개인 정보 처리 방침
2021.08.20
2021.08.20
2021.08.20
※ This policy will be implemented from August 20, 2021.
'ESTsoft' (hereinafter referred to as the 'Company') values the personal information of job applicants and complies with the 'Act on Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants through its personal information processing policy how their personal information is being used and what measures are being taken to protect their personal information. The Company will notify any changes to the personal information processing policy through notices on the homepage. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.
'ESTsoft' (hereinafter referred to as the 'Company') values the personal information of job applicants and complies with the 'Act on Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants through its personal information processing policy how their personal information is being used and what measures are being taken to protect their personal information. The Company will notify any changes to the personal information processing policy through notices on the homepage. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.
'ESTsoft' (hereinafter referred to as the 'Company') values the personal information of job applicants and complies with the 'Act on Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants through its personal information processing policy how their personal information is being used and what measures are being taken to protect their personal information. The Company will notify any changes to the personal information processing policy through notices on the homepage. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.
'ESTsoft' (hereinafter referred to as the 'Company') values the personal information of job applicants and complies with the 'Act on Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants through its personal information processing policy how their personal information is being used and what measures are being taken to protect their personal information. The Company will notify any changes to the personal information processing policy through notices on the homepage. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.
1. Personal information items processed
The company allows you to apply for a job without a separate membership registration process, and to provide opportunities for job applications, we collect the following personal information through our website.
1) Scope of personal information collected when applying for a job
- Required Information: Photo, Name, Date of Birth, Gender, Password for modifying job application, Email address, Mobile phone number, Application route, Military service details, Eligibility for veterans benefits (including preferential rate if applicable), Disability status (if applicable, including details of the disability and the grade), Educational background, School attended, Period of attendance, Major and grades achieved, Transcript from last school attended, Career history (for experienced positions), Level of technical skills, Self-introduction
- Optional Information: Marital status, Career history (for freshers), Language and other qualifications, Awards
2) Scope of personal information collected when using the inquiry service
- Required Information: Email
The company allows you to apply for a job without a separate membership registration process, and to provide opportunities for job applications, we collect the following personal information through our website.
1) Scope of personal information collected when applying for a job
- Required Information: Photo, Name, Date of Birth, Gender, Password for modifying job application, Email address, Mobile phone number, Application route, Military service details, Eligibility for veterans benefits (including preferential rate if applicable), Disability status (if applicable, including details of the disability and the grade), Educational background, School attended, Period of attendance, Major and grades achieved, Transcript from last school attended, Career history (for experienced positions), Level of technical skills, Self-introduction
- Optional Information: Marital status, Career history (for freshers), Language and other qualifications, Awards
2) Scope of personal information collected when using the inquiry service
- Required Information: Email
The company allows you to apply for a job without a separate membership registration process, and to provide opportunities for job applications, we collect the following personal information through our website.
1) Scope of personal information collected when applying for a job
- Required Information: Photo, Name, Date of Birth, Gender, Password for modifying job application, Email address, Mobile phone number, Application route, Military service details, Eligibility for veterans benefits (including preferential rate if applicable), Disability status (if applicable, including details of the disability and the grade), Educational background, School attended, Period of attendance, Major and grades achieved, Transcript from last school attended, Career history (for experienced positions), Level of technical skills, Self-introduction
- Optional Information: Marital status, Career history (for freshers), Language and other qualifications, Awards
2) Scope of personal information collected when using the inquiry service
- Required Information: Email
The company allows you to apply for a job without a separate membership registration process, and to provide opportunities for job applications, we collect the following personal information through our website.
1) Scope of personal information collected when applying for a job
- Required Information: Photo, Name, Date of Birth, Gender, Password for modifying job application, Email address, Mobile phone number, Application route, Military service details, Eligibility for veterans benefits (including preferential rate if applicable), Disability status (if applicable, including details of the disability and the grade), Educational background, School attended, Period of attendance, Major and grades achieved, Transcript from last school attended, Career history (for experienced positions), Level of technical skills, Self-introduction
- Optional Information: Marital status, Career history (for freshers), Language and other qualifications, Awards
2) Scope of personal information collected when using the inquiry service
- Required Information: Email
2. Purpose of Personal Information Processing
1) Identification for job application, verification of qualifications, check the progress of recruitment, modify job application form, delivery of notices, dealing with inquiries, etc. ensuring smooth communication with applicants, and managing potential resources
1) Identification for job application, verification of qualifications, check the progress of recruitment, modify job application form, delivery of notices, dealing with inquiries, etc. ensuring smooth communication with applicants, and managing potential resources
1) Identification for job application, verification of qualifications, check the progress of recruitment, modify job application form, delivery of notices, dealing with inquiries, etc. ensuring smooth communication with applicants, and managing potential resources
1) Identification for job application, verification of qualifications, check the progress of recruitment, modify job application form, delivery of notices, dealing with inquiries, etc. ensuring smooth communication with applicants, and managing potential resources
Provision of Personal Information to Third Parties
1) The company in principle does not use or provide personal information beyond the scope of the personal information collection and usage purposes announced in Article 2. However, the following cases are exceptions:
- Cases where applicants have agreed in advance to disclosure
- Other cases deemed in good faith to be required by law (for example, when there is a request from the government/investigative agencies according to lawful procedures)
2) Even in exceptional circumstances, when information is provided according to the related laws or upon request of the investigative agencies, it is a principle to notify the concerned party. However, it may not be possible to notify due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original collection and use purposes.
3) In addition, the company will not entrust the applicant's information to an external company without the applicant's consent. If such a need arises in the future, we will notify the applicant of the contractor and the content of the contracted work and obtain prior consent if necessary.
4) Occasionally, we may offer job proposals to job applicants from companies that have a special relationship with our company (subsidiaries, affiliates). In such cases, we will always make individual contact with the job applicants and transfer the job application to the relevant company after going through the consent procedure.
1) The company in principle does not use or provide personal information beyond the scope of the personal information collection and usage purposes announced in Article 2. However, the following cases are exceptions:
- Cases where applicants have agreed in advance to disclosure
- Other cases deemed in good faith to be required by law (for example, when there is a request from the government/investigative agencies according to lawful procedures)
2) Even in exceptional circumstances, when information is provided according to the related laws or upon request of the investigative agencies, it is a principle to notify the concerned party. However, it may not be possible to notify due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original collection and use purposes.
3) In addition, the company will not entrust the applicant's information to an external company without the applicant's consent. If such a need arises in the future, we will notify the applicant of the contractor and the content of the contracted work and obtain prior consent if necessary.
4) Occasionally, we may offer job proposals to job applicants from companies that have a special relationship with our company (subsidiaries, affiliates). In such cases, we will always make individual contact with the job applicants and transfer the job application to the relevant company after going through the consent procedure.
1) The company in principle does not use or provide personal information beyond the scope of the personal information collection and usage purposes announced in Article 2. However, the following cases are exceptions:
- Cases where applicants have agreed in advance to disclosure
- Other cases deemed in good faith to be required by law (for example, when there is a request from the government/investigative agencies according to lawful procedures)
2) Even in exceptional circumstances, when information is provided according to the related laws or upon request of the investigative agencies, it is a principle to notify the concerned party. However, it may not be possible to notify due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original collection and use purposes.
3) In addition, the company will not entrust the applicant's information to an external company without the applicant's consent. If such a need arises in the future, we will notify the applicant of the contractor and the content of the contracted work and obtain prior consent if necessary.
4) Occasionally, we may offer job proposals to job applicants from companies that have a special relationship with our company (subsidiaries, affiliates). In such cases, we will always make individual contact with the job applicants and transfer the job application to the relevant company after going through the consent procedure.
1) The company in principle does not use or provide personal information beyond the scope of the personal information collection and usage purposes announced in Article 2. However, the following cases are exceptions:
- Cases where applicants have agreed in advance to disclosure
- Other cases deemed in good faith to be required by law (for example, when there is a request from the government/investigative agencies according to lawful procedures)
2) Even in exceptional circumstances, when information is provided according to the related laws or upon request of the investigative agencies, it is a principle to notify the concerned party. However, it may not be possible to notify due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original collection and use purposes.
3) In addition, the company will not entrust the applicant's information to an external company without the applicant's consent. If such a need arises in the future, we will notify the applicant of the contractor and the content of the contracted work and obtain prior consent if necessary.
4) Occasionally, we may offer job proposals to job applicants from companies that have a special relationship with our company (subsidiaries, affiliates). In such cases, we will always make individual contact with the job applicants and transfer the job application to the relevant company after going through the consent procedure.
4 Processing of Collected Personal Information
To enhance the provision of services, your personal information may be entrusted to an external party for processing. In case personal information is entrusted for processing, we will notify you in advance.
The entrusted processor of personal information and its details are as follows:
· Trustee: Midas IT Co., Ltd.
· Scope of entrustment: Operation of the recruitment homepage and recruitment management computer system and related civil complaints
· Shared information: Personal information on the job application form
· Retention and use period of shared information: Until the job application form is deleted by the recruiting company or the entrustment contract is terminated
To enhance the provision of services, your personal information may be entrusted to an external party for processing. In case personal information is entrusted for processing, we will notify you in advance.
The entrusted processor of personal information and its details are as follows:
· Trustee: Midas IT Co., Ltd.
· Scope of entrustment: Operation of the recruitment homepage and recruitment management computer system and related civil complaints
· Shared information: Personal information on the job application form
· Retention and use period of shared information: Until the job application form is deleted by the recruiting company or the entrustment contract is terminated
To enhance the provision of services, your personal information may be entrusted to an external party for processing. In case personal information is entrusted for processing, we will notify you in advance.
The entrusted processor of personal information and its details are as follows:
· Trustee: Midas IT Co., Ltd.
· Scope of entrustment: Operation of the recruitment homepage and recruitment management computer system and related civil complaints
· Shared information: Personal information on the job application form
· Retention and use period of shared information: Until the job application form is deleted by the recruiting company or the entrustment contract is terminated
To enhance the provision of services, your personal information may be entrusted to an external party for processing. In case personal information is entrusted for processing, we will notify you in advance.
The entrusted processor of personal information and its details are as follows:
· Trustee: Midas IT Co., Ltd.
· Scope of entrustment: Operation of the recruitment homepage and recruitment management computer system and related civil complaints
· Shared information: Personal information on the job application form
· Retention and use period of shared information: Until the job application form is deleted by the recruiting company or the entrustment contract is terminated
Processing and Retention Period of Personal Information
1) In principle, personal information is destroyed without delay after the purpose of collecting and using it has been achieved. However, if separate consent is obtained at the time of information collection, personal information is retained for the agreed period and for a certain period as prescribed by other relevant laws. However, if the applicant withdraws consent to provide personal information, the relevant personal information is deleted immediately.
1) In principle, personal information is destroyed without delay after the purpose of collecting and using it has been achieved. However, if separate consent is obtained at the time of information collection, personal information is retained for the agreed period and for a certain period as prescribed by other relevant laws. However, if the applicant withdraws consent to provide personal information, the relevant personal information is deleted immediately.
1) In principle, personal information is destroyed without delay after the purpose of collecting and using it has been achieved. However, if separate consent is obtained at the time of information collection, personal information is retained for the agreed period and for a certain period as prescribed by other relevant laws. However, if the applicant withdraws consent to provide personal information, the relevant personal information is deleted immediately.
1) In principle, personal information is destroyed without delay after the purpose of collecting and using it has been achieved. However, if separate consent is obtained at the time of information collection, personal information is retained for the agreed period and for a certain period as prescribed by other relevant laws. However, if the applicant withdraws consent to provide personal information, the relevant personal information is deleted immediately.
6 Personal Information Destruction Procedure and Method
1) The personal information of job applicants will be destroyed without delay once the purpose of processing personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction procedure
- The information entered by users for job applications and the like is transferred to a separate DB (in the case of paper, to a separate file box) and stored for a certain period of time according to internal policy and other relevant legal reasons for information protection (refer to the retention and use period) before being destroyed.
- This personal information will not be used for any other purpose other than being retained unless required by law.
3) Destruction method
- Personal information printed on paper is destroyed by shredding or incinerating.
- Personal information stored in electronic file format is deleted using technical methods that make records unrecoverable.
1) The personal information of job applicants will be destroyed without delay once the purpose of processing personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction procedure
- The information entered by users for job applications and the like is transferred to a separate DB (in the case of paper, to a separate file box) and stored for a certain period of time according to internal policy and other relevant legal reasons for information protection (refer to the retention and use period) before being destroyed.
- This personal information will not be used for any other purpose other than being retained unless required by law.
3) Destruction method
- Personal information printed on paper is destroyed by shredding or incinerating.
- Personal information stored in electronic file format is deleted using technical methods that make records unrecoverable.
1) The personal information of job applicants will be destroyed without delay once the purpose of processing personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction procedure
- The information entered by users for job applications and the like is transferred to a separate DB (in the case of paper, to a separate file box) and stored for a certain period of time according to internal policy and other relevant legal reasons for information protection (refer to the retention and use period) before being destroyed.
- This personal information will not be used for any other purpose other than being retained unless required by law.
3) Destruction method
- Personal information printed on paper is destroyed by shredding or incinerating.
- Personal information stored in electronic file format is deleted using technical methods that make records unrecoverable.
1) The personal information of job applicants will be destroyed without delay once the purpose of processing personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction procedure
- The information entered by users for job applications and the like is transferred to a separate DB (in the case of paper, to a separate file box) and stored for a certain period of time according to internal policy and other relevant legal reasons for information protection (refer to the retention and use period) before being destroyed.
- This personal information will not be used for any other purpose other than being retained unless required by law.
3) Destruction method
- Personal information printed on paper is destroyed by shredding or incinerating.
- Personal information stored in electronic file format is deleted using technical methods that make records unrecoverable.
7 User Rights, Obligations and How They Are Exercised
1) The personal information provided when applying for a job can be freely viewed, modified, and deleted after identity verification (real name verification) until the end of the recruitment process.
2) After the completion of the recruitment process, it is not possible to modify or delete the information. However, if the applicant wishes, they can request deletion by contacting the customer center on the ESTsoft website or the personal information protection grievance department. The company processes the deleted personal information as specified in the "Personal Information Collection, Processing, and Retention Period" by the company, and ensures that it cannot be accessed or used for any other purpose.
3) Users must not infringe on their own or others' personal information and privacy, which is being processed according to this personal information processing policy, in violation of the Personal Information Protection Act and other relevant laws.
4) In the case of children under the age of 14, their legal guardians have the right to view or modify the child's personal information, as well as the right to withdraw consent for collection and use. At this time, the minimum personal information of the legal representative can be collected from the child.
1) The personal information provided when applying for a job can be freely viewed, modified, and deleted after identity verification (real name verification) until the end of the recruitment process.
2) After the completion of the recruitment process, it is not possible to modify or delete the information. However, if the applicant wishes, they can request deletion by contacting the customer center on the ESTsoft website or the personal information protection grievance department. The company processes the deleted personal information as specified in the "Personal Information Collection, Processing, and Retention Period" by the company, and ensures that it cannot be accessed or used for any other purpose.
3) Users must not infringe on their own or others' personal information and privacy, which is being processed according to this personal information processing policy, in violation of the Personal Information Protection Act and other relevant laws.
4) In the case of children under the age of 14, their legal guardians have the right to view or modify the child's personal information, as well as the right to withdraw consent for collection and use. At this time, the minimum personal information of the legal representative can be collected from the child.
1) The personal information provided when applying for a job can be freely viewed, modified, and deleted after identity verification (real name verification) until the end of the recruitment process.
2) After the completion of the recruitment process, it is not possible to modify or delete the information. However, if the applicant wishes, they can request deletion by contacting the customer center on the ESTsoft website or the personal information protection grievance department. The company processes the deleted personal information as specified in the "Personal Information Collection, Processing, and Retention Period" by the company, and ensures that it cannot be accessed or used for any other purpose.
3) Users must not infringe on their own or others' personal information and privacy, which is being processed according to this personal information processing policy, in violation of the Personal Information Protection Act and other relevant laws.
4) In the case of children under the age of 14, their legal guardians have the right to view or modify the child's personal information, as well as the right to withdraw consent for collection and use. At this time, the minimum personal information of the legal representative can be collected from the child.
1) The personal information provided when applying for a job can be freely viewed, modified, and deleted after identity verification (real name verification) until the end of the recruitment process.
2) After the completion of the recruitment process, it is not possible to modify or delete the information. However, if the applicant wishes, they can request deletion by contacting the customer center on the ESTsoft website or the personal information protection grievance department. The company processes the deleted personal information as specified in the "Personal Information Collection, Processing, and Retention Period" by the company, and ensures that it cannot be accessed or used for any other purpose.
3) Users must not infringe on their own or others' personal information and privacy, which is being processed according to this personal information processing policy, in violation of the Personal Information Protection Act and other relevant laws.
4) In the case of children under the age of 14, their legal guardians have the right to view or modify the child's personal information, as well as the right to withdraw consent for collection and use. At this time, the minimum personal information of the legal representative can be collected from the child.
8 Technical/Administrative Protective Measures for Personal Information
1) The company takes technical/administrative measures like the following in order to ensure that applicants' personal information is not lost, stolen, leaked, altered, or damaged during the processing of personal information.
2) Encryption of Passwords
- The password set during the application to the company is encrypted and stored and managed, such that only the individual is aware of it, and the confirmation and modification of personal information are also possible by the individual who knows the password.
3) Measures against hacking
- The company is doing its best to prevent the leakage or damage of applicants' personal information due to hacking or computer viruses. In anticipation of damage to personal information, data is backed up from time to time, and the latest antivirus programs are utilized to prevent any leakage or damage to the applicants' personal information and data. Additionally, encrypted communication is used to securely transmit personal information over the network. The company is also using an intrusion prevention system to control unauthorized access from outside and is striving to equip all possible technical devices to secure system security.
4) Minimizing and training of staff handling personal information
- The company’s staff responsible for processing personal information is restricted to designated personnel, who are given separate passwords that are regularly renewed. Periodic training is conducted for the staff, emphasizing the protection of applicants' personal information.
5) Operation of a dedicated personal information protection organization
- Through organizations such as the company's dedicated personal information protection unit, the company is working to ensure compliance with its personal information processing policies and to verify compliance by relevant staff members. The company aims to immediately correct and address any discovered issues. However, the company bears no responsibility whatsoever for problems arising from the user's negligence or internet problems that lead to the leakage of personal information, such as passwords or social security numbers.
1) The company takes technical/administrative measures like the following in order to ensure that applicants' personal information is not lost, stolen, leaked, altered, or damaged during the processing of personal information.
2) Encryption of Passwords
- The password set during the application to the company is encrypted and stored and managed, such that only the individual is aware of it, and the confirmation and modification of personal information are also possible by the individual who knows the password.
3) Measures against hacking
- The company is doing its best to prevent the leakage or damage of applicants' personal information due to hacking or computer viruses. In anticipation of damage to personal information, data is backed up from time to time, and the latest antivirus programs are utilized to prevent any leakage or damage to the applicants' personal information and data. Additionally, encrypted communication is used to securely transmit personal information over the network. The company is also using an intrusion prevention system to control unauthorized access from outside and is striving to equip all possible technical devices to secure system security.
4) Minimizing and training of staff handling personal information
- The company’s staff responsible for processing personal information is restricted to designated personnel, who are given separate passwords that are regularly renewed. Periodic training is conducted for the staff, emphasizing the protection of applicants' personal information.
5) Operation of a dedicated personal information protection organization
- Through organizations such as the company's dedicated personal information protection unit, the company is working to ensure compliance with its personal information processing policies and to verify compliance by relevant staff members. The company aims to immediately correct and address any discovered issues. However, the company bears no responsibility whatsoever for problems arising from the user's negligence or internet problems that lead to the leakage of personal information, such as passwords or social security numbers.
1) The company takes technical/administrative measures like the following in order to ensure that applicants' personal information is not lost, stolen, leaked, altered, or damaged during the processing of personal information.
2) Encryption of Passwords
- The password set during the application to the company is encrypted and stored and managed, such that only the individual is aware of it, and the confirmation and modification of personal information are also possible by the individual who knows the password.
3) Measures against hacking
- The company is doing its best to prevent the leakage or damage of applicants' personal information due to hacking or computer viruses. In anticipation of damage to personal information, data is backed up from time to time, and the latest antivirus programs are utilized to prevent any leakage or damage to the applicants' personal information and data. Additionally, encrypted communication is used to securely transmit personal information over the network. The company is also using an intrusion prevention system to control unauthorized access from outside and is striving to equip all possible technical devices to secure system security.
4) Minimizing and training of staff handling personal information
- The company’s staff responsible for processing personal information is restricted to designated personnel, who are given separate passwords that are regularly renewed. Periodic training is conducted for the staff, emphasizing the protection of applicants' personal information.
5) Operation of a dedicated personal information protection organization
- Through organizations such as the company's dedicated personal information protection unit, the company is working to ensure compliance with its personal information processing policies and to verify compliance by relevant staff members. The company aims to immediately correct and address any discovered issues. However, the company bears no responsibility whatsoever for problems arising from the user's negligence or internet problems that lead to the leakage of personal information, such as passwords or social security numbers.
1) The company takes technical/administrative measures like the following in order to ensure that applicants' personal information is not lost, stolen, leaked, altered, or damaged during the processing of personal information.
2) Encryption of Passwords
- The password set during the application to the company is encrypted and stored and managed, such that only the individual is aware of it, and the confirmation and modification of personal information are also possible by the individual who knows the password.
3) Measures against hacking
- The company is doing its best to prevent the leakage or damage of applicants' personal information due to hacking or computer viruses. In anticipation of damage to personal information, data is backed up from time to time, and the latest antivirus programs are utilized to prevent any leakage or damage to the applicants' personal information and data. Additionally, encrypted communication is used to securely transmit personal information over the network. The company is also using an intrusion prevention system to control unauthorized access from outside and is striving to equip all possible technical devices to secure system security.
4) Minimizing and training of staff handling personal information
- The company’s staff responsible for processing personal information is restricted to designated personnel, who are given separate passwords that are regularly renewed. Periodic training is conducted for the staff, emphasizing the protection of applicants' personal information.
5) Operation of a dedicated personal information protection organization
- Through organizations such as the company's dedicated personal information protection unit, the company is working to ensure compliance with its personal information processing policies and to verify compliance by relevant staff members. The company aims to immediately correct and address any discovered issues. However, the company bears no responsibility whatsoever for problems arising from the user's negligence or internet problems that lead to the leakage of personal information, such as passwords or social security numbers.
9 Information on the installation and operation of devices that automatically collect personal information such as internet access files, and matters regarding their rejection
'The company' uses cookies to provide personalized services to users.
Cookies are small data files sent to the user's browser from the HTTP server and stored on the user's device. Cookies may contain information about the website used and the user's personal information, and this information is shared with the server.
Users can allow all cookies, go through confirmation whenever a cookie is saved, or deny all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] in the web browser options (based on IE).
'The company' uses cookies to provide personalized services to users.
Cookies are small data files sent to the user's browser from the HTTP server and stored on the user's device. Cookies may contain information about the website used and the user's personal information, and this information is shared with the server.
Users can allow all cookies, go through confirmation whenever a cookie is saved, or deny all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] in the web browser options (based on IE).
'The company' uses cookies to provide personalized services to users.
Cookies are small data files sent to the user's browser from the HTTP server and stored on the user's device. Cookies may contain information about the website used and the user's personal information, and this information is shared with the server.
Users can allow all cookies, go through confirmation whenever a cookie is saved, or deny all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] in the web browser options (based on IE).
'The company' uses cookies to provide personalized services to users.
Cookies are small data files sent to the user's browser from the HTTP server and stored on the user's device. Cookies may contain information about the website used and the user's personal information, and this information is shared with the server.
Users can allow all cookies, go through confirmation whenever a cookie is saved, or deny all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] in the web browser options (based on IE).
Guide to Personal Information Protection Officers and Related Work Departments
1) You can report any privacy-related complaints that occur during the process of using the company's online job application to the personal information protection officer or the department in charge. The company will provide prompt and sufficient answers to the reports of the users.
2) Personal information protection officer and department in charge of personal information protection duties
- Personal Information Protection Officer: Head of IT Planning Department
- Department in Charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com
3) If you have any inquiries related to personal information for recruitment, please contact the department below.
- Department in Charge: People Partner Team
- Email: recruit@estsoft.com
4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency Personal Information Violation Center, etc. to receive remedies for personal information infringement. For other reports and consultations on personal information infringement, please contact the following institutions:
- Personal Information Infringement Report Center (Operated by Korea Internet & Security Agency) (https://privacy.kisa.or.kr / Dial 118 without area code)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / Dial 1301 without area code)
- Korean National Police Agency Cyber Safety Bureau (http://cyberbureau.police.go.kr / Dial 182 without area code)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)
1) You can report any privacy-related complaints that occur during the process of using the company's online job application to the personal information protection officer or the department in charge. The company will provide prompt and sufficient answers to the reports of the users.
2) Personal information protection officer and department in charge of personal information protection duties
- Personal Information Protection Officer: Head of IT Planning Department
- Department in Charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com
3) If you have any inquiries related to personal information for recruitment, please contact the department below.
- Department in Charge: People Partner Team
- Email: recruit@estsoft.com
4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency Personal Information Violation Center, etc. to receive remedies for personal information infringement. For other reports and consultations on personal information infringement, please contact the following institutions:
- Personal Information Infringement Report Center (Operated by Korea Internet & Security Agency) (https://privacy.kisa.or.kr / Dial 118 without area code)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / Dial 1301 without area code)
- Korean National Police Agency Cyber Safety Bureau (http://cyberbureau.police.go.kr / Dial 182 without area code)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)
1) You can report any privacy-related complaints that occur during the process of using the company's online job application to the personal information protection officer or the department in charge. The company will provide prompt and sufficient answers to the reports of the users.
2) Personal information protection officer and department in charge of personal information protection duties
- Personal Information Protection Officer: Head of IT Planning Department
- Department in Charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com
3) If you have any inquiries related to personal information for recruitment, please contact the department below.
- Department in Charge: People Partner Team
- Email: recruit@estsoft.com
4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency Personal Information Violation Center, etc. to receive remedies for personal information infringement. For other reports and consultations on personal information infringement, please contact the following institutions:
- Personal Information Infringement Report Center (Operated by Korea Internet & Security Agency) (https://privacy.kisa.or.kr / Dial 118 without area code)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / Dial 1301 without area code)
- Korean National Police Agency Cyber Safety Bureau (http://cyberbureau.police.go.kr / Dial 182 without area code)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)
1) You can report any privacy-related complaints that occur during the process of using the company's online job application to the personal information protection officer or the department in charge. The company will provide prompt and sufficient answers to the reports of the users.
2) Personal information protection officer and department in charge of personal information protection duties
- Personal Information Protection Officer: Head of IT Planning Department
- Department in Charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com
3) If you have any inquiries related to personal information for recruitment, please contact the department below.
- Department in Charge: People Partner Team
- Email: recruit@estsoft.com
4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency Personal Information Violation Center, etc. to receive remedies for personal information infringement. For other reports and consultations on personal information infringement, please contact the following institutions:
- Personal Information Infringement Report Center (Operated by Korea Internet & Security Agency) (https://privacy.kisa.or.kr / Dial 118 without area code)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / Dial 1301 without area code)
- Korean National Police Agency Cyber Safety Bureau (http://cyberbureau.police.go.kr / Dial 182 without area code)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)
The Duties of the 11th High Ground
1) In case of addition, deletion, or modification of the contents of the current Privacy Policy, we will notify you through the 'Notice' section on the homepage at least 7 days prior to the amendment. However, in the case of significant changes affecting user rights such as collection and use of personal information and provision to third parties, we will notify at least 30 days in advance.
2) Announcement Date: August 13, 2021
3) Implementation Date: August 20, 2021
1) In case of addition, deletion, or modification of the contents of the current Privacy Policy, we will notify you through the 'Notice' section on the homepage at least 7 days prior to the amendment. However, in the case of significant changes affecting user rights such as collection and use of personal information and provision to third parties, we will notify at least 30 days in advance.
2) Announcement Date: August 13, 2021
3) Implementation Date: August 20, 2021
1) In case of addition, deletion, or modification of the contents of the current Privacy Policy, we will notify you through the 'Notice' section on the homepage at least 7 days prior to the amendment. However, in the case of significant changes affecting user rights such as collection and use of personal information and provision to third parties, we will notify at least 30 days in advance.
2) Announcement Date: August 13, 2021
3) Implementation Date: August 20, 2021
1) In case of addition, deletion, or modification of the contents of the current Privacy Policy, we will notify you through the 'Notice' section on the homepage at least 7 days prior to the amendment. However, in the case of significant changes affecting user rights such as collection and use of personal information and provision to third parties, we will notify at least 30 days in advance.
2) Announcement Date: August 13, 2021
3) Implementation Date: August 20, 2021