Go to Main Menu Go to Contents
Privacy
'S-1 Corporation ' (hereinafter the “Company”) considers users’ personal information as important, and complies with the 'Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.‘ Through the privacy policy, the Company informs users of the purpose and method of the Company’s use of the personal information provided by the users and the measures taken by the Company for protection of the personal information.
If the privacy policy is revised, the Company will make public notice on the bulletin board of the S-1 website by posting it. (www.s1.co.kr) (or by sending individual notice).

The contents of this privacy policy are as follows:

Personal information items to be collected

The Company collects the following personal information for membership signup, provision of prizes, recruiting, provision of information on services and products, and application for automatic transfer on the Company’s website.

Items to be collected

Table of Collected items

A table consisting of Name of menu and collected items

Menu Collected items
Membership signup Name, login ID, password, contact information, address, E-Mail
Provision of prizes to people who propose ideas Name, address, contact information, E-Mail
Inquiries on signup / purchase Applicant, contact information
Customers with contracts for guard system products Application for automatic transfer Inquiry

Personal information

Website (membership signup, idea proposal, etc.)

Purpose of collecting and using personal information

The Company uses collected personal information for the following purposes:

  • Membership management
    Authentication for the use of membership services, personal identification, prevention of illegal use and unauthorized use by bad members, verification of intention to sign up, handling of civil affairs such as complaints, and delivering notices
  • Providing customers with contracts for S-1 products conveniently when applying for automatic transfer through the website
  • Providing prizes after selecting proposals for service improvement and new product ideas / excellent proposals

Personal information retention and use period

In principle, relevant information will be immediately destroyed after the purpose of collecting and using personal information is accomplished. For more information, please refer to the personal information processing consent form.
However, the following information will be retained for the specified period of time for the following reasons

  • Retained items : Service use records, connection IP information
  • Grounds of retention : To be deleted if not used after being retained for 3 years
  • Retention period : 3 years

Procedure and method of destruction of personal information

The procedure and method of destruction of personal information are as follows:

  • Destruction procedure
    The personal information that users entered for membership signup will be immediately deleted from the DB after the purpose is accomplished. The said personal information will not be used for purposes other than retention unless stipulated by law.
  • Destruction method
    Personal information saved as electronic files will be deleted using a technical method that does not allow records to be reproduced.
    Personal information printed on paper will be shredded with a shredder or incinerated.

Provision of personal information

If the Company provides members’ personal information to a 3rd party to provide better services for members, members’ consent will be obtained through a separate procedure. Personal information of members will not be provided to a 3rd party without their express consent.

Consignment of personal information handling

In principle, relevant information will be immediately destroyed after the purpose of collecting and using personal information is accomplished.
For more information, please refer to the personal information processing consent form.
However, the following information will be retained for the specified period of time for the following reasons.

A table of Consignment of personal information handling

A table consisting of CONSIGNEES, Personal information items, Purpose of using the information, Information retention and use period.

CONSIGNEES Personal information items Purpose of using the information Information retention and use period
S-1 CRM Name, contact information, client name Receiving and processing VOC, technical assistance From the receipt of VOC until withdrawal from membership
SECUI, Jiran Soft, AhnLab Receiving and processing S-1PS VOC, technical assistance
Samsung Electronics Sales, LOTTE HIMART, Electro Land, KT M&S, SO_AK, Handphone Maeul, LP&J Telecom, J Networks, Dream Freedom, Yeon Telecom, Sun, SW Networks, Mobile Core Company, SS Clan, Yongin Telecom, SKO, PH, Damo&Toms, Dream TS, Yedo, Momo Communication, MS Communication, Chakhan Smart, Hananet, Jusung International, Mobile Phone Outlet, Star Mobile, Daewang, Eum Networks, Naeil Company, J&T Company, Fun and Phone for Everyone, TNY Networks, Sharon Mobile, Geumho Telecom Information on customers who are members Recruiting customers and membership signup, customer maintenance sales, etc.
NICE Credit Information Service Name, address, phone number, credit amount, etc. Verification of customer credit information, debt collection Until termination of the consignment contract
KAIT Information on customers who are members Verification of customers’ real names
Seoul Guarantee Insurance Verification of the terminal price insurance
KTOA Managing number portability Until termination of the consignment
SPTEK Personal Security Mobile website renewal Until termination of the consignment contract
Korea Financial Telecommunications & Clearings Institute, Samsung Card, Shinhan Card, Lotte Card, Hyundai Card, BC Card, Kookmin Card, Hana Card, NH Card Customer telecommunication charge payment Until termination of the consignment
Coop Marketing Sending coupons Until termination of the consignment contract
FNU Name, contact information, address, payment information Billing and collecting
AIMMED Name, contact information Provision of health counseling service (counseling)
SKT, KT Name, contact information, address, e-mail subscription/unsubscription date, payment information, etc. Consignment of enterprise-wide sales activities, such as provision of communication service, integrated billing and provision of discount schemes From service application date to termination date
Ganada Brain, Green Core, Novus, Daebong, Daewon E&T, Daeho I&T, DSC 1, Loop, Mega Taxi Meter, Myeongpum Taco, Motor Club, Virus Car Audio, Bistech, Sun-woo Corporation, Sungchang, Celizion, MS Mobile, Yeongwoong Corporation, Autoland, Instech, J&C Road, Car Road, Car Family, KBTG, Taeyang System, PNT, Hana Corporation Client name, name, address, contact information Installation of UVIS systems and after-sales service Until termination of the consignment
Daemyung ITS Name, address, billing, payment information, etc. Printing and sending of regular mail Until termination of the consignment contract
Korea Enterprise Data Name, address, phone number, credit amount, etc. Registration of defaults on obligations
In cosigning the process of personal information, in order to ensure information security, we explicitly include strict compliance with all guidelines and regulations related to information security, confidentiality of personal information, prohibition of providing personal information to 3rd parties, responsibilities in case of accidents, the consignment period and return or destruction of personal information after expiry of the consignment period in the contract, and keep all of those in written and/or electronic forms.
If consignors and details of consignment are changed, we will notify them by posting on the website or in a similar manner.

The rights of users and legal representatives, and the methods of exercising them

You may view or modify your personal information at any time. If you want to view or correct your personal information, you may click ‘Change personal information’ (or ‘Modify member information’, etc.) to view or correct your personal information after authentication, or if you contact the chief privacy officer in writing, by phone or e-mail, we will take necessary measures immediately.
If you request that errors in personal information be corrected, we will not use or provide the mentioned personal information until it is modified. Also, if incorrect personal information has already been provided to a 3rd party, we will immediately notify the result of correction to the 3rd party and make sure it is corrected.
Important: The Company may not allow users to view or correct all or part of their personal information if doing so:

  • Is likely to lead to serious bodily harm or property damage, or infringe on the rights of the user or a 3rd party;
  • Is likely to cause trouble to the business of the Company; or
  • Violates any law.
You may always withdraw what you have consented with regards to the collection, use and provision of personal information during membership signup. To withdraw your consent (withdraw from membership) contact the S-1 webmaster by phone (02)-2131-8439 or e-mail s1web@samsung.com. We will immediately take necessary measures to destroy/erase your personal information.
The Company makes sure that withdrawal of consent to the collection of personal information (withdrawal from membership) is easier than the collection of the personal information.
Please prevent accidents by correctly entering up-to-date personal information. You may be responsible for any accident occurring due to incorrect information you entered, and if you use the information of another person or enter false information, you may lose your membership.
You have not only the right to have your personal information protected, but also the obligation to protect yourself and prevent the intrusion and misuse of the information of others.
Take care so that your personal information, including your password, is not leaked, and the personal information of others, including their postings, is not damaged. If you fail to fulfill your responsibilities and inadvertently or intentionally damage the information and integrity of others, you may be penalized to the full extent of the law in accordance with the ‘Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.’

Matters concerning the operation of automatic personal information collection systems and the rejection thereof

The Company uses cookies in parts of its website.

  • Cookies
    A unique character string that makes it possible for the server to identify the user. The server and the browser store cookies in a file respectively, and when the browser accesses the server again, the cookie on the user’s computer is sent to the server to identify the user to provide personalized services. Cookies help the server recognize the user’s computer, but does not identify the user personally.
    Accordingly, when you use a PC in a public place or a PC that others can use, be sure to log out when you finish using the service after log-in. Also, you may choose to use or not to use cookies.
    You can accept all cookies, have a notice sent when a cookie is installed, or reject all cookies by adjusting the option of the web browser.

Customer service related to personal information

The Company has the following departments to protect customers’ personal information and handle complaints related to personal information.

The table of Customer service related to personal information

A table of Chief Information Security Officer, Phone and E-mail.

Chief Information Security Officer Oh Hyeon-sang
Phone (02)2131-8231, FAX (02)2131-823
E-mail For customer inquiries about the website
You can report all complaints related to information security occurring when using the Company’s services to the Chief Privacy Officer or the department in charge of personal information. The Company will promptly provide sufficient answers to what you report.
If you need to report an intrusion on personal information or need counseling, please contact the following agencies.

Other policies on personal information handling

Technical and administrative measures for information

The Company takes the following technical measures to prevent the loss, theft, leakage, alteration or damage of personal information in handling users’ personal information.

  • Users’ personal information is protected by passwords, and files and transmitted data are encrypted, or file locks are used to protect important data using a separate security function.
  • The Company uses vaccine (aka anti-virus) programs to prevent damage due to computer viruses. Vaccine programs are periodically updated, and if a virus suddenly appears, the Company prevents intrusion on personal information by deploying countermeasure as soon as they become available.
  • The Company uses encryption algorithms to offer SSL that ensures that personal information is transmitted securely over the network.
  • As a provision against external intrusion, such as hacking, we have installed firewalls and a vulnerability analysis system in each server.
The Company is taking the following administrative measures to prevent the loss, theft, leakage, alteration or damage of personal information in handling users’ personal information.
  • The Company limits the authority to access users’ personal information to only those who are managing it, such as the Chief Privacy Officer and personal information managers, and those who must inevitably handle personal information for business purposes. The Company uses vaccine (aka anti-virus) programs to prevent damage due to computer viruses. Vaccine programs are periodically updated, and if a virus suddenly appears, the Company prevents intrusion on personal information by deploying countermeasure as soon as they become available.
  • We provide regular internal and external education for employees who handle personal information with regard to acquisition of new security technologies and information security duties.
  • We require all new employees to take the security pledge to prevent information leakage, and have internal procedures for monitoring employees’ implementation of and compliance with information security policies.
  • The transfer of duties of employees handling personal information is done under strict security procedures, and we clearly define the responsibilities for personal information incidents when new employees are hired and employees retire.
  • We do not mix personal information and general data, and we keep them in separate servers.
  • The computer room and archive room are designated as special restricted areas, and are off-limits except to authorized personal.
  • The Company will not take responsibility for what happens due to users’ personal mistakes or the basic risks of the Internet. Members should appropriately manage their IDs and passwords to protect their own personal information, and take responsibility for it.
  • Besides, if personal information is lost, leaked, altered or damaged due to the mistake of an internal manager or for technical and/or administrative reasons, the Company will immediately notify users and take appropriate measures and compensate for damages.

Linked site provision policy

The Company may provide links to the websites or data of other companies to users. In this case, as the Company has no control over the external sites and data, we cannot take responsibility for or guarantee the usefulness of the services or data provided by these companies.
If you click a link provided by the Company and go to a page of another site, the information policy of that site is unrelated to the Company. So you should review the policy of the new site.

Posting operation policy

The Company considers users’ postings as valuable, and tries its best to prevent them from being altered, damaged or deleted. In the following events, however, exceptions will be made.

  • Spam (Ex: chain letter, \800 million mail, advertising of certain sites, etc.)
  • Postings that circulate false facts to slander others and damage their reputation
  • Postings that expose the personal affairs of others without consent
  • Postings that infringe on the rights of the Company or 3rd parties, e.g. intellectual property rights
  • Postings about topics different than the bulletin board allows
To promote a desirable bulletin board culture, the Company may delete certain parts of postings or modify them using symbols if the personal affairs of others are exposed without consent and/or the postings have topics other than the bulletin board allows. The Company transparently discloses their moving path so that there is no misunderstanding. In other cases, the Company may delete a posting after sending an explicit or individual warning. Basically, the individuals who wrote the postings have the rights and responsibilities with regard to the postings. Also, as information voluntarily disclosed through postings is difficult to protect, you must think hard before disclosing information.

Rejection of e-mail collection policy

The Company refuses unauthorized collection of addresses by e-mail collection programs or other technical devices. If you violate this, you may be punished according to the 'Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.’

Transmission of advertising information

The Company will not transmit any for-profit advertising information against users’ explicit intention to refuse such information. The Company will include the following information in the subject field and body of the e-mail if users agreed to receive product information and newsletters via e-mail so that they can easily recognize them.

Posting operation policy

The Company considers users’ postings as valuable, and tries its best to prevent them from being altered, damaged or deleted. In the following events, however, exceptions will be made.

  • The subject field of the e-mail
    (We may not include (Advertising) in the subject field. Instead, we may show the main contents of the body of the e-mail.
  • The body of the e-mail
    We show the name of the sender, e-mail address and phone number so that users can express their intention to refuse to receive the e-mail.
    We clearly show how users can express their intention to refuse to receive the e-mail easily.
If we transmit information harmful to youths, we include (adult advertising).
  • If any of the following is included in the body in the form of symbols, characters, images or sound (including cases where technical measures are taken so that the recipient can easily check the contents even though it is not directly expressed in the body of the e-mail), we include “(adult advertising)” in the subject field of the e-mail.
    - Suggestive or lascivious materials that stimulate the sexual impulse of youths (person under the age of 19. The same hereinafter)
    - Materials that may induce youths to be violent or commit crimes
    - Materials that stimulate or otherwise glorify the use of various kinds of violence including sexual violence or abuse of drugs
    - Materials that were defined and notified as media harmful to youths by the Juvenile Protection Act
  • If the body of the for-profit advertising e-mail includes information on the Internet websites containing the above materials, we will include “(adult advertising)” in the subject field of the e-mail.
  • If we send for-profit advertising information by means other than e-mail, e.g. fax or cell phone text messages, we will include “(advertising)” at the beginning of the fax or text message, and clearly show the contact information of the sender in the body.

Obligation to notify changes in policies

This privacy policy was revised on August 21, 2015, and if the contents are added, deleted or modified as there are changes in laws, policies or security technologies, we will notify the reasons for the change and the details on our website at least 10 days before the new information security policy is to be enforced.
If important information is changed, such as provision of personal information to 3rd parties, purpose of collecting and using personal the information, and retention period, we will obtain the consent of users.