Prevent the worst, through precise diagnosis!Wearable atrial fibrillation diagnostic device "CART" can be used to monitor atrial fibrillation.Sky Labs (B2G '17-'18) has created an innovative ring-type Cardio Tracker that can manage their heart health status anytime, anywhere!Check this video and l .... Read more
Agriculture Is Getting Smarter - HanaroFarm
Agriculture is getting smarter!
Hanaro Farm (B2G '18) created an innovative smart farming system incorporating latest technologies of AI, IoT, and Cloud.
"B2G Tech News" presents exclusive video of Hanaro Farm, how they design the future of ag .... Read more
Enjoy wild and vivid experience with VR/AR content!
We introduce the REALGAM GAUNTLET (B2G '18) that allows user to feel and experience each moment of the virtual world through wrist wearable device combined with VR/AR robot arm. .... Read more
*Smart bike lighting, reinforce and extend your safety – LUXI.
Ordinary bike lights cannot always guarantee your safety; battery might run out, lighting not adaptable to ambient conditions etc.
Unlike, LUXI helps you enjoy riding safer and longer. By using APS (Adaptive Power Saving) techn .... Read more
Influencers Essentials — Meet Your Very Own Smart Shooter!
B2G Tech News presents a way for you to create your creative contents using Pivo!
*Pivo (B2G '16-'18) is an interactive smart pod that empowers smartphone photographers and videographers to create truly engaging yet dynamic c .... Read more
Unveiling the world's first mobile liquid hydrogen refueling station!
Hylium Industries (B2G '17-'18)'s liquefied hydrogen-based mobile hydrogen refueling station offers advantages such as safe, high storage efficiency and reduced hydrogen transportation cost compared to conventional high .... Read more
Create your song in few minutes with just simple humming!
Simple humming is all it takes for you to be a composer and make music in any genre.
It won't take long for your melody to be transformed into a beautiful music by 험온 - HumOn (B2G '17).
Would you like to be the next biggest compose .... Read more
A large and complex 3D VR cam is updated into a small and user-friendly action cam - The Twoeyes VR
What is the secret of TwoEyes Tech, Inc. to be named a CES 2018 Innovation Awards Honoree? B2G Tech News unveils the “TwoEyes VR”, its two pairs of lenses which can mimick two eyes of a hu .... Read more
Meet the SMARTGOLF Putter (B2G '17) an all-in-one solution to get help with your score and have more fun on the golf course!
For the creation of perfect horizontal movement and a stable swing, the built-in LED level indicators on the head of the equipment light up instantly according to .... Read more
A revolutionary 3D display - MOPIC
How to make your smartphone screen 3D without any special glasses or devices?
Snap 3D can turn your smartphone into a 3D screen!
Experience the wonder of MOPIC's highly advanced patented 3D technology through B2G Tech News!
*A revolutiona .... Read more
"Tech + Art + Play" all at once!
Meet the "Play House" where you can create your own unique artistic toys using 3D printing!
This week, B2G Tech News puts a spotlight on SEMS GAMES. SEMS GAMES - 셈스게임즈 (B2G '17) is transforming the way in which toys are provided through the Play House. .... Read more
B2G Hosting Korea Tech Festival
3rd Edition, Sep 28, 2017 – Startup Campus
“The Era of 4th Industrial Revolution – AI for ALL”
It is our pleasure to invite you to the 3rd edition of the K-Global Connect Pangyo Festival 2017, one of Korea’s leading technology festivals. This is a great .... Read more
Changing the way people pay! - Hankook NFC
Take a look on how a payment is done with just a simple gesture of putting two phones back to back!
B2G’s fin-tech member startup Hankook NFC 한국NFC (B2G '16-'17) is
the creator of the Phone2Phone (P2P) Simple Payment System.
By u .... Read more
Have You Ever Wished for a Cute Robot? - IPL's "iJini"
IPL's "IJini" social robot is created through a combination of robotics technology, IoT and speech recognition.
IPL (B2G '16-'17) is confidently moving forward with its innovative social robots to make you feel at home
wit .... Read more
More than meets the eyes, transforming action cam : PITTA Drone.
Take a look on how this works!
More than meets the eyes.
4K(30fps), live streaming, 13M Still images, time-lapse, panorama and more.
The PITTA transform drone.
Basic drone function with additional "Track .... Read more
Time & space manipulation technology : 4DReplay.
Take a look on how this works!
Time & space manipulation technology : 4DReplay.
Called ‘bullet time effect’,it’s the same technology used in “The Matrix”.
Now, it has advanced to be able to viewa single moment from various a .... Read more
From Your Finger to Your Heart
─ The watch strap “Sgnl” makes it easy for you to receive calls using just your fingers.
Take a look on how its done! https://goo.gl/uBAvyT
*Sgnl is the world’s only smart strap.
This strap delivers sound through your body.
Sgnl has been very popular the las .... Read more
Take a sneak peek "B2G Tech" on innopresso - Mokibo !
*The world’s first touchpad embedded keyboard ‘Mokibo’. Mokibo works and feels just like a regular pantograph wireless keyboard. Once changed to touchpad mode, you can click, drag, and multi-touch. Connect up to 4 devices, such as laptops, tab .... Read more
"Monster GODJ" The New Party Host of This Generation
JD Sound, a member startup of Born2Global sells a portable DJ device "Monster GODJ" at the Amazon Japan through the partnership with bouncy STORE.
This startup has created a portable and mobile app version of its DJ device, enabling use .... Read more
[Born2Global Tech : Visual Camp, EYE TRACKING THE GAME CHANGER]
Eye Tracking the game changer.
Provides tracking information accurate to less than 1° via
mobile using only 10% of CPU processing power.
Able to extract users' intention with 75% accuracy using
AI-based tracking info .... Read more
[Born2Global Tech : 3dup'ndown, The largest online marketplace for verified 3D printing files]
There are lots of websites for downloading 3D printing files.
However, due to vast amount of unverified 3D printing files,
time and materials are often wasted.
Introducing the lar .... Read more
Provides tracking information accurate to less than 1° via
mobile using only 10% of CPU processing power.
Able to extract users' intention with 75% accuracy using
AI-based tracking information.
Can be applied to marketing strategy development
by analyzing usage patterns,
including on-line shopping and .... Read more
[K-global connect pangyo festival 2016]
From October 26th to 27th 2016,
K-Global Connect Pangyo Festival was held at Pangyo Startup Campus.
Bob McCooey, SVP of Nasdaq, was the keynote speaker.
Nadine Leclair, SVP of Renault, encouraged startups in their business expansion to over .... Read more
In accordance with the Personal Information Protection Act, K-ICT Born 2 Global Center (the “Center”) has the following policy to protect the privacy of personal information of users, to protect the rights and interests of users, and to smoothly deal with users' complaints related to personal information. When revising the personal information processing policy of this service site, the Center will number each version of the policy and announce it on the website (or through individual notices).
This policy will be effective as of November 28, 2016.
1. The processed personal information will not be used for any purposes other than the listed below. The personal information processing center handles the personal information for the following purposes:
1-1. Consent to collect personal information
The Center will establish a process by which the user can check either “Agree” or “Cancel” box to the Center’s terms of use and the privacy policy. If the user selects “Agree”, the Center will consider this as a consent to collecting personal information.
1-2. Purpose of Collection and Use of Personal Information
- The subscription/inquiry information for the service
- ID and password inquiry for registered users.
1-3. Civil Affairs Processing
The Center processes the personal information for the purpose of identifying the complaints, obtaining the contacts for investigation, and notifying the results.
1-4. Providing Goods and Services
The Center processes the personal information for the purpose of providing contents, authentication, etc.
1-5. Marketing and Advertising
The Center processes the personal information for the purpose of developing new services or products and providing personalized services, offering the sponsored contents and the opportunity to participate in the various events and sponsored contents, and identifying the access frequency and the statistics on the service usage.
1-6. The following information may be automatically generated and collected during the process of using the service or processing the business:
- IP Address, Cookies, web history, service usage and failure record.
- The following information may be collected from the users of the additional services and/or customized services and participants of promotional events.
- If the consent was given for the additional collection of personal information
2. Personal Information File Status
The purpose of processing the personal information file that is registered and disclosed by the Center in pursuant of Article 32 of the Personal Information Protection Act is as follows:
1-1. File name: K-ICT Born 2 Global Center Web Services
- Personal Information Items: Email, mobile phone number, security questions & answers, and password.
- Log-in ID
- Collection Method: Through the webpage and information collection tool
- Retention Period: 5 years
- Related Law and Regulations: Retention of the records collected, processed, and utilized: 3 years
※ To disclose the registration details of other centers’ personal information file, please utilize the search menu of the personal information file list, such as the general support portal of the Ministry of Public Administration and Security (www.privacy.go.kr).
3. Personal Information Processing and Retention Period
1-1. The Center processes and retains personal information within the hold/use period of the personal information in accordance with laws and regulations, or the period agreed upon when collecting personal information from the subject.
1-2. The processing and retention period of each personal information is as follows:
*Reason for information holding by internal policy
- Fraud history
Reason for retention: Prevention of fraud
Retention Period: Until the completion of business
*Reason for information holding by laws and regulations
When it is necessary to preserve the information in accordance with relevant laws and regulations, such as the Promotion of Information and Communication Network Utilization and Information Protection, etc., the Center will keep the member's information for a certain period determined by the relevant laws and regulations. In this case, the Center will only use the information for the purpose that it is kept for, and the period of preservation is as follows:
-Record of identity verification
-Reason for preservation: Information Network Promotion and Information Protection Act
-Retention Period: 1 year
4. Third Party Provision of Personal Information
1-1. The Center till only provide the personal information to the other third parties if they comply with Articles 17 and 18 of the Personal Information Protection Act, including the consent of the subject and special exceptions of the law.
1-2. The Center provides the personal information to the third parties as follows:
Details of Personal Information Provided to Third Parties
- Recipients of the personal information: Future Creation Science Department, Youth Entrepreneurship Foundation, Korea IT Industry Promotion Agency, and other government agencies and public institutions.
- Purpose of the usage of the third parties: Utilize to support related projects and policy data
- Retention Period for the third parties: The collected information is used for obtaining and confirming the information necessary for the project and kept for 3 years after the completion of business
5. Personal Information Processing Consignment
1-1. The Center handles the following personal information processing tasks for a smooth personal information processing.
- Details of Personal Information Processing
o Fiduciary: JIT Korea
o Details of Work: Identification of new service and product development and customized service based on the membership service
o Period of Consignment: Completion of business
1-2. At the conclusion of the contract, the Center shall, in accordance with Article 25 of the Personal Information Protection Act, document the matters such as prohibition of personal information processing other than the purpose of carrying out the entrusted business, technical and managerial protection measures, restriction of re-entrustment, management and supervision of the trustee, And supervise whether the trustee handles personal information securely.
1-3. If the contents of the consignment service or the consignee change, we will disclose it through the personal information processing policy without delay.
6. Link Site
The Center may provide you with links to other centers’ websites. In this case, the Center has no control over the external sites and materials, so the Center caanot be responsible for and cannot guarantee the usefulness of the services provided. Please review the policy of the new site if accessing other website through the links provided by the Center since the privacy policy of the site is not related to the Center.
7. Posting
1-1. The Center values your posts and does its best not to later, tamper, or delete the posts except for the following cases:
- Spamming posts (e.g., lucky letters, 800 million emails, specific site ads, etc.)
- Posts containing false facts that may defame others
- Posts containing invasion of privacy without the consent, violating the Center’s and other’s copyright, etc.
- In order to maintain the desirable bulletin board culture, the Center can delete or modify certain parts of the post.
- The Center categorizes the posts by its topic for easier understanding.
- In other cases, action can be taken after an explicit warning.
1-2. Fundamentally, all rights and responsibilities related to the post are reserved for the author. In addition please inform that voluntarily disclosed information in post is difficult to be protected.
8. The subject can exercise the following rights:
1-1. The subject may exercise the following rights of privacy at any time with respect to the Center.
- Personal information request
- Request correction of an error
- Deletion request
- Request to suspend the processing
1-2. The exercise of the rights under Paragraph 1 may be done through written document, e-mail, fax, etc. in accordance with the Form 8 of the Enforcement Regulations of the Personal Information Protection Act.
1-3. In the event where the subject requires correction or deletion of personal information, the Center will not use or provide the information until the correction or deletion is completed.
1-4. The exercise of rights under Section 8-1 may be done through a legal representative of the subject or an agent. In this case a power of attorney should be submitted according to Form 11 of the Enforcement Regulations of the Personal Information Protection Act.
9. Personal Information Items to Process
1-1. The Center collects the following personal information when registering for the membership to facilitate the customer consultation and other services as well.
<Korean National Register: Phone number>
- Required Items: Name, date of birth, gender, ID, password, e-mail address/mobile phone number. Information of a legal representative and registration certificate required for anyone under the age of 14.
<Corporate/Group Registration>
- Required Items: Group ID, company name, name/phone number/email of the representative, group address, administrator ID, manager contact, and position
- Optional Items: Website and fax number of representative
<Foreigner Registration>
- Required Items: Name, ID, password, security questions, nationality, gender, date of birth, e-mail address, sign-up credentials
- Optional Items: Mobile phone number
We do not collect any sensitive personal information, such as race, ethnicity, ideology, creed, hometown, political tendencies, criminal records, health information, and sex preference, which may be of concern to the user’s basic human rights.
10. The Center will destroy personal information without delay when the purpose of processing personal information is achieved. The procedures, deadlines, and methods of destruction are as follows:
1-1. The information entered by the user is transferred to a separate DB after the completion of the purpose (separate documents in the case of paper) and is stored or destroyed for a certain period of time according to internal policies and other related laws. At this time, the personal information transferred to DB will not be used for other purposes unless it is under the law.
1-2. When the retention period of personal information has elapsed, the information destroyed within 5 days from the end of the retention period. In the event that personal information becomes unnecessary, such as the fulfillment of purpose of processing of personal information, the abolition of service, or termination of business, we will destroy the personal information within 5 days from the day when processing of personal information is recognized as unnecessary.
1-3. Destruction Method
For electronic files, we use a technical method that prevents the reproduction of records. Paper files are either shredded or incinerated.
11. In accordance with Article 29 of the Personal Information Protection Act, the Personal Information Safety Insurance Center carries out the following technical, administrative and physical measures to ensure safety.
1-1. Periodic Self-Audits
We conduct our own audits quarterly to ensure the safety of handling personal information.
1-2. Limiting the number of personnel handling the personal information and proper training
We minimize the number of employees handing the personal information.
1-3. Establishing and implementing an internal management plan
We have established and implemented an internal management plan for the safe handling of personal information.
1-4. Technical measures against hacking
The Center installs security programs to prevent leakage and damage of personal information caused by hacking or computer viruses. Also, we periodically update and check the system, install the system in a restricted area, and technically and physically monitor and block them.
1-5. Encryption of personal information
User's personal information is encrypted, stored, and managed. Only the user can have access to it, and the important data may use a separate security function such as encrypting transmission data or using a file lock function.
1-6. Restrict access to personal information
We take necessary measures to control the access to personal information through granting, modifying, and deleting access rights to the database system that handles personal information. We also control unauthorized access from outside using an intrusion prevention system.
1-7. Lock system for document security
We keep documents with personal information and auxiliary storage media in safe place with locks.
12. Personal Information Protection Officers
1-1. The Center is responsible for the handling of personal information, and has designated a person responsible for the protection of personal information for the complaint handling and damage relief of the subject for the matters regarding personal information processing.
- Personal Information Protection Officer
Name: Tae Wook Kim
Responsibilities: General operation management
Position: Manager
Contact:
- You will be connected to the privacy department.
- Privacy Department
Department Name: Global talent discovery and development team
Manager: Won Hee Hwang
Contact:
1-2. You may contact the person in charge of personal information protection for any personal information protection related complaints and damages remedies. The Center will respond to inquiries without delay.
13. Request to view personal information
1-1. You can request the viewing of personal information in pursuant to Article 35 of the Personal Information Protection Act to the following department. The Center will promptly process the requests for personal information on time.
- Personal information request and processing department
- Privacy Department
Department Name: Global talent discovery and development team
Manager: Won Hee Hwang
Contact:
1-2. You may also request personal information access through the website of the Ministry of Public Administration and Security's "Comprehensive Support for Personal Information Protection" website (www.privacy.go.kr).
▶ Ministry of Public Administration and Security General Support Portal for Personal Information Protection → Personal Information Civilization → Request for Personal Information Request (I-PIN is required for identification)
14. Change of personal information processing policy
1-1. This personal information processing policy will be effective from the listed effective date. If there are additions, deletions, and corrections of the changes according to laws and policies, we will notify them through announcements 7 days before the change.
This service clause is to regulate basic contents like responsibilities, rights, duties, conditions in using the internet website born2global.or.kr (“Service”) provided by Korea ICT Promotion center (“Center”).
Article2 (Validity and alteration)
① This clause is valid to every member who wishes to use the service.
② Contents in this clause are published to the members by presenting them in the service screen or other methods, and when the member who agrees to them signs up for the service, they are valid.
③ The center may alter the clause in a range that does not damage the relevant laws like laws on clause limitations, Telecommunications Business Act, and Telecommunications Framework Act on Promotion of Information and Communications Network Utilization and Information Protection Act. And publish the alteration immediately in the same method with item2. However, alteration of important regulations on the responsibility or duty of the user should be published at least 7 days before the change.
④ When the member does not agree to the altered clause, the member may suspend the usage of service and cancel the contract.
⑤ When the center notified or noticed the revised clause by item3, and the member did not express the intention of refusal clearly, it is considered to be an agreement to the altered clause.
Article3 (Rules other than clause)
For the contents not included in this agreement, follows the relevant laws like The Telecommunications Framework Act, Telecommunications Business Act or detailed usage guide decided by the center..
Article4 (Definition of terms)
① The definition of terms used in this agreement are as below.
1. Member: Customer who accessed the site and agreed to the clause, and received ID and password, and the qualification and authority are separately managed.
2. User: Person using the service who is not a member.
3. ID (serial number): Combination of English letters and numbers selected by the member and approved by the center for member identification and service usage, only one ID per date of birth can be provided and used.
3. E-mail: Member’s own electronic mail address
4. PASSWORD: Combination of English letters and numbers selected by the member for the protection of member information
5. Operator: A person selected by the center for overall management and smooth operation of the service
6. Suspension of service: During normal use, suspending the provision of service according to certain conditions decided by the center.
2 Definition of terms used in this clause follow the regulations in relevant laws except for the ones regulated in article1, and ones not regulated in relevant laws follow general commercial practice. Chapter2 Service usage contract
Article5 (Formation of usage contract)
① When the member clicks “agree” button to the question "Do you agree with the clause?” it is considered agreed.
② Usage contract is formed by the approval of the center to the application of the member.
Article6 (Usage application)
Usage application is performed by the members writing the items below in the user registration screen of the service.
1. Name
2. E-mail
3. Password
4. Phone
5. Other items decided necessary by the center
Article7 (Approval of the usage application)
The center approves the service usage application to the member who applied by writing down the items in article6.
Article8 (Limitation of the approval)
① The center may disapprove the applications below.
1. When it is technically impossible to provide service.
2. When the name is not real, or in case of false entry using other people’s name
3. Omission or misentry in the user registration contents
4. When the application is damaging or to damage the order of society or good and laudable custom
5. When the customer has lost the membership qualification due to his or her own imputation. However, when it has been more than 6 months from the lost, and when the member has received approval, it is exempted.
6. When other usage application requirements decided by the center are not fulfilled.
7. When a child under the age of 14 failed to get an agreement of the legal representative when agreeing to the private information collection and provision according to the information communications network act
Article9 (Change in contract)
1. When there is a change in the written contents in the application, the member should modify it according to the separate usage method decided by the center. The center is not responsible of the damage to the member caused by the delay of modification.
2. The center may collect and use the membership or other information required to the member by changing it like adding, deleting according to the relevant law or the center’s Privacy Statement. Chapter3 Use of service
Article10 (Commence of service)
① The center commences the service from the time the usage application of a member is approved. However, for some service, the service is commenced from a designated date.
② When it is unable to commence the service because of the disability of duty or technology of the center, notify the member or present on site.
Article11 (Using time of the service)
① The use of service is open Throughout the Year, 24 hours a day in principle. However, the service might be paused because of duty or technology problem of the center, also, in the time decided by the center for operational reason, the service can be paused. In this case, the center will notice it in advance or afterwards.
② The center may divide the service into certain ranges and decided the usage time for each part individually, and notice this in this case.
Article12 (Change or suspension of service)
① The center may notify the changed contents and the date to the members according to the method in article21 item2, and change the provided service. Also, when service provision is unavailable due to ID overlap, the center may set a certain period to require the member to change the ID which is not overlapped. And the center may change the IC collectively in a way that does not change the essential part of the ID because of site integration, change in main policy of the center. In this case, the center may notify the member about the change.
② The center may limit or suspend the service partially or totally in the cases below.
1. When it is necessary due to constructions like repair of service facility.
2. When the member is disturbing the operation of the service
3. When there is a problem in normal use of service due to blackout, facility troubles, flood of access and other reasons.
4. When it is impossible to maintain the service due to situations in the center like termination of contract with the service provider.
5. Force majeure like natural disaster, national emergency.
③ The center may limit the provision of certain services to member of age below 14, member protected by Juvenile Protection Act, member of age below 20, foreign member, corporative member.
③ In case of service suspension according to article2, the center notifies the member in the method regulated in article 21 item 2. However, in case of service suspension which is impossible to notify in advance because of reasons that cannot be controlled by the center(Disk disability without imputation or intention of the operator, system down), this is not applied.
④ The center is not responsible of problems occurring from the suspension, change of service.
Article 13 (Responsibility and duty of members about e-mail)
① The center may provide e-mail service to the member.
② The center does not edit or observe the contents of the member’s e-mail, and each member is responsible for 속 contents in the mail.
③ The member should not send Junk Mail, Spam Mail, chain letters or recommend Pyramid organization, damage other people, or send mails to harm good and laudable custom by the center’s e-mail.
④ The responsibility occurring from violation of item2 is on the member, and in this case, the center may provide the member’s ID, E-mail, PASSWORD to investigative agency.
Article 14 (Provision of information and posting of advertisement)
① The center may post information on the service screen or provide information to the members by e-mail or mail when operating the service.
② The center may post the member’s company information provided by the member (Including the information provided by the member like investment attraction information of the company) on the service screen by the agreement of the member. The center is not responsible of the reliability, accuracy or other contents of the posted information, data, and facts.
③ The center may post advertisements on the homepage, service screen, SMS, e-mail in operating the service, and the member agrees to the advertisement posting when using the service.
④ Member’s usage of the advertisement posted on the service, or participation in the promotion of the advertiser by the service is a problem between the member and the advertiser. If there is a trouble between them, the member and the advertisement should settle the trouble by themselves, and the center is not responsible for that.
Article 15 (Deletion of post or contents)
① The center may delete all contents in the service posted or delivered by members(Include delivery between members) without notice in advance in cases of below, and the center is not responsible.
1. Slandering the center, other members, or a third party, or contents to damage one’s honor by mudslinging
2. When it is a distribution of information, sentence; figure which may harm the public order or good and laudable custom
3. When the contents are admitted that it is relevant to crime.
4. When the contents are invading the copyrights of the center or the third party.
5. When it exceeded the period of posting decided by the center in detailed usage guide in article2.
6. When the contents are not related to the service provided by the center
7. Postings of advertisement, promotion materials which are unnecessary or disapproved.
8. When the contents are posted by stealing other people’s ID, E-mail, name, or the contents are a forgery and alteration of information written by other people.
9. When it does not match the posting’s objective like many postings of same contents
10. When it is judged to be violating other relevant laws or center regulation
② The center may decide detailed usage guide about the postings to proceed it, and the member should follow the regulations to post and delete the postings(Include delivery between members)
Aticle16 (Copyrights of the postings)
① The copyrights of the postings made by the member (Include delivery between members) belong to the member, and the center has the right to post them.
② The center may not use the postings in other purpose without the agreement of the member. However, in case of merger, transfer of a business, integration of sites operated by the center, the center may change the location of the postings without changing the contents.
③ The center does not have civil and criminal liability when the postings of the member in the service invade other people’s copyrights, program copyrights. If the center received proposal order like claiming damages from other people because the member invaded other people’s copyrights, program copyrights, the member should make efforts for the exemption of the center, and when the center is not exempted, the member is responsible for all damages to the center caused by the situation.
④ The center may delete the postings of the member when the member canceled the service or is canceled by legal reasons
⑤ Copyrights of the postings made by the center belong to the center.
⑥ The member cannot use the data posted in the service in profit making purpose like processing, selling the information obtained through the service or make a third party use the information, and the invasion of the postings copyrights will be regulated by relevant laws.
Chapter 4 Duties of contract parties
Article 17 (Duty of the center)
① The center dose not leak or distribute the personal information of the member learned by operation of the service. However, when required by investigation agency for investigation by relevant laws, or when there is a request from Korea Internet Safety Commission, the regulation is exempted..
② In the range of item 1, the center may make and use statistical data on partial or total personal information of the member without agreement in advance relevant to the operation, and may send cookies to the member’s computer for this. In this case, the member may refuse to receive to cookies or change the settings of the computer browser used to warn about the receipt of cookies, and the member is responsible of the service change due to cookies setting change.
③ When complaints of the members about the service, the center should treat the complaints rapidly, and when rapid treatment is not possible, the center should post the reason and treatment schedule on the screen or notify the member by methods like e-mail.
4 When there is no specific regulation in the relevant law about the service usage provided by the center, the center is not responsible.
④ The center observes the laws related to operation and maintenance of service like Promotion of Information and Communications Network Utilization and Information Security Act, Telecommunications Business Act, the Communication Secrets Protection Act.
⑤ When loss of mobile of the member is received by the center, the center sends the contents about the mobile by the member’s e-mail immediately.
Article18 (Duty of member)
① The member should not perform the deed below when using the service.
1. False entry of usage application or modification, or stealing, illegally using the ID and password of other members
2. Copying, distributing, commercially using the information obtained by the service information of the center
3. Defamation or damage to other people
4. Posting obscene materials on the board or linking pornographic sites
5. Invasion of rights like copyrights of the center or the third party.
6. Distributing information, sentence, figure, voice and others which may harm public order or good and laudable custom to people
7. Registering or distributing data infected by computer virus which causes malfunctioning of the facility or destruction of information relevant to service
8. Disturbing the operation of the service intentionally, sending information that may disrupt stable operation of service or advertisement opposed to clear refusal of receiver.
9. Disguising as other people or stating the relationship with other people in false
10. Collecting, saving, opening other member’s personal information
11. Distributing false information to gain profit to themselves or other people, or to damage other people
12. Gambling with assets or act of speculation
13. Assisting act of prostitution or distributing information to mediate obscene act
14. Delivering words, voice, writings, video, or images that cause embarrassment or hate, fear continuously to other people to disturb their normal life.
15. Changing information posted on service
16. Sending or posting the information which is banned to post or send by relevant laws (Including computer program)
17. Disguising or pretending to be the employee or operator of the center, or stealing other people’s name to post articles or to send e-mail.
18. Posting or sending by e-mail a data including software virus, other computer codes, file, program that is designed to disturb and damage the normal operation of computer software, hardware, electronic communication device
19. Troubling other members like stalking
20. Other illegal or unfair cautions
① The member should observe the relevant laws, regulation in this clause, cautions noticed in the service, usage guide, and contents notified by the center, and should not perform deeds to disturb the task of the center.
② The member cannot perform sales activities to sell products except when officially admitted by the center, and especially, cannot do hacking, gaining profit by advertisement, commercial activities through pornographic site, illegal distribution of commercial software. The center is not responsible for the result and damage of sales, legal measures like imprisonment by relative institutes caused by the violation, and the member should make compensation for damages to the center for these acts.
③ The member should provide complete information (Registered information) which is identical with the current facts when registering for the service usage.
④ The member should renew the registered information immediately when there is a change. When the registered or renewed information provided by the member is inaccurate, or when the member did an action stated in article 1, the center may limit or suspend the member’s use of service by article24 in this clause, and also may perform reasonable actions like accusation to investigation agency.
Article 19 (Responsibility and duty of member ID, E-mail, Password management)
① The member is responsible for all results occurring from ID, E-mail and Password’s careless management or illegal use, and the center is responsible for results occurring from the responsible reasons of the center like the system breakdown of the center
② The member should bit let a third party use their ID, E-mail or Password, and when the member is aware that their ID, E-mail or Password is stolen or used by a third party, they should notify the center immediately and follow the guide of the center.
③ The member ID cannot be changed without the agreement of the center in advance.
Article20 (Notice to the member)
① When the center is notifying the member, the center may use the e-mail registered by member.
② The center replaces the individual notice by posting on the service board in case of notice for unspecified individual member.
Article21 (User’s private information protection)
According to relevant laws, the center should make effort to protect the personal information of the member including registered information. The private information protection of the member follows the Privacy Statement decided by the center or relevant laws.
Article22 (Consignment of personal information)
The center should process the tasks like treatment and management of collected personal information (Tasks), but when necessary, the center may consign partial or total task to the selected institutes. Chapter 5 Cancel of contract or usage limit
Article23 (Cancel of contract or usage limit)
① When the member wants to cancel the service usage contract, he or she should apply for cancelation to the center in the site or in the method decided by the center.
③ When the member does not perform the duties of the member regulated in article 19, the center may cancel the usage contract or suspend the service usage without notice in advance.
④ The center may limit the service usage according to the member’s qualification even after the member was provided with the ID and Password by the usage contract.
⑤ About the measures of the center in item 2 and 3, the member may raise an objection according to the procedure decided by the center.
⑥ When it is admitted that the objection in item4 is reasonable, the center reopens the service usage immediately.
Article24 (Ban on transfer)
① The member cannot transfer or give the usage authority of the service and other positions of usage contract to other people and all rights and responsibility including copyrights of the postings belongs to the member who posted them.
② When the center is merged or merged after divestiture, or when the center transfers the service to a third party, so the provision agent is changed, the center may notify the members in the method in article21. In this case, a member who objects the merger, merger after divestiture, or transfer of service, may cancel the usage contract.
Chapter 6 Compensation of damage and others
Article25 (Compensation of damage)
① When the center is damaged by the violation of the clause by the member, the member violating this clause should compensate the damage to the center.
② When the center receives various appeals from a third party, including a claim for damages or suit by the member’s illegal actions or violation of the clause in using the service, the member should exempt the center by his or her cost and risk, and when the center is not exempted, the member should compensate all damages to the center caused by the situation.
Article26 (Exemptions)
① The center is exempted about the responsibility of service provision when it is impossible to provide service due to natural disaster or other force majeure.
② The center is not responsible of usage disability due to the member’s imputation.
③ The center is not responsible of the loss of expected profit by the usage of the service, and other damage caused by the data obtained through the service. The center is not responsible of reliability, accuracy or contents of the information, data, fact that the member posted on the site.
④ The center is not responsible to be involved to the dispute between members or between member and a third party and also is not responsible of compensation of the damage.
Article27 (Competent court)
① When there is a dispute between the center and the member about the usage of service, the center and the member should sincerely discuss to settle the dispute.
② When the dispute is not settled by the discussion in item1, the parties may start a suit to the competent court according to the Civil Procedure Code.
Supplementary provisions (2003. 7. 25.)
(Date of enforcement) This clause is enforced from July 25, 2003.
Supplementary provisions (2006. 6. 16.)
(Date of enforcement) This clause is enforced from June 16, 2006.
Previous clause enforced from July 25, 2003 is substituted by this clause.