Please be advised that changing your location while shopping will remove all contents from your Shopping Bag.
Welcome to the GENTLE MONSTER website
This policy shall be effective from November 8, 2022.
- 1. THE PURPOSE OF COLLECTING AND USING THE PERSONAL INFORMATION
- 2. CURRENT STATE OF PERSONAL INFORMATION DATA
- 3. PROCESSING AND RETENTION PERIOD OF PERSONAL INFORMATION
- 4. PROVISION OF PERSONAL INFORMATION TO THIRD-PARTY
- 5. CONSIGNMENT OF PERSONAL INFORMATION PROCESSING
- 6. RIGHTS OF THE USER AND THE LEGAL REPRESENTATIVE, HOW TO EXERCISE THE RIGHTS
- 7. PROTECTION OF PERSONAL INFORMATION UNDER 14 AGES
- 8. PROCEDURE AND METHOD FOR DESTROYING PERSONAL INFORMATION
- 9. INSTALLATION, OPERATION, AND REJECTION OF AUTOMATIC COLLECTION OF PERSONAL INFORMATION
- 10. PERSONAL INFORMATION PROTECTION OFFICER
- 12. SAFEGUARDING YOUR PERSONAL INFORMATION
1. The purpose of collecting and using the personal information
The personal information collected will not be processed for any purpose other than the following purposes. If any changes occur, we will inform you in advance and ensure you agree with them.
Membership registration and management
The personal information you provide shall be used to verify the membership registration, give various notification, and handle complaints.
Deal with complaints
The personal information you provide shall be used to identify individuals, verify complaints, and to contact and notify the results for an in-depth investigation.
Provision of services or products
The personal information you provide shall be used for shipping the products, providing service including game, repairing the products, certifying the genuine product, etc., providing contents (newsletter, notification for stock), sending invoice, and making payments.
Marketing and advertising
The personal information you provide shall be used for new service(product) development and provision of customized service, advertising information including event and offer opportunity to participate as well as understanding the frequency of access or statistics on the use of services by members.
2. Current state of personal information data
Items of personal information
Purpose Items Remarks Membership registration [Standard] Name, E-mail address, Phone number, Password, Gender, Birthdate, Resident country and CI(Connecting Information) required [Registered through Google or Facebook] Log-in ID, Name, E-mail address, Phone number, Gender, Birthdate and CI(Connecting Information) required Provision of services or products Name, E-mail address, Phone number, Shipping and billing address and Order No. required Deal with complaints Name, E-mail address, Phone number, Shipping and billing address, Gender, Resident country, Shopping (service usage) history, Payment history and Inquiries required Birthdate optional Payment Credit card details, Bank account details and CI(Connecting Information) required Personal Information automatically generated and collected on our website Image information taken and uploaded by the customer from participatory content required Refund Name, Shipping and billing history and Bank account details required Marketing and advertising Name, E-mail address, Phone number, Birthdate, Cookies, IP address and CI(Connecting Information) optional
We collect personal information in the following ways:
- When you access and use the services on GENTLE MONSTER website
- When you use Contact Us, download materials:
- Provided by the self-verification agency or an associate company
- Through the tools and cookies that collect the generated information
3. Processing and retention period of personal information
- We only retain and use the personal information during the period agreed by users when we are collecting the personal information, or until the membership is withdrawn, terminated, or expired.
- We destroy or store/manage the personal information of any user who have not used information and communications services for one year, separately from other user’s personal information. We will notify to such users for the fact that their personal information will be destroyed or stored/managed separately, the expiration date, and the particulars of personal information to be destroyed or stored/managed, at least 30 days prior to the expiration of the above designated period.
If any information is needed to be kept according to the pertinent legal provisions, it shall be kept during the period specified in the related laws, as below.
Items The required Period Ground for retention Records of display and advertising 6 months Article 6 of “Act on the consumer protection in electronic commerce” in the Republic of Korea Records of agreement or withdrawal 60 months Records of payment and goods supply 60 months Records of deal with complaints 18 months Records of Computer communication or internet access 3 months Article 15-2 of “Protection of communications secrets act” in the Republic of Korea
- If an investigation is in progress due to a violation of related laws, the Company may retain personal information for a certain period of time until the investigation is completed according to the relevant laws.
4. Provision of personal information to third-party
- We only share the personal information to third party when we obtain user’s consent for such provision after notifying i) the recipient of personal information, ii) the purpose for which the recipient of personal information uses such information, iii) particulars of personal information to be provided, and iv) the period during which the recipient retains and uses personal information, or when the special provisions exit in other laws or regulations.
5. Consignment of personal information processing
|Consignee||Consignment work and purpose|
|Powerfront Pte., Ltd.||Providing the Live Chat service on the website|
We entrust the following scope of work to provide you better services
|Company Name||Contact Info||Items of Personal Information||Country, Method||Purpose/Entrusted work||Retention and Use Period|
|IICOMBINED Co., Ltd.||firstname.lastname@example.org||Operating system, Application Version Number (OS version), device model, member identifier (member serial number), UUID, UDID||Country – Republic of Korea
Method – Transferred through the network when using the service
|Items created automatically and collected while using the game services||3 months from the date the game services end|
6. Rights of the user and the legal representative, how to exercise the rights
- Users may withdraw their prior consent to our collection, use and provide to third party of the personal information, and we will take measure promptly on such requests.
- Users may view, modify, or request deletion of his or her registered personal information at any time.
- If the user requests correction of a personal information error, we may not use or provide the user’s personal information until the correction is completed. Moreover, if the incorrect personal information is already provided to a third party, we shall send the corrected information to the third party immediately.
Users may contact the manager of personal information protection via mail, phone, or email, we will handle the request immediately after the request clarification procedure.
- E-mail: email@example.com
7. Protection of personal information under 14 ages
We do not accept any request for membership of anyone who is younger than 14 years, and we do not collect any personal information under 14 ages.
8. Procedure and method for destroying personal information
In principle, as soon as the purpose for the collection of personal information has been achieved, the applicable information shall be destroyed without delay. The procedures, deadlines, and methods are specified in detail below.
Procedure for disposal
Information inputted is transferred to the separate database (separate documents for paper) once the purpose has been achieved. According to the protection of information pursuant to the internal policies and related laws, it shall be stored for a certain period or disposed without delay.
Deadline for disposal
Once the possession period of user’s personal information has been elapsed and if it is no longer in need due to achievement of goal, revocation of certain service, or business closure, etc. then it shall be disposed within 5 days from the last date of possession.
Method of disposal
The personal information in the form of electronic files shall be deleted in a way that it cannot technically be recovered. For those printed on paper shall either be grinded or incinerated.
9. Installation, operation, and rejection of automatic collection of personal information
We run the cookies that are designed to save and find your personal information. Basically, cookies help us remember who you are and other information about your visits which are very small text files that are used to run the website to the user’s computer browser and may be stored on the hard disk of the user’s PC.
Purpose of using cookies
is used to provide optimized information by identifying the types of visits and usage of each service and website as well as popular searches and security access.
Installation, operation, and rejection of cookies
You may refuse to store cookies by setting up the options through Tools>Internet Options>Privacy Menu at the top of your web browser.
- Please note that if you refuse to store cookies, you may have difficulty using our customized service.
10. Personal information protection officer
We designated the department and administrator in charge to be responsible for the handling of personal information processing and related complaints.
Position Name Department Address Contact number Email address CPO TAEHO JUNG IT Division 41, Eoulmadang-ro 5-gil, Mapo-gu, Seoul, Republic of Korea +82 1600 2126
(Fax: +82 326 1696)
firstname.lastname@example.org Position CPO Name TAEHO JUNG Department IT Division Address 41, Eoulmadang-ro 5-gil, Mapo-gu, Seoul, Republic of Korea Contact number +82 1600 2126
(Fax: +82 326 1696)
Email address email@example.com
- You may report any inquiry regarding personal information, complaints, and damages remedies, etc. to the administrator in charge of personal information while using the services (or business), then we shall promptly respond to it.
12. Safeguarding your personal information
We will take reasonable care to maintain appropriate safeguards to ensure the security, integrity and privacy of the information you have provided to us. We have put in place technology and security policies which are designed to protect the personal information we hold. We also follow the security procedures that applicable privacy laws require.
Regular self-audit conducted
We conduct our own audits regularly (quarterly) to ensure the stability of handling personal information.
- Minimization and conduct training of employees handling personal information Employees who deal with personal information are designated and limited to the person in charge.
- Establishment and enforcement of internal management plan We have established and implemented internal management plan for handling personal information in the most secure way.
- Technical measures against hacking We installed a security program to prevent leakage and damage of personal information from hacking or computer viruses, also we periodically update and check the systems that are being installed and monitored both technically and physically.
- Encryption of personal information The personal information of the user is encrypted, stored, and managed which only the user can recognize it. Separate security function is being used, for example encrypting the file and transmit data or using the file lock function for important data.
- Keep logs record and prevent forgery We maintain and manage the records of access through personal information processing system for at least six months and use the security function to prevent forgery, theft or loss of access records.
- Restrict access to personal information We take necessary measures to control access to personal information through granting, modifying, and obliterating the authority to access to the database system that processes personal information. We also control unauthorized access from external by using an intrusion prevention system.
- Use locking device for document security We keep documents with personal information and auxiliary storage media in safe place with lock.
- Access control of unauthorized persons We have set up a separate physical storage area for personal information and operate access control procedures.