Privacy Policy

Purpose of Processing Personal Information

The purpose of processing personal information (hereinafter referred to as “this site,” located at http://www.neonomadj.com) is to process personal information for the following purposes and will not be used for any other purposes:

Outsourcing of Personal Information Processing

  1. This site entrusts personal information processing tasks as follows to facilitate smooth personal information management.
  2. When entering into outsourcing contracts, this site specifies matters related to personal information protection, including the prohibition of personal information processing for purposes other than the performance of outsourcing tasks, technical and administrative protection measures, restrictions on re-outsourcing, management and supervision of subcontractors, and compensation for damages, in documents in accordance with Article 25 of the Personal Information Protection Act.
  3. In the event of changes in the content of outsourcing tasks or subcontractors, we will promptly disclose them through this Privacy Policy.

Rights and Obligations of Data Subjects and Methods of Exercising Them

Users can exercise the following rights related to personal information protection at any time with regard to http://www.neonomadj.com:

Items of Personal Information Being Processed

This site processes the following personal information items: 1<Representative>

Disposal of Personal Information

In principle, when the purpose of processing personal information is achieved, we promptly dispose of the relevant personal information. The disposal process, deadline, and method are as follows:

Measures to Ensure the Security of Personal Information

This site takes the following technical, administrative, and physical measures necessary to ensure the security of personal information in accordance with Article 29 of the Personal Information Protection Act:

  1. Encryption of Personal Information: User passwords are encrypted for storage and management, ensuring that only the user knows them. Important data is also protected by using separate security features such as encrypting files and transmission data or using file locking functions.
  2. Technical Measures against Hacking: This site installs security programs, regularly updates and checks them to prevent leakage and damage of personal information caused by hacking, computer viruses, etc. Systems are installed in areas where access from outside is controlled and monitored and blocked technically and physically.
  3. Access Restrictions on Personal Information: Access to the database system processing personal information is controlled by granting, changing, and revoking access rights to ensure access control to personal information. Intrusion prevention systems are used to control unauthorized access from external sources.

Personal Information Protection Manager

This site is responsible for overall personal information processing and has designated a personal information protection manager to handle complaints and remedies related to personal information processing.

Changes to the Privacy Policy

This privacy policy is effective from the date of enforcement. In the event of additional, deletion, or modification of content in accordance with laws and policies, we will notify the changes through notices at least 7 days before the changes take effect.