Privacy Policy
(hereinafter referred to as the “company”) complies
with the Personal Information Protection Act and
related laws to protect the freedom and rights of
data subjects. We process personal information in a lawful
manner and securely manage it.
In accordance with Article 30 of the Personal Information
Protection Act, we have established and disclosed this
Privacy Policy to guide individuals
(hereinafter referred to
as “applicants”) who plan to apply for a job at the company
regarding the procedures and standards
for
personal information processing.
We aim to swiftly and efficiently address any related complaints.
1. Purpose of Personal Information Processing
The company processes personal information forthe purposes listed below.
Personal information
that is being processed will not be used for purposes other
than those listed,
and in case of any changes in the purposes
of use, we will take necessary measures,
including obtaining separate consent in accordance with
Article 18 of the Personal Information Protection Act.
- ① Conducting and managing the job application process.
- ② Verifying qualifications and confirming
the applicant's eligibility. - ③ Communicating with applicants.
- ④ Providing talent database services.
- ⑤ Conducting and notifying results of recruitment processes
for each position.
2. Personal Information Processed
Category | Personal Information Processed |
---|---|
Mandatory |
Name, Email, Address, Mobile phone number, Profile photo, Date of birth, Educational background (including vocational school, university, and graduate school), Military service status, Applied job position and field, Applied company, Highest level of education, Eligibility for preferential hiring under relevant laws, such as those found under the Act on Support for Persons Eligible for Veteran’s Compensation (hereinafter referred to as the Veterans Compensation Act) and the Act on the Honorable Treatment and Support for Persons of Distinguished Service to the State (hereinafter referred to as the Persons of National Merit Act) |
Optional |
Photo, Proof of foreign language proficiency, Awards, Certifications, Community service (volunteer work, language training, etc.), Work experience, Cover letter, Portfolio |
(*We do not collect personal information from children
under the age of 14 who require the consent of
their legal guardian, and they prohibited/unable to
apply for employment.)
3. Processing and Retention Period of Personal Information
The company processes and retains the personalinformation of applicants collected during job applications
for a period of three years.
4. Personal Information Destruction Procedure and Method
-
① When personal information retention becomes
unnecessary,
such as when the personal information
retention period has passed or the purpose of processing
has been achieved,
the company promptly destroys
the relevant personal information. -
② If, even after the expiration of the consented
retention period by the applicant or the fulfillment
of the processing purpose, personal information
must be retained in accordance with other laws,
it is then separately transferred to another database (DB)
or stored in a different location. -
③ The procedure and method for
personal information destruction are as follows:- 1) Destruction Procedure
-
The company selects personal information
for destruction
when necessary and obtains
approval from the company's Personal Information
Protection Manager
before proceeding with the
destruction. - 2) Destruction Method
-
- Personal information in paper format:
shredded or incinerated. -
- Personal information stored electronically:
deleted using technical methods that render
the data unrecoverable.
5. Rights and Obligations of Data Subjects and
Methods of Exercise
-
① Applicants have the right to access, correct, delete,
or request the suspension of
processing of
their personal information from the company at any time. -
② The exercise of these rights can be made in writing,
via electronic mail, facsimile (FAX) machine,
or other methods specified in Article 41, Paragraph 1
of the Enforcement Decree of the Personal Information
Protection Act.
The company will promptly take any
necessary actions in response to such requests. -
③ The exercise of these rights can also be made through
a legal representative of the applicant.
In such cases, a power of attorney according to the
format specified in Attachment No. 11 of the Guidelines
for Personal Information Processing Methods (No. 2020-7)
must be submitted. -
④ Requests for personal information access and suspension
of processing may be accepted orrejected in accordance
with Article 35,
Paragraph 4, and Article 37, Paragraph 2
of the Personal Information Protection Act. -
⑤ Requests for correction and deletion of personal
information cannot be made if the personal information
is specified as a collection target under other laws. -
⑥ When the company receives requests for access,
correction, deletion, or suspension of processing
of personal information,
it verifies whether the requester
is the individual concerned or a legitimate representative.
6. Third-Party Sharing of Personal Information
- The company processes applicants' personal information only within the specified purposes and shares it with third parties onlywhen there is consent or when required by law (per Article 17 and Article 18 of the Personal Information Protection Act).
When required for efficient delivery of service, we obtain consent to share the minimum necessary personal information.
Category | Recipients of Shared Information |
Info Provided | Purpose of Sharing | Period of Retention and Usage |
---|---|---|---|---|
When applying for a job | Poly ESC Inc. |
All submitted information when applying for a job opening. |
Identifying applicants, checking their application history and outcomes, confirming eligibility for other job openings, and verifying their application intentions. Managing the hiring process, guiding through recruitment steps, and addressing inquiries. |
Three years from the date of confirming the hiring status for job postings. -Upon request for account deletion and application removal by the applicant, we will promptly delete the data. |
Poly ESC Daejeon Inc. | ||||
Poly ESC Mokdong Inc. | ||||
Gwanggyo Poly | ||||
Poly ESC Yeongtong MPoly Inc. | ||||
Poly ESC Unjeong Inc. | ||||
Poly ESC Daechi Poly MAGNET Inc. | ||||
Poly ESC Gwangmyeong Inc. | ||||
Poly ESC Yuseong Inc. | ||||
Poly ESC Mokdong2 Inc. | ||||
Poly ESC Songdo Inc. | ||||
Poly ESC Suji Inc. | ||||
Poly ESC Suji2 Inc. | ||||
Joongkye Poly | ||||
Poly ESC Bundang Inc. | ||||
Poly ESC Wirye Inc. | ||||
Yeongtong Poly | ||||
Songdo Poly | ||||
Poly ESC Daejeon MPoly Inc. | ||||
Poly ESC Daechi MAGNET Inc. | ||||
Poly ESC Bundang MPoly Inc. | ||||
Poly ESC Yangcheon Inc. | ||||
Poly ESC Ilsan MPoly Inc. | ||||
Poly ESC Jeongbal Inc. | ||||
Poly ESC Songpa Inc. |
Category | When applying for a job | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Recipients of Shared Information | Poly ESC Inc. | Poly ESC Daejeon Inc. | Poly ESC Mokdong Inc. | Gwanggyo Poly | Poly ESC Yeongtong MPoly Inc. | Poly ESC Unjeong Inc. | Poly ESC Daechi Poly MAGNET Inc. | Poly ESC Gwangmyeong Inc. | Poly ESC Yuseong Inc. | Poly ESC Mokdong2 Inc. | Poly ESC Songdo Inc. | Poly ESC Suji Inc. | Poly ESC Suji2 Inc. | Joongkye Poly | Poly ESC Bundang Inc. | Poly ESC Wirye Inc. | Yeongtong Poly | Songdo Poly | Poly ESC Daejeon MPoly Inc. | Poly ESC Daechi MAGNET Inc. | Poly ESC Bundang MPoly Inc. | Poly ESC Yangcheon Inc. | Poly ESC Jeongbal Inc. | Poly ESC Songpa Inc. |
Info Provided | All submitted information when applying for a job opening. | |||||||||||||||||||||||
Purpose of Sharing |
Identifying applicants, checking their application history and outcomes,
confirming eligibility for other job openings, and verifying their application intentions. Managing the hiring process, guiding through recruitment steps, and addressing inquiries. |
|||||||||||||||||||||||
Period of Retention and Usage |
Three years from the date of confirming the hiring status for job postings. - Upon request for account deletion and application removal by the applicant, we will promptly delete the data. |
7. Personal Information Handling Outsourcing
-
① At this time, the company does not outsource any
of the tasks related to the process or handling
of personal information.Outsourcing
CompaniesOutsourced Tasks Retention and
Usage PeriodNone None None -
② In the event that the company enters into outsourcing
contracts, we will follow the provisions of Article 26
of the Personal Information Protection Act.
We will outline in the contract or related documents
the prohibition of processing personal information
beyond the intended purpose,
implement technical and
administrative safeguards, restrict re-outsourcing,
and maintain oversight over subcontractors to ensure
secure handling of
personal information,along with
assuming liability for any damages. -
③ We will promptly disclose any changes in the content of
outsourced tasks or subcontractors through
our privacy policy.
8. Ensuring the Security of Personal Information
The company takes the following measures to ensurethe security of personal information:
-
① Minimizing Personal Information Handling and
Ensuring Proper Training/Education:
The company
restricts the number of personnel handling personal
information and emphasizes compliance with laws and
internal policies through administrative measures and
extensive training for personal information processors. -
② The company uses the latest antivirus programs to
prevent the leakage or damage of personal information
and data of applicants. -
③ Personal information is encrypted to be securely
stored and managed, ensuring safe transmission
of personal information.
9. Personal Information Protection Manager
-
① The company appoints a Personal Information Protection
Manager to oversee personal information processing and
handle complaints and remedies related to processing
applicants’ personal information.- - Personal Information Protection Manager: Kade Ro
- - Department: People Team
- - Contact: 02-2224-7849
- - Email: kade.ro@edu-poly.com
-
② Applicants can inquire about and report any issues
related to personal information, including complaints and
remedies,
arising from the use of our services,
to the Personal Information Protection Manager or
the Personal Information Protection Department.
The company will promptly address applicants' inquiries.
10. Reporting and Consultation for Personal Information Breaches
Data subjects who wish to seek remedies for personalinformation breaches can file for dispute resolution or
consultation with organizations
such as the Personal
Information Dispute Mediation Committee and the Korea
Internet & Security Agency's Personal Information
Infringement Report Center.
For other reports and
consultations related to personal information breaches,
please contact one the following agencies:
Personal Information Infringement Report Center:
118 (without area code) (privacy.kisa.or.kr)
Personal Information Dispute Mediation Committee:
1833-6972 (www.kopico.go.kr/main/main.do)
Cyber Investigation Department, Supreme Prosecutors' Office:
1301 (without area code) (www.spo.go.kr)
Cyber Bureau, National Police Agency:
182 (without area code) (ecrm.cyber.go.kr/minwon/main)
11. Installation, Operation, and Refusal of
Automatic Data Collection Devices
individual applicants, the company uses “cookies,”
which store and retrieve information from applicants'
computers.
Cookies are small data packets sent by the
server operating the website to the user's browser.
a. Purpose of Using Cookies
Cookies are used to maintain the visit and usage patterns
(job application, talent pool registration, etc.) of applicants
on the website.
b. How to Refuse Cookie Settings
Applicants have the option to choose whether to allow cookies.
Therefore, applicants can set their web browsers to either
accept all cookies,
prompt confirmation when cookies
are stored, or reject the storage of all cookies.
e.g., for Internet Explorer:
Browser's Tools > Internet Options > Privacy
However, please note that refusing cookie installation may
result in difficulties when using some services that
require logging in.
12. Changes to the Privacy Policy
- This privacy policy is effective from the date ofimplementation. Any changes, additions, deletions,
or revisions required by laws or policies will be announced
at least seven days before they take effect.