€(Supabase) λ° Amazon Web Services, Inc. μ μλ§μ‘΄ μΉμλΉμ€(AWS)μ μ μ‘, μ²λ¦¬ λ° μ μ₯λ©λλ€.
- μ λ£ μλΉμ€μ λν κ²°μ κΈ°λ₯μ μ 곡νκΈ° μνμ¬ Google Play λ° Apple App Storeμμ μ 곡νλ κ²°μ μμ€ν
μ μ¬μ©ν©λλ€.
5. κ°μΈμ 보μ μ 3μ μ 곡
- νμ¬λ μ¬μ©μμ κ°μΈμ 보λ₯Ό μ 1μ‘°μμ κ³ μ§ν λ²μλ΄μμ μ¬μ©νλ©°, λ λ²μλ₯Ό μ΄κ³Όνμ¬ μ΄μ©νκ±°λ νμΈ λλ νκΈ°μ
Β·κΈ°κ΄μ μ 곡νμ§ μμ΅λλ€. λ€λ§ λ€μ κ°νΈμ κ²½μ°μλ μμΈλ‘ ν©λλ€.
- μμ¬λͺ©μ μΌλ‘ κ΄κ³λ²λ₯ μμ μ ν μ μ°¨μ λ°©λ²μ λ°λΌ μμ¬κΈ°κ΄μ΄ κ°μΈμ 보 μ 곡μ μꡬνλ κ²½μ°
- ν΅κ³μμ±, νμ μ°κ΅¬λ μμ₯μ‘°μ¬ λ±μ μνμ¬ νΉμ κ°μΈμ μλ³ν μ μλ ννλ‘ κ΄κ³ μ£Ό, νλ ₯μ¬λ μ°κ΅¬λ¨μ²΄ λ±μ μ 곡νλ κ²½μ°
- κΈ°ν κ΄κ³λ²λ₯ μ κ·μ μ λ°λ₯Έ μμ²μ΄ μλ κ²½μ°
- κ·Έ λ°μ κ°μΈμ 보μ μ 3μ μ κ³΅μ΄ νμν κ²½μ°μλ μμ§ λ° μ΄μ©λͺ©μ κ³Ό νλͺ©, 보μ κΈ°κ° λ±μ κ³ μ§νκ³ μ¬μ©μμ λμλ₯Ό μ»μ΄ μ 3μμκ² κ°μΈμ 보λ₯Ό μ 곡ν μ μμ΅λλ€.
6. κ°μΈμ 보μ νκΈ°μ μ°¨ λ° λ°©λ²
νμ¬λ μμΉμ μΌλ‘ κ°μΈμ 보 μμ§ λ° μ΄μ©λͺ©μ μ΄ λ¬μ±λ νμλ ν΄λΉ μ 보λ₯Ό μ§μ²΄μμ΄ νκΈ°ν©λλ€. ꡬ체μ μΈ νκΈ°μ μ°¨μ νκΈ°λ°©λ²μ λ€μκ³Ό κ°μ΅λλ€.
-
νκΈ°μ μ°¨
νμ¬κ° μμ§ν κ°μΈμ 보λ μμ§ λͺ©μ μ΄ λ¬μ±λ ν λ³Έ μ½κ΄ λ° κΈ°ν κ΄λ ¨ λ²λ Ήμ μ ν κΈ°κ°λμ μ μ₯λ ν νκΈ°ν©λλ€. λ κ°μΈμ 보λ λ²λ₯ μ μν κ²½μ°κ° μλκ³ μλ λμ λ°μ 보μ λͺ©μ μ΄μΈμ λ€λ₯Έ λͺ©μ μΌλ‘ μ΄μ©νμ§ μμ΅λλ€.
-
νκΈ°λ°©λ²
- μ’
μ΄μ μΆλ ₯λ κ°μΈμ 보λ λΆμκΈ°λ‘ λΆμνκ±°λ μκ°μ ν΅νμ¬ νκΈ°ν©λλ€.
- μ μμ νμΌ ννλ‘ μ μ₯λ κ°μΈμ 보λ κΈ°λ‘μ μ¬μν μ μλ κΈ°μ μ λ°©λ²μ μ¬μ©νμ¬ μμ ν©λλ€.
7. μ¬μ©μ λ° λ²μ λ리μΈμ κΆλ¦¬ λ° μ무
- μ¬μ©μ(λ§ 14μΈ λ―Έλ§μΈ κ²½μ° λ²μ λ리μΈ)λ μΈμ λ μ§ λ±λ‘λ μμ μ κ°μΈμ 보λ₯Ό μ΄λνκ±°λ μμ μ μμ²νλ μ²κ΅¬κΆμ κ°μ§λ©°, μλΉμ€ μμ λλ νμ¬μ λν ν΅μ§λ₯Ό ν΅νμ¬ κ°μΈμ 보 μ΄μ©μ λν λμλ₯Ό μ² νν μ μμ΅λλ€. λ¨ κ°μ
μ μ
λ ₯ν νμμ μ΄λ©μΌ μ£Όμλ μμ λΆκ°ν©λλ€.
- μ¬μ©μλ μ¬μ©μμ κ°μΈμ 보λ₯Ό μ€μ€λ‘λ₯Ό 보νΈνκ³ νμΈμ κ°μΈμ 보λ₯Ό μΉ¨ν΄νμ§ μμ μ무λ₯Ό κ°μ§κ³ μμ΅λλ€. μ΄λ©μΌ λ± κ°μΈμ λ³΄κ° μ μΆλμ§ μλλ‘ μ£Όμνμκ³ νμΈμ κ°μΈμ 보λ₯Ό μΉ¨ν΄νμ§ μλλ‘ μ μν΄μ£ΌμκΈ° λ°λλλ€.
- μ¬μ©μλ κ°μΈμ 보λ₯Ό νμ μ΅μ μ μνλ‘ μ μ§ν΄μΌ νλ©°, μ¬μ©μκ° μ
λ ₯ν λΆμ νν μ λ³΄λ‘ μΈνμ¬ λ°μν λ¬Έμ μ μ±
μμ μ¬μ©μκ° λΆλ΄ν©λλ€.
8. ν΄μΈ μ¬μ©μλ₯Ό μν κ°μΈμ 보보νΈ
νμ¬μ μλΉμ€λ λνλ―Όκ΅ λ²λ Ήμ μκ±°ν΄ μ 곡 λ° μ΄μλλ©° λ³Έ κ°μΈμ 보μ²λ¦¬λ°©μΉ¨μ κ΅λ¬ΈμΌλ‘ μμ±λ κ°μΈμ 보μ²λ¦¬λ°©μΉ¨μ μ λ³ΈμΌλ‘ ν©λλ€. λ³Έ λ°©μΉ¨μ μλ¬Έ λ° μΌλ³Έμ΄ λ±μΌλ‘ λ²μλμ΄ μ 곡λ μ μμΌλ©° ν΄λΉ λ²μλ³Έκ³Ό λ³Έ νκ΅μ΄ λ²μ μ λ΄μ©μ μμΆ©λλ λ΄μ©μ΄ μλ κ²½μ° νκ΅μ΄ λ²μ μ μ°μ ν©λλ€. νμ¬λ μλΉμ€λ₯Ό μ΄μ©νλ μ¬μ©μμ κ΄ν μ§μμ μ μ©λλ κ°μΈμ λ³΄λ³΄νΈ κ΄λ ¨ κ·μ λ° κ° κ΅κ°μ λ²λ₯ μ μ€μν©λλ€.
9. κ°μΈμ 보μ κΈ°μ μ /κ΄λ¦¬μ λ³΄νΈ λμ±
νμ¬λ μ¬μ©μλ€μ κ°μΈμ 보λ₯Ό μ²λ¦¬νλ©΄μ κ°μΈμ λ³΄κ° λΆμ€, λλ, μ μΆ, λ³μ‘° λλ νΌμλμ§ μλλ‘ μμ μ± ν보λ₯Ό μνμ¬ λ€μκ³Ό κ°μ κΈ°μ μ /κ΄λ¦¬μ λμ±
μ λ§λ ¨νκ³ μμ΅λλ€.
-
κΈ°μ μ 보νΈμ‘°μΉ
- νμ¬λ ν΄νΉμ΄λ μ»΄ν¨ν° λ°μ΄λ¬μ€ λ±μ μν΄ μ¬μ©μμ κ°μΈμ λ³΄κ° μ μΆλκ±°λ νΌμλλ κ²μ λ§κΈ° μν΄ μνΈν ν΅μ λ±μ ν΅νμ¬ λ€νΈμν¬μμμ κ°μΈμ 보λ₯Ό μμ νκ² μ μ‘ν μ μλλ‘ νκ³ μμ΅λλ€.
- λ°©νλ²½μ μ΄μ©νμ¬ μΈλΆλ‘λΆν°μ λ¬΄λ¨ μ κ·Όμ λ°©μ§νκ³ μμΌλ©°, κΈ°ν μμ€ν
μ μΌλ‘ 보μμ±μ ν보νκΈ° μν κ°λ₯ν λͺ¨λ κΈ°μ μ μ₯μΉλ₯Ό κ°μΆλ € λ
Έλ ₯νκ³ μμ΅λλ€.
- νμ¬λ νμκ°μ
μ μμ§ν νμμ μ 보λ₯Ό AWS, Firebase λ° Supabaseμ λ°μ΄ν°λ² μ΄μ€μ μ΄μ€μΌλ‘ 보κ΄ν©λλ€.
-
κ΄λ¦¬μ 보νΈμ‘°μΉ
- νμ¬μ κ°μΈμ 보κ΄λ ¨ μ²λ¦¬ μ§μμ λ΄λΉμμ νμ μν€κ³ μκ³ λ΄λΉμμ λν μμ κ΅μ‘μ ν΅νμ¬ κ°μΈμ 보μ²λ¦¬λ°©μΉ¨μ μ€μλ₯Ό νμ κ°μ‘°νκ³ μμ΅λλ€.
- μ¬λ΄ κ°μΈμ 보 보νΈμ λ΄κΈ°κ΅¬λ₯Ό ν΅νμ¬ κ°μΈμ 보 보νΈλ°©μΉ¨μ μ΄νμ¬ν λ° λ΄λΉμμ μ€μ μ¬λΆλ₯Ό νμΈνμ¬ λ¬Έμ κ° λ°κ²¬λ κ²½μ° μ¦μ μμ νκ³ λ°λ‘μ‘μ μ μλλ‘ λ
Έλ ₯νκ³ μμ΅λλ€.
- νμ¬λ νμ¬μ κ·μ±
μ¬μ μμ΄ λ°μνλ μ¬μ©μ κ°μΈμ μ€μ λ° μ 3μλ‘ μΈν΄ λ°μνλ κ°μΈμ 보κ΄λ ¨ λ¬Έμ μ λν΄μλ μ±
μμ μ§μ§ μμ΅λλ€.
-
κ°μΈμ 보 보νΈμ±
μμ
νμ¬λ κ°μΈ μ 보λ₯Ό μμ νκ² μ΄μ©νμ¬ μ΅μμ μλΉμ€λ₯Ό μ 곡νκΈ° μνμ¬ μ΅μ μ λ€νκ³ μμ΅λλ€. κ·Έλ¬λ κΈ°μ μ μΈ λ³΄μμ‘°μΉλ₯Ό νμμλ λΆκ΅¬νκ³ , ν΄νΉ λ± κΈ°λ³Έμ μΈ λ€νΈμν¬μμ μνμ±μ μν΄ λ°μνλ μκΈ°μΉ λͺ»ν μ¬κ³ λ‘ μΈν μ 보μ νΌμ λ° μ¬μ©μ λ° μ 3μκ° μμ±ν κ²μλ¬Όμ μν κ°μ’
λΆμμ κ΄ν΄μλ μΌμ²΄ μ±
μμ μ§μ§ μμ΅λλ€.
κ°μΈμ 보 보νΈμ±
μμλ λ€μκ³Ό κ°μΌλ©°, κ°μΈμ 보 κ΄λ ¨ λ¬Έμμ¬νμ μ μνκ³ μ±μ€νκ² λ΅λ³ν΄λλ¦¬κ³ μμ΅λλ€.
κ°μΈμ 보보νΈμ±
μμ
| μ΄λ¦ | ν©μ±ν |
| --------- | --------------------- |
| μμ/μ§μ | ν리λ©λ‘/CEO |
| μ΄λ©μΌ | busking@fleek.fitness |
| μ ν | +82 10-2400-2122 |
κΈ°ν κ°μΈμ 보침ν΄μ λν μ κ³ λ μλ΄μ΄ νμνμ κ²½μ°μλ μλ κΈ°κ΄μ λ¬ΈμνμκΈ° λ°λλλ€.
- κ°μΈμ 보침ν΄μ κ³ μΌν° (privacy.kisa.or.kr / κ΅λ² μμ΄ 118)
- λκ²μ°°μ² μ¬μ΄λ²μμ¬κ³Ό (spo.go.kr / κ΅λ² μμ΄ 1301)
- κ²½μ°°μ² μ¬μ΄λ²μμ κ΅ (cyberbureau.police.go.kr / κ΅λ² μμ΄ 182)
End of Document
Fleek's Privacy Policy
Privacy Policy
Primero (the "Company") attaches great importance to the privacy of its users while providing Fleek (the "Service"), and has established a privacy policy (the "Policy") to comply with relevant laws and regulations such as the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Personal Information Protection Act.
The Company's Privacy Policy may be revised due to changes in relevant laws and guidelines or changes in the Company's internal operating policies. Any changes to this Policy will be posted on the homepage. If you have any questions about this policy, you can provide your opinion through the customer inquiry channel on the service homepage and the company homepage.
1. Personal Information Collection Items and Purpose of Use
- The Company collects only the minimum amount of personal information as follows to provide the service.
User ID and email
- The Company collects User ID for the purpose of user analysis and service improvement. User ID is an anonymous ID used to distinguish each service user, and cannot be used for personal identification purposes.
- In the process of receiving inquiries from users for the purpose of service consultation to provide better services, the Company collects minimal personal information such as email address or phone number to identify and reply to customer inquiries. In addition, customers may send error data arising from the use of the Service to the Company for more accurate error diagnosis. This is not mandatory, and the Company will not use such personal information for any purpose other than those specified below.
Location
- When you use the Service, the Company requires approximate location and precise location permission to record the location of your use of the Service. Location information can only be used for the specificity of the record.
- You can use the service even if you do not provide the permission.
Purchase History
- In order to provide subscription services through in-app purchases, the Company collects purchase information data of users.
- You can use the service without providing permission.
Health Data
- We need access to health data to record your service usage history on your mobile device. Health data is only used to provide personalized services and for recording.
- You can use the Services even if you do not provide permission.
Photos
- we need access to your device photo library to upload content to the Service.
- You can use the Service without providing permission.
Other
- In addition, the Company may collect automatically generated information such as service usage history, OS type and version, access logs, advertising identification information, and terminal information in the course of the user's use of the Service or business processing, and the Company may use such information for user analysis and service improvement purposes.
2. Methods of collecting personal information
The Company collects personal information specified in Article 1 of this policy in the following ways to provide smooth service.
- Directly entered by the member when registering for membership through the mobile application
- Collected and generated in the process of installing and using the service Collected through information collection tools (including cookies)
- Collection through voluntary provision by members during use, etc.
3. Period of retention and use of personal information
- In principle, the Company destroys the user's personal information without delay when the purpose of collecting and using personal information is achieved. However, in accordance with the Company's internal policy, the Company retains personal information for one year from the date of termination of the use contract in order to prevent abuse of rights, prevent abuse, and prepare for various disputes and requests for investigation cooperation if the member withdraws or the Company terminates the use contract with the member.
- Notwithstanding Paragraph 1, if it is necessary to preserve the information in accordance with relevant laws such as the γCommunication Secrets Protection Actγ, it shall be preserved for that period. In this case, the Company shall only use the retained information for the purpose of retention.
- The history of personal information processed to comply with obligations stipulated by other laws may be retained for a period of time to prove its responsibility.
4. Outsourcing and Transfer of Personal Information
In order to improve the service, the Company entrusts and processes members' personal information to an external party after obtaining the user's consent or disclosing or notifying related matters in accordance with relevant laws and regulations. The Company concludes consignment contracts based on documents containing the contents of Article 26, Paragraph 1, Item 1 of the Personal Information Protection Act and supervises whether the trustee processes personal information safely. Currently, the consignees of your personal information and the contents of their work are as follows.
Fleek does not provide personal information to other businesses outside of Korea. However, for the purpose of fulfilling the contract for the provision of information and communication services and for the convenience of users, Fleek outsources the processing of personal information as follows.
- Personal information, generated installation information, non-personally identifiable information, and statistical information collected with the consent of the user in accordance with the use of the service are transmitted, processed, and stored in Firebase, Supabase, and Amazon Web Services (AWS) of Amazon Web Services, Inc.
- To provide payment features for paid services, we use payment systems provided by Google Play and Apple App Store.
5. Provision of Personal Information to Third Parties
- The Company uses the user's personal information within the scope notified in Article 1, and does not use it beyond the scope or provide it to other companies or organizations, except in the following cases.
- When an investigative agency requires the provision of personal information in accordance with the procedures and methods prescribed by relevant laws for the purpose of investigation.
- when provided to advertisers, partners, or research organizations in a form that does not identify specific individuals for statistical compilation, academic research, or market research.
- When requested in accordance with the provisions of other related laws.
- If it is necessary to provide personal information to a third party, we may provide personal information to a third party with the consent of the user after notifying the purpose of collection and use, items, and retention period.
6. Procedures and methods for destroying personal information
In principle, the company destroys the information without delay after the purpose of collecting and using personal information is achieved. The specific destruction procedures and methods are as follows.
-
destruction procedure
Personal information collected by the Company shall be stored for the period stipulated in this Agreement and other relevant laws and regulations after the purpose of collection is achieved, and then destroyed. The personal information shall not be used for any purpose other than the consented purpose of retention unless required by law.
-
destruction method
- Personal information printed on paper shall be destroyed by shredding or incineration.
- Personal information stored in the form of electronic files will be deleted using a technical method that makes it impossible to reproduce the records.
7. Rights and Obligations of Users and Legal Representatives
- Users (or their legal representatives if they are under the age of 14) have the right to view or request modification of their registered personal information at any time, and may withdraw their consent to the use of personal information by deleting the service or notifying the Company. However, the member's email address entered at the time of registration cannot be modified.
- Users are obligated to protect their own personal information and not to infringe on the personal information of others. Please be careful not to leak personal information such as emails, and be careful not to infringe on the personal information of others.
- You must keep your personal information up to date at all times, and you are responsible for any problems caused by inaccurate information entered by you.
8. Personal Information Protection for Overseas Users
The Company's Services are provided and operated in accordance with the laws and regulations of the Republic of Korea, and this Privacy Policy is an authentic version of the Privacy Policy written in Korean. This Policy may be translated into English and Japanese, etc., and if there is any conflict between such translation and this Korean version, the Korean version shall prevail. The Company complies with the privacy-related regulations and laws of each country applicable to the jurisdiction of the user using the Service.
9. Technical and administrative protection measures for personal information
The Company takes the following technical and administrative measures to ensure the safety of personal information while processing users' personal information so that it is not lost, stolen, leaked, altered or damaged.
-
Technical protection measures
- In order to prevent users' personal information from being leaked or damaged by hacking or computer viruses, the Company ensures that personal information can be transmitted safely on the network through encrypted communication, etc.
- The Company prevents unauthorized access from the outside by using a firewall and strives to have all possible technical devices to ensure systematic security.
- The Company redundantly stores members' information collected at the time of membership in databases of AWS, Firebase, and Supabase.
-
Administrative Safeguards
- The Company's personal information processing staff is limited to the person in charge, and the Company always emphasizes compliance with the Privacy Policy through frequent training for the person in charge.
- The Company checks the implementation of the Privacy Policy and the compliance of the person in charge through the in-house personal information protection organization, and makes efforts to immediately correct and correct any problems found.
- The Company is not responsible for any personal information-related problems caused by users' individual mistakes and third parties that occur without any reason attributable to the Company.
-
Personal Information Protection Officer
The Company is doing its best to provide the best service by using personal information safely. However, despite technical complementary measures, the Company is not responsible for any damage to information due to unexpected accidents caused by basic network risks such as hacking, and various disputes caused by posts made by users and third parties.
The person in charge of personal information protection is as follows, and we will respond promptly and sincerely to inquiries related to personal information.
End of Document