Fleek’s Privacy Policy

πŸ‡°πŸ‡·Β κ°œμΈμ •λ³΄ 처리방침

ν”„λ¦¬λ©”λ‘œ(μ΄ν•˜ β€œνšŒμ‚¬β€)λŠ” Fleek(μ΄ν•˜ β€œμ„œλΉ„μŠ€")λ₯Ό μ œκ³΅ν•˜λ©΄μ„œ μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄λ³΄ν˜Έλ₯Ό 맀우 μ€‘μš”ν•˜κ²Œ μƒκ°ν•˜λ©°, γ€Œμ •λ³΄ν†΅μ‹ λ§ μ΄μš©μ΄‰μ§„ 및 μ •λ³΄λ³΄ν˜Έ 등에 κ΄€ν•œ 법λ₯ γ€, γ€Œκ°œμΈμ •λ³΄ λ³΄ν˜Έλ²•γ€ λ“± κ΄€λ ¨λ²•κ·œλ₯Ό μ€€μˆ˜ν•˜κΈ° μœ„ν•˜μ—¬ κ°œμΈμ •λ³΄μ²˜λ¦¬λ°©μΉ¨(μ΄ν•˜ β€œλ°©μΉ¨β€)을 μ œμ •ν•˜κ³  이λ₯Ό μ€€μˆ˜ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.

νšŒμ‚¬μ˜ κ°œμΈμ •λ³΄μ²˜λ¦¬λ°©μΉ¨μ€ κ΄€λ ¨ 법λ₯  및 μ§€μΉ¨μ˜ λ³€κ²½μ΄λ‚˜ νšŒμ‚¬ λ‚΄λΆ€ 운영방침의 λ³€κ²½ λ“±μœΌλ‘œ μΈν•˜μ—¬ κ°œμ •λ  수 μžˆμŠ΅λ‹ˆλ‹€. λ³Έ 방침이 변경될 경우 변경사항은 ν™ˆνŽ˜μ΄μ§€μ— κ²Œμ‹œλ©λ‹ˆλ‹€. λ³Έ 방침에 λŒ€ν•΄ λ¬Έμ˜κ°€ μžˆλŠ” 경우 μ„œλΉ„μŠ€ ν™ˆνŽ˜μ΄μ§€ 및 νšŒμ‚¬ ν™ˆνŽ˜μ΄μ§€ λ‚΄ 고객문의 채널을 톡해 μ˜κ²¬μ„ μ œκ³΅ν•˜μ‹€ 수 μžˆμŠ΅λ‹ˆλ‹€.

1. κ°œμΈμ •λ³΄μ˜ μˆ˜μ§‘ ν•­λͺ© 및 이용 λͺ©μ 

  1. νšŒμ‚¬λŠ” μ„œλΉ„μŠ€λ₯Ό μ œκ³΅ν•˜κΈ° μœ„ν•΄μ„œ λ‹€μŒκ³Ό 같이 μ΅œμ†Œν•œμ˜ κ°œμΈμ •λ³΄λ§Œμ„ μˆ˜μ§‘ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.

User ID 및 이메일

  1. νšŒμ‚¬λŠ” μœ μ € 뢄석 및 μ„œλΉ„μŠ€ κ°œμ„  λͺ©μ μœΌλ‘œ User IDλ₯Ό μˆ˜μ§‘ν•©λ‹ˆλ‹€. User IDλŠ” 각 μ„œλΉ„μŠ€ μ‚¬μš©μžλ₯Ό κ΅¬λΆ„ν•˜κΈ° μœ„ν•œ μš©λ„λ‘œ μ‚¬μš©λ˜λŠ” 읡λͺ… ID이며, 개인 식별 μš©λ„λ‘œ μ‚¬μš©ν•  수 μ—†μŠ΅λ‹ˆλ‹€.
  2. νšŒμ‚¬λŠ” 보닀 λ‚˜μ€ μ„œλΉ„μŠ€λ₯Ό μ œκ³΅ν•˜κΈ° μœ„ν•œ μ„œλΉ„μŠ€ 상담 λͺ©μ μœΌλ‘œ μ‚¬μš©μžμ˜ 문의λ₯Ό μˆ˜μ‹ ν•˜λŠ” κ³Όμ •μ—μ„œ 고객문의 μ‚¬ν•­μ˜ νŒŒμ•… 및 νšŒμ‹ μ„ μœ„ν•˜μ—¬ 이메일 μ£Όμ†Œ λ˜λŠ” μ „ν™”λ²ˆν˜Έ λ“± μ΅œμ†Œν•œμ˜ κ°œμΈμ •λ³΄λ₯Ό μˆ˜μ§‘ν•©λ‹ˆλ‹€. λ˜ν•œ 고객은 보닀 μ •ν™•ν•œ 였λ₯˜ 진단을 λ°›κΈ° μœ„ν•΄ μ„œλΉ„μŠ€ μ΄μš©μ—μ„œ λ°œμƒν•œ 였λ₯˜ 데이터λ₯Ό νšŒμ‚¬μ— 전솑할 수 μžˆμŠ΅λ‹ˆλ‹€. μ΄λŠ” ν•„μˆ˜λ‘œ μˆ˜μ§‘ν•˜λŠ” 사항은 μ•„λ‹ˆλ©°, νšŒμ‚¬λŠ” μ•„λž˜ λͺ…μ‹œν•œ λͺ©μ  μ΄μ™Έλ‘œλŠ” ν•΄λ‹Ή κ°œμΈμ •λ³΄λ₯Ό μ΄μš©ν•˜μ§€ μ•ŠμŠ΅λ‹ˆλ‹€.

μœ„μΉ˜

  1. νšŒμ‚¬λŠ” μœ μ €κ°€ μ„œλΉ„μŠ€ 이용 μ‹œ, μ„œλΉ„μŠ€ 이용 μœ„μΉ˜λ₯Ό κΈ°λ‘ν•˜κΈ° μœ„ν•΄ λŒ€λž΅μ μΈ μœ„μΉ˜, μ •ν™•ν•œ μœ„μΉ˜ κΆŒν•œμ„ ν•„μš”λ‘œ ν•©λ‹ˆλ‹€. μœ„μΉ˜ μ •λ³΄λŠ” 기둝의 ꡬ체성을 μœ„ν•΄μ„œλ§Œ μ‚¬μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.
  2. κΆŒν•œμ„ μ œκ³΅ν•˜μ§€ μ•Šμ•„λ„ μ„œλΉ„μŠ€λ₯Ό μ΄μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

ꡬ맀내역

  1. νšŒμ‚¬λŠ” 인앱 결제λ₯Ό ν†΅ν•œ ꡬ독 μ„œλΉ„μŠ€λ₯Ό μ œκ³΅ν•˜κΈ° μœ„ν•΄, μœ μ €μ˜ ꡬ맀 정보 데이터λ₯Ό μˆ˜μ§‘ν•©λ‹ˆλ‹€.
  2. κΆŒν•œμ„ μ œκ³΅ν•˜μ§€ μ•Šμ•„λ„ μ„œλΉ„μŠ€λ₯Ό μ΄μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

건강 데이터

  1. νšŒμ‚¬λŠ” μœ μ €μ˜ μ„œλΉ„μŠ€ 이용 내역을 λͺ¨λ°”일 λ””λ°”μ΄μŠ€μ— κΈ°λ‘ν•˜κΈ° μœ„ν•΄ 건강 데이터에 λŒ€ν•œ μ ‘κ·Ό κΆŒν•œμ„ ν•„μš”λ‘œ ν•©λ‹ˆλ‹€. 건강 μ •λ³΄λŠ” κ°œμΈν™”λœ μ„œλΉ„μŠ€ 제곡과 기둝을 μœ„ν•΄μ„œλ§Œ μ‚¬μš©λ©λ‹ˆλ‹€.
  2. κΆŒν•œμ„ μ œκ³΅ν•˜μ§€ μ•Šμ•„λ„ μ„œλΉ„μŠ€λ₯Ό μ΄μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

사진

  1. μ„œλΉ„μŠ€μ— 컨텐츠λ₯Ό μ—…λ‘œλ“œν•˜κΈ° μœ„ν•΄ λ””λ°”μ΄μŠ€ 사진 λ³΄κ΄€ν•¨μ˜ μ ‘κ·Ό κΆŒν•œμ„ ν•„μš”λ‘œν•©λ‹ˆλ‹€.
  2. κΆŒν•œμ„ μ œκ³΅ν•˜μ§€ μ•Šμ•„λ„ μ„œλΉ„μŠ€λ₯Ό μ΄μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

기타

  1. 그밖에 νšŒμ‚¬λŠ” μ‚¬μš©μžμ˜ λ³Έ μ„œλΉ„μŠ€ μ΄μš©κ³Όμ •μ΄λ‚˜ μ‚¬μ—…μ²˜λ¦¬ κ³Όμ •μ—μ„œ μ„œλΉ„μŠ€ 이용기둝, OS μ’…λ₯˜ 및 버전, μ ‘μ†λ‘œκ·Έ, 광고식별정보, 단말기 정보 λ“± μžλ™μœΌλ‘œ μƒμ„±λœ 정보λ₯Ό μˆ˜μ§‘ν•  수 있으며, νšŒμ‚¬λŠ” ν•΄λ‹Ή 정보λ₯Ό μœ μ € 뢄석 및 μ„œλΉ„μŠ€ κ°œμ„  λͺ©μ μœΌλ‘œ μ΄μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

2. κ°œμΈμ •λ³΄μ˜ μˆ˜μ§‘ 방법

νšŒμ‚¬λŠ” μ›ν™œν•œ μ„œλΉ„μŠ€ μ œκ³΅μ„ μœ„ν•΄ λ‹€μŒκ³Ό 같은 λ°©λ²•μœΌλ‘œ λ³Έ λ°©μΉ¨ 제1μ‘°μ—μ„œ λͺ…μ‹œν•œ κ°œμΈμ •λ³΄λ₯Ό μˆ˜μ§‘ν•©λ‹ˆλ‹€.

3. κ°œμΈμ •λ³΄μ˜ 보유 및 이용 κΈ°κ°„

  1. νšŒμ‚¬λŠ” μ›μΉ™μ μœΌλ‘œ κ°œμΈμ •λ³΄μ˜ μˆ˜μ§‘ 및 이용λͺ©μ μ΄ λ‹¬μ„±λ˜λ©΄ μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄λ₯Ό 지체없이 νŒŒκΈ°ν•©λ‹ˆλ‹€. λ‹€λ§Œ, νšŒμ‚¬ λ‚΄λΆ€ 방침에 μ˜ν•˜μ—¬ νšŒμ‚¬λŠ” νšŒμ›μ΄ νƒˆν‡΄ν•˜κ±°λ‚˜ νšŒμ‚¬κ°€ νšŒμ›κ³Όμ˜ μ΄μš©κ³„μ•½μ„ ν•΄μ§€ν•˜λŠ” 경우 κΆŒλ¦¬λ‚¨μš©λ°©μ§€, μ•…μš©λ°©μ§€, 각쒅 λΆ„μŸ 및 μˆ˜μ‚¬ν˜‘μ‘° μ˜λ’°μ— λŒ€λΉ„ν•˜κΈ° μœ„ν•˜μ—¬ μ΄μš©κ³„μ•½ ν•΄μ§€μΌλ‘œλΆ€ν„° 1λ…„ λ™μ•ˆ κ°œμΈμ •λ³΄λ₯Ό λ³΄μ‘΄ν•©λ‹ˆλ‹€.
  2. 제1항에도 λΆˆκ΅¬ν•˜κ³  γ€Œν†΅μ‹ λΉ„λ°€λ³΄ν˜Έλ²•γ€ λ“± κ΄€λ ¨ 법령에 μ˜ν•˜μ—¬ 보쑴할 ν•„μš”κ°€ μžˆλŠ” κ²½μš°μ—λŠ” κ·Έ κΈ°κ°„ λ™μ•ˆ λ³΄μ‘΄ν•©λ‹ˆλ‹€. 이 경우, νšŒμ‚¬λŠ” λ³΄κ΄€ν•˜λŠ” 정보λ₯Ό κ·Έ 보관 λͺ©μ μœΌλ‘œλ§Œ μ΄μš©ν•©λ‹ˆλ‹€.
  3. 기타 법λ₯ μ—μ„œ κ·œμ •ν•œ 의무λ₯Ό μ€€μˆ˜ν•˜κΈ° μœ„ν•΄ μ²˜λ¦¬ν•œ κ°œμΈμ •λ³΄ 이λ ₯은 κ·Έ μ±…μž„μ„ μž…μ¦ν•˜κΈ° μœ„ν•œ κΈ°κ°„ λ™μ•ˆ 보관할 수 μžˆμŠ΅λ‹ˆλ‹€.

4. κ°œμΈμ •λ³΄μ˜ 처리 μœ„νƒ 및 κ΅­μ™Έ 이전

νšŒμ‚¬λŠ” μ„œλΉ„μŠ€ ν–₯상을 μœ„ν•΄ 관계법령에 따라 μ‚¬μš©μžμ˜ λ™μ˜λ₯Ό μ–»κ±°λ‚˜ κ΄€λ ¨ 사항을 곡개 λ˜λŠ” 고지 ν›„ νšŒμ›μ˜ κ°œμΈμ •λ³΄λ₯Ό 외뢀에 μœ„νƒν•˜μ—¬ μ²˜λ¦¬ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€. νšŒμ‚¬λŠ” κ°œμΈμ •λ³΄λ³΄ν˜Έλ²• 제26μ‘° 제1ν•­ 각 호의 λ‚΄μš©μ΄ ν¬ν•¨λœ λ¬Έμ„œμ— μ˜ν•˜μ—¬ μœ„νƒκ³„μ•½μ„ μ²΄κ²°ν•˜κ³  μˆ˜νƒμžκ°€ κ°œμΈμ •λ³΄λ₯Ό μ•ˆμ „ν•˜κ²Œ μ²˜λ¦¬ν•˜λŠ”μ§€λ₯Ό κ°λ…ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€. ν˜„μž¬, μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄ 처리 μˆ˜νƒμžμ™€ κ·Έ μ—…λ¬΄μ˜ λ‚΄μš©μ€ μ•„λž˜μ™€ κ°™μŠ΅λ‹ˆλ‹€.

FleekλŠ” κ°œμΈμ •λ³΄λ₯Ό κ΅­μ™Έμ˜ λ‹€λ₯Έ μ‚¬μ—…μžμ—κ²Œ μ œκ³΅ν•˜μ§€ μ•ŠμŠ΅λ‹ˆλ‹€. λ‹€λ§Œ, μ •λ³΄ν†΅μ‹ μ„œλΉ„μŠ€μ˜ μ œκ³΅μ— κ΄€ν•œ 계약 이행 및 μ‚¬μš©μž 편의λ₯Ό μœ„ν•˜μ—¬ λ‹€μŒκ³Ό 같이 κ°œμΈμ •λ³΄ 처리 업무λ₯Ό ꡭ외에 μœ„νƒν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.

  1. μ„œλΉ„μŠ€ μ΄μš©μ— 따라 μ‚¬μš©μžμ˜ λ™μ˜λ₯Ό μ–»μ–΄ μˆ˜μ§‘ν•œ κ°œμΈμ •λ³΄, μƒμ„±λœ μ„€μΉ˜μ •λ³΄, κ°œμΈμ‹λ³„λΆˆκ°€μ •λ³΄ 및 톡계 μ •λ³΄λŠ” νŒŒμ΄μ–΄λ² μ΄μŠ€(Firebase) 수파베이슀(Supabase) 및 Amazon Web Services, Inc. 의 μ•„λ§ˆμ‘΄ μ›Ήμ„œλΉ„μŠ€(AWS)에 전솑, 처리 및 μ €μž₯λ©λ‹ˆλ‹€.
  2. 유료 μ„œλΉ„μŠ€μ— λŒ€ν•œ 결제 κΈ°λŠ₯을 μ œκ³΅ν•˜κΈ° μœ„ν•˜μ—¬ Google Play 및 Apple App Storeμ—μ„œ μ œκ³΅ν•˜λŠ” 결제 μ‹œμŠ€ν…œμ„ μ‚¬μš©ν•©λ‹ˆλ‹€.

5. κ°œμΈμ •λ³΄μ˜ 제3자 제곡

  1. νšŒμ‚¬λŠ” μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄λ₯Ό 제1μ‘°μ—μ„œ κ³ μ§€ν•œ λ²”μœ„λ‚΄μ—μ„œ μ‚¬μš©ν•˜λ©°, 동 λ²”μœ„λ₯Ό μ΄ˆκ³Όν•˜μ—¬ μ΄μš©ν•˜κ±°λ‚˜ 타인 λ˜λŠ” 타기업·기관에 μ œκ³΅ν•˜μ§€ μ•ŠμŠ΅λ‹ˆλ‹€. λ‹€λ§Œ λ‹€μŒ 각호의 κ²½μš°μ—λŠ” μ˜ˆμ™Έλ‘œ ν•©λ‹ˆλ‹€.
    1. μˆ˜μ‚¬λͺ©μ μœΌλ‘œ 관계법λ₯ μ—μ„œ μ •ν•œ μ ˆμ°¨μ™€ 방법에 따라 μˆ˜μ‚¬κΈ°κ΄€μ΄ κ°œμΈμ •λ³΄ μ œκ³΅μ„ μš”κ΅¬ν•˜λŠ” 경우
    2. ν†΅κ³„μž‘μ„±, ν•™μˆ μ—°κ΅¬λ‚˜ μ‹œμž₯쑰사 등을 μœ„ν•˜μ—¬ νŠΉμ • κ°œμΈμ„ 식별할 수 μ—†λŠ” ν˜•νƒœλ‘œ κ΄‘κ³ μ£Ό, ν˜‘λ ₯μ‚¬λ‚˜ 연ꡬ단체 등에 μ œκ³΅ν•˜λŠ” 경우
    3. 기타 관계법λ₯ μ˜ κ·œμ •μ— λ”°λ₯Έ μš”μ²­μ΄ μžˆλŠ” 경우
  2. κ·Έ 밖에 κ°œμΈμ •λ³΄μ˜ 제3자 제곡이 ν•„μš”ν•œ κ²½μš°μ—λŠ” μˆ˜μ§‘ 및 이용λͺ©μ κ³Ό ν•­λͺ©, λ³΄μœ κΈ°κ°„ 등을 κ³ μ§€ν•˜κ³  μ‚¬μš©μžμ˜ λ™μ˜λ₯Ό μ–»μ–΄ 제3μžμ—κ²Œ κ°œμΈμ •λ³΄λ₯Ό μ œκ³΅ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

6. κ°œμΈμ •λ³΄μ˜ 파기절차 및 방법

νšŒμ‚¬λŠ” μ›μΉ™μ μœΌλ‘œ κ°œμΈμ •λ³΄ μˆ˜μ§‘ 및 이용λͺ©μ μ΄ λ‹¬μ„±λœ ν›„μ—λŠ” ν•΄λ‹Ή 정보λ₯Ό 지체없이 νŒŒκΈ°ν•©λ‹ˆλ‹€. ꡬ체적인 νŒŒκΈ°μ ˆμ°¨μ™€ νŒŒκΈ°λ°©λ²•μ€ λ‹€μŒκ³Ό κ°™μŠ΅λ‹ˆλ‹€.

  1. 파기절차

    νšŒμ‚¬κ°€ μˆ˜μ§‘ν•œ κ°œμΈμ •λ³΄λŠ” μˆ˜μ§‘ λͺ©μ μ΄ λ‹¬μ„±λœ ν›„ λ³Έ μ•½κ΄€ 및 기타 κ΄€λ ¨ 법령에 μ •ν•œ κΈ°κ°„λ™μ•ˆ μ €μž₯된 ν›„ νŒŒκΈ°ν•©λ‹ˆλ‹€. 동 κ°œμΈμ •λ³΄λŠ” 법λ₯ μ— μ˜ν•œ κ²½μš°κ°€ μ•„λ‹ˆκ³ μ„œλŠ” λ™μ˜ 받은 보유 λͺ©μ  μ΄μ™Έμ˜ λ‹€λ₯Έ λͺ©μ μœΌλ‘œ μ΄μš©ν•˜μ§€ μ•ŠμŠ΅λ‹ˆλ‹€.

  2. νŒŒκΈ°λ°©λ²•

    1. 쒅이에 좜λ ₯된 κ°œμΈμ •λ³΄λŠ” λΆ„μ‡„κΈ°λ‘œ λΆ„μ‡„ν•˜κ±°λ‚˜ μ†Œκ°μ„ ν†΅ν•˜μ—¬ νŒŒκΈ°ν•©λ‹ˆλ‹€.
    2. μ „μžμ  파일 ν˜•νƒœλ‘œ μ €μž₯된 κ°œμΈμ •λ³΄λŠ” 기둝을 μž¬μƒν•  수 μ—†λŠ” 기술적 방법을 μ‚¬μš©ν•˜μ—¬ μ‚­μ œν•©λ‹ˆλ‹€.

7. μ‚¬μš©μž 및 λ²•μ •λŒ€λ¦¬μΈμ˜ ꢌ리 및 의무

  1. μ‚¬μš©μž(만 14μ„Έ 미만인 경우 λ²•μ •λŒ€λ¦¬μΈ)λŠ” μ–Έμ œλ“ μ§€ λ“±λ‘λœ μžμ‹ μ˜ κ°œμΈμ •λ³΄λ₯Ό μ—΄λžŒν•˜κ±°λ‚˜ μˆ˜μ •μ„ μš”μ²­ν•˜λŠ” μ²­κ΅¬κΆŒμ„ 가지며, μ„œλΉ„μŠ€ μ‚­μ œ λ˜λŠ” νšŒμ‚¬μ— λŒ€ν•œ 톡지λ₯Ό ν†΅ν•˜μ—¬ κ°œμΈμ •λ³΄ μ΄μš©μ— λŒ€ν•œ λ™μ˜λ₯Ό μ² νšŒν•  수 μžˆμŠ΅λ‹ˆλ‹€. 단 κ°€μž…μ‹œ μž…λ ₯ν•œ νšŒμ›μ˜ 이메일 μ£Όμ†ŒλŠ” μˆ˜μ • λΆˆκ°€ν•©λ‹ˆλ‹€.
  2. μ‚¬μš©μžλŠ” μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄λ₯Ό 슀슀둜λ₯Ό λ³΄ν˜Έν•˜κ³  νƒ€μΈμ˜ κ°œμΈμ •λ³΄λ₯Ό μΉ¨ν•΄ν•˜μ§€ μ•Šμ„ 의무λ₯Ό 가지고 μžˆμŠ΅λ‹ˆλ‹€. 이메일 λ“± κ°œμΈμ •λ³΄κ°€ μœ μΆœλ˜μ§€ μ•Šλ„λ‘ μ£Όμ˜ν•˜μ‹œκ³  νƒ€μΈμ˜ κ°œμΈμ •λ³΄λ₯Ό μΉ¨ν•΄ν•˜μ§€ μ•Šλ„λ‘ μœ μ˜ν•΄μ£Όμ‹œκΈ° λ°”λžλ‹ˆλ‹€.
  3. μ‚¬μš©μžλŠ” κ°œμΈμ •λ³΄λ₯Ό 항상 μ΅œμ‹ μ˜ μƒνƒœλ‘œ μœ μ§€ν•΄μ•Ό ν•˜λ©°, μ‚¬μš©μžκ°€ μž…λ ₯ν•œ λΆ€μ •ν™•ν•œ μ •λ³΄λ‘œ μΈν•˜μ—¬ λ°œμƒν•œ 문제의 μ±…μž„μ€ μ‚¬μš©μžκ°€ λΆ€λ‹΄ν•©λ‹ˆλ‹€.

8. ν•΄μ™Έ μ‚¬μš©μžλ₯Ό μœ„ν•œ κ°œμΈμ •λ³΄λ³΄ν˜Έ

νšŒμ‚¬μ˜ μ„œλΉ„μŠ€λŠ” λŒ€ν•œλ―Όκ΅­ 법령에 μ˜κ±°ν•΄ 제곡 및 운영되며 λ³Έ κ°œμΈμ •λ³΄μ²˜λ¦¬λ°©μΉ¨μ€ ꡭ문으둜 μž‘μ„±λœ κ°œμΈμ •λ³΄μ²˜λ¦¬λ°©μΉ¨μ„ μ •λ³ΈμœΌλ‘œ ν•©λ‹ˆλ‹€. λ³Έ 방침은 영문 및 일본어 λ“±μœΌλ‘œ λ²ˆμ—­λ˜μ–΄ 제곡될 수 있으며 ν•΄λ‹Ή λ²ˆμ—­λ³Έκ³Ό λ³Έ ν•œκ΅­μ–΄ 버전에 λ‚΄μš©μƒ μƒμΆ©λ˜λŠ” λ‚΄μš©μ΄ μžˆλŠ” 경우 ν•œκ΅­μ–΄ 버전을 μš°μ„ ν•©λ‹ˆλ‹€. νšŒμ‚¬λŠ” μ„œλΉ„μŠ€λ₯Ό μ΄μš©ν•˜λŠ” μ‚¬μš©μžμ˜ 관할지역에 μ μš©λ˜λŠ” κ°œμΈμ •λ³΄λ³΄ν˜Έ κ΄€λ ¨ κ·œμ • 및 각 κ΅­κ°€μ˜ 법λ₯ μ„ μ€€μˆ˜ν•©λ‹ˆλ‹€.

9. κ°œμΈμ •λ³΄μ˜ 기술적/관리적 보호 λŒ€μ±…

νšŒμ‚¬λŠ” μ‚¬μš©μžλ“€μ˜ κ°œμΈμ •λ³΄λ₯Ό μ²˜λ¦¬ν•˜λ©΄μ„œ κ°œμΈμ •λ³΄κ°€ λΆ„μ‹€, λ„λ‚œ, 유좜, λ³€μ‘° λ˜λŠ” ν›Όμ†λ˜μ§€ μ•Šλ„λ‘ μ•ˆμ „μ„± 확보λ₯Ό μœ„ν•˜μ—¬ λ‹€μŒκ³Ό 같은 기술적/관리적 λŒ€μ±…μ„ λ§ˆλ ¨ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.

  1. 기술적 보호쑰치

    1. νšŒμ‚¬λŠ” ν•΄ν‚Ήμ΄λ‚˜ 컴퓨터 λ°”μ΄λŸ¬μŠ€ 등에 μ˜ν•΄ μ‚¬μš©μžμ˜ κ°œμΈμ •λ³΄κ°€ μœ μΆœλ˜κ±°λ‚˜ ν›Όμ†λ˜λŠ” 것을 막기 μœ„ν•΄ μ•”ν˜Έν™” 톡신 등을 ν†΅ν•˜μ—¬ λ„€νŠΈμ›Œν¬μƒμ—μ„œ κ°œμΈμ •λ³΄λ₯Ό μ•ˆμ „ν•˜κ²Œ 전솑할 수 μžˆλ„λ‘ ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.
    2. 방화벽을 μ΄μš©ν•˜μ—¬ μ™ΈλΆ€λ‘œλΆ€ν„°μ˜ 무단 접근을 λ°©μ§€ν•˜κ³  있으며, 기타 μ‹œμŠ€ν…œμ μœΌλ‘œ λ³΄μ•ˆμ„±μ„ ν™•λ³΄ν•˜κΈ° μœ„ν•œ κ°€λŠ₯ν•œ λͺ¨λ“  기술적 μž₯치λ₯Ό κ°–μΆ”λ € λ…Έλ ₯ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.
    3. νšŒμ‚¬λŠ” νšŒμ›κ°€μž…μ‹œ μˆ˜μ§‘ν•œ νšŒμ›μ˜ 정보λ₯Ό AWS, Firebase 및 Supabase의 λ°μ΄ν„°λ² μ΄μŠ€μ— μ΄μ€‘μœΌλ‘œ λ³΄κ΄€ν•©λ‹ˆλ‹€.
  2. 관리적 보호쑰치

    1. νšŒμ‚¬μ˜ κ°œμΈμ •λ³΄κ΄€λ ¨ 처리 직원은 λ‹΄λ‹Ήμžμ— ν•œμ •μ‹œν‚€κ³  있고 λ‹΄λ‹Ήμžμ— λŒ€ν•œ μˆ˜μ‹œ κ΅μœ‘μ„ ν†΅ν•˜μ—¬ κ°œμΈμ •λ³΄μ²˜λ¦¬λ°©μΉ¨μ˜ μ€€μˆ˜λ₯Ό 항상 κ°•μ‘°ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.
    2. 사내 κ°œμΈμ •λ³΄ λ³΄ν˜Έμ „λ‹΄κΈ°κ΅¬λ₯Ό ν†΅ν•˜μ—¬ κ°œμΈμ •λ³΄ 보호방침의 이행사항 및 λ‹΄λ‹Ήμžμ˜ μ€€μˆ˜ μ—¬λΆ€λ₯Ό ν™•μΈν•˜μ—¬ λ¬Έμ œκ°€ 발견될 경우 μ¦‰μ‹œ μˆ˜μ •ν•˜κ³  λ°”λ‘œμž‘μ„ 수 μžˆλ„λ‘ λ…Έλ ₯ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€.
    3. νšŒμ‚¬λŠ” νšŒμ‚¬μ˜ κ·€μ±…μ‚¬μœ  없이 λ°œμƒν•˜λŠ” μ‚¬μš©μž 개인의 μ‹€μˆ˜ 및 제3자둜 인해 λ°œμƒν•˜λŠ” κ°œμΈμ •λ³΄κ΄€λ ¨ λ¬Έμ œμ— λŒ€ν•΄μ„œλŠ” μ±…μž„μ„ 지지 μ•ŠμŠ΅λ‹ˆλ‹€.
  3. κ°œμΈμ •λ³΄ λ³΄ν˜Έμ±…μž„μž

    νšŒμ‚¬λŠ” 개인 정보λ₯Ό μ•ˆμ „ν•˜κ²Œ μ΄μš©ν•˜μ—¬ μ΅œμƒμ˜ μ„œλΉ„μŠ€λ₯Ό μ œκ³΅ν•˜κΈ° μœ„ν•˜μ—¬ μ΅œμ„ μ„ λ‹€ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€. κ·ΈλŸ¬λ‚˜ 기술적인 λ³΄μ™„μ‘°μΉ˜λ₯Ό ν–ˆμŒμ—λ„ λΆˆκ΅¬ν•˜κ³ , ν•΄ν‚Ή λ“± 기본적인 λ„€νŠΈμ›Œν¬μƒμ˜ μœ„ν—˜μ„±μ— μ˜ν•΄ λ°œμƒν•˜λŠ” 예기치 λͺ»ν•œ μ‚¬κ³ λ‘œ μΈν•œ μ •λ³΄μ˜ 훼손 및 μ‚¬μš©μž 및 제3μžκ°€ μž‘μ„±ν•œ κ²Œμ‹œλ¬Όμ— μ˜ν•œ 각쒅 λΆ„μŸμ— κ΄€ν•΄μ„œλŠ” 일체 μ±…μž„μ„ 지지 μ•ŠμŠ΅λ‹ˆλ‹€.

    κ°œμΈμ •λ³΄ λ³΄ν˜Έμ±…μž„μžλŠ” λ‹€μŒκ³Ό κ°™μœΌλ©°, κ°œμΈμ •λ³΄ κ΄€λ ¨ λ¬Έμ˜μ‚¬ν•­μ— μ‹ μ†ν•˜κ³  μ„±μ‹€ν•˜κ²Œ λ‹΅λ³€ν•΄λ“œλ¦¬κ³  μžˆμŠ΅λ‹ˆλ‹€.

    κ°œμΈμ •λ³΄λ³΄ν˜Έμ±…μž„μž

    | 이름 | ν™©μ„±ν˜„ | | --------- | --------------------- | | μ†Œμ†/μ§μœ„ | ν”„λ¦¬λ©”λ‘œ/CEO | | 이메일 | busking@fleek.fitness | | μ „ν™” | +82 10-2400-2122 |

기타 κ°œμΈμ •λ³΄μΉ¨ν•΄μ— λŒ€ν•œ μ‹ κ³ λ‚˜ 상담이 ν•„μš”ν•˜μ‹  κ²½μš°μ—λŠ” μ•„λž˜ 기관에 λ¬Έμ˜ν•˜μ‹œκΈ° λ°”λžλ‹ˆλ‹€.

End of Document


Fleek's Privacy Policy

Privacy Policy

Primero (the "Company") attaches great importance to the privacy of its users while providing Fleek (the "Service"), and has established a privacy policy (the "Policy") to comply with relevant laws and regulations such as the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Personal Information Protection Act.

The Company's Privacy Policy may be revised due to changes in relevant laws and guidelines or changes in the Company's internal operating policies. Any changes to this Policy will be posted on the homepage. If you have any questions about this policy, you can provide your opinion through the customer inquiry channel on the service homepage and the company homepage.

1. Personal Information Collection Items and Purpose of Use

  1. The Company collects only the minimum amount of personal information as follows to provide the service.

User ID and email

  1. The Company collects User ID for the purpose of user analysis and service improvement. User ID is an anonymous ID used to distinguish each service user, and cannot be used for personal identification purposes.
  2. In the process of receiving inquiries from users for the purpose of service consultation to provide better services, the Company collects minimal personal information such as email address or phone number to identify and reply to customer inquiries. In addition, customers may send error data arising from the use of the Service to the Company for more accurate error diagnosis. This is not mandatory, and the Company will not use such personal information for any purpose other than those specified below.

Location

  1. When you use the Service, the Company requires approximate location and precise location permission to record the location of your use of the Service. Location information can only be used for the specificity of the record.
  2. You can use the service even if you do not provide the permission.

Purchase History

  1. In order to provide subscription services through in-app purchases, the Company collects purchase information data of users.
  2. You can use the service without providing permission.

Health Data

  1. We need access to health data to record your service usage history on your mobile device. Health data is only used to provide personalized services and for recording.
  2. You can use the Services even if you do not provide permission.

Photos

  1. we need access to your device photo library to upload content to the Service.
  2. You can use the Service without providing permission.

Other

  1. In addition, the Company may collect automatically generated information such as service usage history, OS type and version, access logs, advertising identification information, and terminal information in the course of the user's use of the Service or business processing, and the Company may use such information for user analysis and service improvement purposes.

2. Methods of collecting personal information

The Company collects personal information specified in Article 1 of this policy in the following ways to provide smooth service.

3. Period of retention and use of personal information

  1. In principle, the Company destroys the user's personal information without delay when the purpose of collecting and using personal information is achieved. However, in accordance with the Company's internal policy, the Company retains personal information for one year from the date of termination of the use contract in order to prevent abuse of rights, prevent abuse, and prepare for various disputes and requests for investigation cooperation if the member withdraws or the Company terminates the use contract with the member.
  2. Notwithstanding Paragraph 1, if it is necessary to preserve the information in accordance with relevant laws such as the γ€ŒCommunication Secrets Protection Act」, it shall be preserved for that period. In this case, the Company shall only use the retained information for the purpose of retention.
  3. The history of personal information processed to comply with obligations stipulated by other laws may be retained for a period of time to prove its responsibility.

4. Outsourcing and Transfer of Personal Information

In order to improve the service, the Company entrusts and processes members' personal information to an external party after obtaining the user's consent or disclosing or notifying related matters in accordance with relevant laws and regulations. The Company concludes consignment contracts based on documents containing the contents of Article 26, Paragraph 1, Item 1 of the Personal Information Protection Act and supervises whether the trustee processes personal information safely. Currently, the consignees of your personal information and the contents of their work are as follows.

Fleek does not provide personal information to other businesses outside of Korea. However, for the purpose of fulfilling the contract for the provision of information and communication services and for the convenience of users, Fleek outsources the processing of personal information as follows.

  1. Personal information, generated installation information, non-personally identifiable information, and statistical information collected with the consent of the user in accordance with the use of the service are transmitted, processed, and stored in Firebase, Supabase, and Amazon Web Services (AWS) of Amazon Web Services, Inc.
  2. To provide payment features for paid services, we use payment systems provided by Google Play and Apple App Store.

5. Provision of Personal Information to Third Parties

  1. The Company uses the user's personal information within the scope notified in Article 1, and does not use it beyond the scope or provide it to other companies or organizations, except in the following cases.
    1. When an investigative agency requires the provision of personal information in accordance with the procedures and methods prescribed by relevant laws for the purpose of investigation.
    2. when provided to advertisers, partners, or research organizations in a form that does not identify specific individuals for statistical compilation, academic research, or market research.
    3. When requested in accordance with the provisions of other related laws.
  2. If it is necessary to provide personal information to a third party, we may provide personal information to a third party with the consent of the user after notifying the purpose of collection and use, items, and retention period.

6. Procedures and methods for destroying personal information

In principle, the company destroys the information without delay after the purpose of collecting and using personal information is achieved. The specific destruction procedures and methods are as follows.

  1. destruction procedure

    Personal information collected by the Company shall be stored for the period stipulated in this Agreement and other relevant laws and regulations after the purpose of collection is achieved, and then destroyed. The personal information shall not be used for any purpose other than the consented purpose of retention unless required by law.

  2. destruction method

    1. Personal information printed on paper shall be destroyed by shredding or incineration.
    2. Personal information stored in the form of electronic files will be deleted using a technical method that makes it impossible to reproduce the records.

7. Rights and Obligations of Users and Legal Representatives

  1. Users (or their legal representatives if they are under the age of 14) have the right to view or request modification of their registered personal information at any time, and may withdraw their consent to the use of personal information by deleting the service or notifying the Company. However, the member's email address entered at the time of registration cannot be modified.
  2. Users are obligated to protect their own personal information and not to infringe on the personal information of others. Please be careful not to leak personal information such as emails, and be careful not to infringe on the personal information of others.
  3. You must keep your personal information up to date at all times, and you are responsible for any problems caused by inaccurate information entered by you.

8. Personal Information Protection for Overseas Users

The Company's Services are provided and operated in accordance with the laws and regulations of the Republic of Korea, and this Privacy Policy is an authentic version of the Privacy Policy written in Korean. This Policy may be translated into English and Japanese, etc., and if there is any conflict between such translation and this Korean version, the Korean version shall prevail. The Company complies with the privacy-related regulations and laws of each country applicable to the jurisdiction of the user using the Service.

9. Technical and administrative protection measures for personal information

The Company takes the following technical and administrative measures to ensure the safety of personal information while processing users' personal information so that it is not lost, stolen, leaked, altered or damaged.

  1. Technical protection measures

    1. In order to prevent users' personal information from being leaked or damaged by hacking or computer viruses, the Company ensures that personal information can be transmitted safely on the network through encrypted communication, etc.
    2. The Company prevents unauthorized access from the outside by using a firewall and strives to have all possible technical devices to ensure systematic security.
    3. The Company redundantly stores members' information collected at the time of membership in databases of AWS, Firebase, and Supabase.
  2. Administrative Safeguards

    1. The Company's personal information processing staff is limited to the person in charge, and the Company always emphasizes compliance with the Privacy Policy through frequent training for the person in charge.
    2. The Company checks the implementation of the Privacy Policy and the compliance of the person in charge through the in-house personal information protection organization, and makes efforts to immediately correct and correct any problems found.
    3. The Company is not responsible for any personal information-related problems caused by users' individual mistakes and third parties that occur without any reason attributable to the Company.
  3. Personal Information Protection Officer

    The Company is doing its best to provide the best service by using personal information safely. However, despite technical complementary measures, the Company is not responsible for any damage to information due to unexpected accidents caused by basic network risks such as hacking, and various disputes caused by posts made by users and third parties.

    The person in charge of personal information protection is as follows, and we will respond promptly and sincerely to inquiries related to personal information.

End of Document