개인 정보 처리 방침

2022.09.22

2022.09.22

2022.09.22

※ This policy will be implemented from September 22, 2022.

'ESTsoft' (hereinafter referred to as 'the Company') values the personal information of job applicants and complies with the laws related to the 'Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants how their personal information is being used through the personal information processing policy, and what measures are being taken to protect personal information. Should there be any changes to the personal information processing policy, the Company will announce them through the homepage notice. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.

'ESTsoft' (hereinafter referred to as 'the Company') values the personal information of job applicants and complies with the laws related to the 'Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants how their personal information is being used through the personal information processing policy, and what measures are being taken to protect personal information. Should there be any changes to the personal information processing policy, the Company will announce them through the homepage notice. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.

'ESTsoft' (hereinafter referred to as 'the Company') values the personal information of job applicants and complies with the laws related to the 'Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants how their personal information is being used through the personal information processing policy, and what measures are being taken to protect personal information. Should there be any changes to the personal information processing policy, the Company will announce them through the homepage notice. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.

'ESTsoft' (hereinafter referred to as 'the Company') values the personal information of job applicants and complies with the laws related to the 'Promotion of Information and Communications Network Utilization and Information Protection'. The Company informs applicants how their personal information is being used through the personal information processing policy, and what measures are being taken to protect personal information. Should there be any changes to the personal information processing policy, the Company will announce them through the homepage notice. If you have any questions about the changes, you can visit the ESTsoft website at any time to check.

1. Personal information items processed

The company allows you to apply for a job without a separate membership registration process, and collects the following personal information through the website to provide opportunities for job applications. 1) Scope of personal information collected at the time of job application - Required information: Name, Phone number, Email - Optional information: Date of birth, Address, Cover letter, Resume, Educational background, Photo, Video, License information, Work experience, Gender, Nationality, Veterans affairs, Disability matters (for preferential hiring in accordance with the law on employment of the disabled), Portfolio, Career description, Field of application, Desired salary, Previous salary, Referrer, Application route, Other unstructured information entered directly by the person or uploaded through an attachment that may identify an individual 2) Scope of personal information collected when using the inquiry service - Required information: Email

The company allows you to apply for a job without a separate membership registration process, and collects the following personal information through the website to provide opportunities for job applications. 1) Scope of personal information collected at the time of job application - Required information: Name, Phone number, Email - Optional information: Date of birth, Address, Cover letter, Resume, Educational background, Photo, Video, License information, Work experience, Gender, Nationality, Veterans affairs, Disability matters (for preferential hiring in accordance with the law on employment of the disabled), Portfolio, Career description, Field of application, Desired salary, Previous salary, Referrer, Application route, Other unstructured information entered directly by the person or uploaded through an attachment that may identify an individual 2) Scope of personal information collected when using the inquiry service - Required information: Email

The company allows you to apply for a job without a separate membership registration process, and collects the following personal information through the website to provide opportunities for job applications. 1) Scope of personal information collected at the time of job application - Required information: Name, Phone number, Email - Optional information: Date of birth, Address, Cover letter, Resume, Educational background, Photo, Video, License information, Work experience, Gender, Nationality, Veterans affairs, Disability matters (for preferential hiring in accordance with the law on employment of the disabled), Portfolio, Career description, Field of application, Desired salary, Previous salary, Referrer, Application route, Other unstructured information entered directly by the person or uploaded through an attachment that may identify an individual 2) Scope of personal information collected when using the inquiry service - Required information: Email

The company allows you to apply for a job without a separate membership registration process, and collects the following personal information through the website to provide opportunities for job applications. 1) Scope of personal information collected at the time of job application - Required information: Name, Phone number, Email - Optional information: Date of birth, Address, Cover letter, Resume, Educational background, Photo, Video, License information, Work experience, Gender, Nationality, Veterans affairs, Disability matters (for preferential hiring in accordance with the law on employment of the disabled), Portfolio, Career description, Field of application, Desired salary, Previous salary, Referrer, Application route, Other unstructured information entered directly by the person or uploaded through an attachment that may identify an individual 2) Scope of personal information collected when using the inquiry service - Required information: Email

2. Purpose of Personal Information Processing

1) Confirmation of personal identification for job application, confirmation of qualifications, checking the recruitment status, modification of job application form, delivery of notices, response to inquiries, etc., securing a smooth communication path with applicants, management of future possible resources

1) Confirmation of personal identification for job application, confirmation of qualifications, checking the recruitment status, modification of job application form, delivery of notices, response to inquiries, etc., securing a smooth communication path with applicants, management of future possible resources

1) Confirmation of personal identification for job application, confirmation of qualifications, checking the recruitment status, modification of job application form, delivery of notices, response to inquiries, etc., securing a smooth communication path with applicants, management of future possible resources

1) Confirmation of personal identification for job application, confirmation of qualifications, checking the recruitment status, modification of job application form, delivery of notices, response to inquiries, etc., securing a smooth communication path with applicants, management of future possible resources

3. Provision of Personal Information to Third Parties

1) The company fundamentally does not use personal information beyond the scope of the purposes of collection and use as notified in Article 2, nor do they provide it to third parties. However, the following cases are exceptions: - When applicants have agreed in advance to disclosure - When it is in good faith considered required by law (e.g., when there is a legitimate request from a government/law enforcement agency according to related laws)

2) Even in exceptional circumstances, if information is provided according to related laws or upon the request of enforcement agencies, it is a principle to notify the individual concerned. However, there may be cases where it is impossible to give notice due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original purpose of collection and use.

3) Moreover, the company does not entrust the applicant's information to external companies without the consent of the applicant. Should the need arise in the future, we will notify the applicant about the entrusted party and the contents of the entrusted work and, if necessary, obtain prior consent.

4) Occasionally, job applicants may be offered a position in companies that have a special relationship with the company (subsidiaries, affiliates), and in such cases, we will always contact the applicants individually to undergo consent procedures before transferring the application to the relevant company.

1) The company fundamentally does not use personal information beyond the scope of the purposes of collection and use as notified in Article 2, nor do they provide it to third parties. However, the following cases are exceptions: - When applicants have agreed in advance to disclosure - When it is in good faith considered required by law (e.g., when there is a legitimate request from a government/law enforcement agency according to related laws)

2) Even in exceptional circumstances, if information is provided according to related laws or upon the request of enforcement agencies, it is a principle to notify the individual concerned. However, there may be cases where it is impossible to give notice due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original purpose of collection and use.

3) Moreover, the company does not entrust the applicant's information to external companies without the consent of the applicant. Should the need arise in the future, we will notify the applicant about the entrusted party and the contents of the entrusted work and, if necessary, obtain prior consent.

4) Occasionally, job applicants may be offered a position in companies that have a special relationship with the company (subsidiaries, affiliates), and in such cases, we will always contact the applicants individually to undergo consent procedures before transferring the application to the relevant company.

1) The company fundamentally does not use personal information beyond the scope of the purposes of collection and use as notified in Article 2, nor do they provide it to third parties. However, the following cases are exceptions: - When applicants have agreed in advance to disclosure - When it is in good faith considered required by law (e.g., when there is a legitimate request from a government/law enforcement agency according to related laws)

2) Even in exceptional circumstances, if information is provided according to related laws or upon the request of enforcement agencies, it is a principle to notify the individual concerned. However, there may be cases where it is impossible to give notice due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original purpose of collection and use.

3) Moreover, the company does not entrust the applicant's information to external companies without the consent of the applicant. Should the need arise in the future, we will notify the applicant about the entrusted party and the contents of the entrusted work and, if necessary, obtain prior consent.

4) Occasionally, job applicants may be offered a position in companies that have a special relationship with the company (subsidiaries, affiliates), and in such cases, we will always contact the applicants individually to undergo consent procedures before transferring the application to the relevant company.

1) The company fundamentally does not use personal information beyond the scope of the purposes of collection and use as notified in Article 2, nor do they provide it to third parties. However, the following cases are exceptions: - When applicants have agreed in advance to disclosure - When it is in good faith considered required by law (e.g., when there is a legitimate request from a government/law enforcement agency according to related laws)

2) Even in exceptional circumstances, if information is provided according to related laws or upon the request of enforcement agencies, it is a principle to notify the individual concerned. However, there may be cases where it is impossible to give notice due to legal grounds. We will ensure that information is not indiscriminately provided contrary to the original purpose of collection and use.

3) Moreover, the company does not entrust the applicant's information to external companies without the consent of the applicant. Should the need arise in the future, we will notify the applicant about the entrusted party and the contents of the entrusted work and, if necessary, obtain prior consent.

4) Occasionally, job applicants may be offered a position in companies that have a special relationship with the company (subsidiaries, affiliates), and in such cases, we will always contact the applicants individually to undergo consent procedures before transferring the application to the relevant company.

4. Personal Information Processing Consignment

To provide enhanced services, your personal information may be entrusted to and processed by external agencies.
If personal information is to be entrusted for processing, we will notify you in advance.
The contractors for the processing of personal information and their details are as follows.
· Trustee: Doodlin Co., Ltd.
· Scope of entrustment: Operation of the recruitment website and computerized recruitment management system and related civil complaints handling
· Shared information: Personal information on the job application form
· Retention and usage period of shared information: Until the job application form is deleted by the hiring company or the entrustment contract ends

To provide enhanced services, your personal information may be entrusted to and processed by external agencies.
If personal information is to be entrusted for processing, we will notify you in advance.
The contractors for the processing of personal information and their details are as follows.
· Trustee: Doodlin Co., Ltd.
· Scope of entrustment: Operation of the recruitment website and computerized recruitment management system and related civil complaints handling
· Shared information: Personal information on the job application form
· Retention and usage period of shared information: Until the job application form is deleted by the hiring company or the entrustment contract ends

To provide enhanced services, your personal information may be entrusted to and processed by external agencies.
If personal information is to be entrusted for processing, we will notify you in advance.
The contractors for the processing of personal information and their details are as follows.
· Trustee: Doodlin Co., Ltd.
· Scope of entrustment: Operation of the recruitment website and computerized recruitment management system and related civil complaints handling
· Shared information: Personal information on the job application form
· Retention and usage period of shared information: Until the job application form is deleted by the hiring company or the entrustment contract ends

To provide enhanced services, your personal information may be entrusted to and processed by external agencies.
If personal information is to be entrusted for processing, we will notify you in advance.
The contractors for the processing of personal information and their details are as follows.
· Trustee: Doodlin Co., Ltd.
· Scope of entrustment: Operation of the recruitment website and computerized recruitment management system and related civil complaints handling
· Shared information: Personal information on the job application form
· Retention and usage period of shared information: Until the job application form is deleted by the hiring company or the entrustment contract ends

5. Processing and Retention Period of Personal Information

1) As a principle, personal information is immediately destroyed after the purpose of its collection and use has been achieved. However, personal information may be retained for a certain period as agreed upon when collection occurred, and as stipulated by other related laws. If an applicant withdraws consent to provide personal information, the relevant personal information will be immediately deleted.

1) As a principle, personal information is immediately destroyed after the purpose of its collection and use has been achieved. However, personal information may be retained for a certain period as agreed upon when collection occurred, and as stipulated by other related laws. If an applicant withdraws consent to provide personal information, the relevant personal information will be immediately deleted.

1) As a principle, personal information is immediately destroyed after the purpose of its collection and use has been achieved. However, personal information may be retained for a certain period as agreed upon when collection occurred, and as stipulated by other related laws. If an applicant withdraws consent to provide personal information, the relevant personal information will be immediately deleted.

1) As a principle, personal information is immediately destroyed after the purpose of its collection and use has been achieved. However, personal information may be retained for a certain period as agreed upon when collection occurred, and as stipulated by other related laws. If an applicant withdraws consent to provide personal information, the relevant personal information will be immediately deleted.

6. Personal Information Destruction Procedure and Method

1) The personal information of job applicants will, in principle, be destroyed without delay once the purpose of processing the personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction Procedure - Information entered by users for job applications is transferred to a separate DB (or a separate file in the case of paper) after its purpose has been achieved, and then stored for a certain period according to internal policies and other relevant laws and regulations (see retention and usage period) before being destroyed. - Such personal information will not be used for any other purpose than retention unless required by law.
3) Method of Destruction - Personal information printed on paper is destroyed either by shredding or burning. - Personal information stored in electronic file format is deleted using technical methods that prevent the records from being restored.

1) The personal information of job applicants will, in principle, be destroyed without delay once the purpose of processing the personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction Procedure - Information entered by users for job applications is transferred to a separate DB (or a separate file in the case of paper) after its purpose has been achieved, and then stored for a certain period according to internal policies and other relevant laws and regulations (see retention and usage period) before being destroyed. - Such personal information will not be used for any other purpose than retention unless required by law.
3) Method of Destruction - Personal information printed on paper is destroyed either by shredding or burning. - Personal information stored in electronic file format is deleted using technical methods that prevent the records from being restored.

1) The personal information of job applicants will, in principle, be destroyed without delay once the purpose of processing the personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction Procedure - Information entered by users for job applications is transferred to a separate DB (or a separate file in the case of paper) after its purpose has been achieved, and then stored for a certain period according to internal policies and other relevant laws and regulations (see retention and usage period) before being destroyed. - Such personal information will not be used for any other purpose than retention unless required by law.
3) Method of Destruction - Personal information printed on paper is destroyed either by shredding or burning. - Personal information stored in electronic file format is deleted using technical methods that prevent the records from being restored.

1) The personal information of job applicants will, in principle, be destroyed without delay once the purpose of processing the personal information has been achieved. The company's personal information destruction procedure and method are as follows.
2) Destruction Procedure - Information entered by users for job applications is transferred to a separate DB (or a separate file in the case of paper) after its purpose has been achieved, and then stored for a certain period according to internal policies and other relevant laws and regulations (see retention and usage period) before being destroyed. - Such personal information will not be used for any other purpose than retention unless required by law.
3) Method of Destruction - Personal information printed on paper is destroyed either by shredding or burning. - Personal information stored in electronic file format is deleted using technical methods that prevent the records from being restored.

7. User rights, obligations, and their exercise method

1) Personal information provided when applying for a job at the company can be viewed, modified, and deleted freely after identity verification (real-name verification) until the recruitment process is completed.
2) After the completion of the hiring process, modifications and deletions are not possible. However, if the applicant wishes, they can request deletion by contacting the customer service center or the personal information protection grievance department on the ESTsoft website, and we are deleting it. The company processes the personal information that has been deleted at the request of the applicant according to what is specified in "The Processing and Retention Period of Personal Information Collected by the Company", and ensures that it is not accessed or used for any other purpose.
3) Users must not violate the Personal Information Protection Act and related laws, infringing on their own or others' personal information and privacy in accordance with this personal information processing policy.
4) In the case of children under the age of 14, legal guardians have the right to inquire or modify the child's personal information, and withdraw consent for the collection and use of the information. At this time, the minimum personal information of the legal guardian can be collected from the respective child.

1) Personal information provided when applying for a job at the company can be viewed, modified, and deleted freely after identity verification (real-name verification) until the recruitment process is completed.
2) After the completion of the hiring process, modifications and deletions are not possible. However, if the applicant wishes, they can request deletion by contacting the customer service center or the personal information protection grievance department on the ESTsoft website, and we are deleting it. The company processes the personal information that has been deleted at the request of the applicant according to what is specified in "The Processing and Retention Period of Personal Information Collected by the Company", and ensures that it is not accessed or used for any other purpose.
3) Users must not violate the Personal Information Protection Act and related laws, infringing on their own or others' personal information and privacy in accordance with this personal information processing policy.
4) In the case of children under the age of 14, legal guardians have the right to inquire or modify the child's personal information, and withdraw consent for the collection and use of the information. At this time, the minimum personal information of the legal guardian can be collected from the respective child.

1) Personal information provided when applying for a job at the company can be viewed, modified, and deleted freely after identity verification (real-name verification) until the recruitment process is completed.
2) After the completion of the hiring process, modifications and deletions are not possible. However, if the applicant wishes, they can request deletion by contacting the customer service center or the personal information protection grievance department on the ESTsoft website, and we are deleting it. The company processes the personal information that has been deleted at the request of the applicant according to what is specified in "The Processing and Retention Period of Personal Information Collected by the Company", and ensures that it is not accessed or used for any other purpose.
3) Users must not violate the Personal Information Protection Act and related laws, infringing on their own or others' personal information and privacy in accordance with this personal information processing policy.
4) In the case of children under the age of 14, legal guardians have the right to inquire or modify the child's personal information, and withdraw consent for the collection and use of the information. At this time, the minimum personal information of the legal guardian can be collected from the respective child.

1) Personal information provided when applying for a job at the company can be viewed, modified, and deleted freely after identity verification (real-name verification) until the recruitment process is completed.
2) After the completion of the hiring process, modifications and deletions are not possible. However, if the applicant wishes, they can request deletion by contacting the customer service center or the personal information protection grievance department on the ESTsoft website, and we are deleting it. The company processes the personal information that has been deleted at the request of the applicant according to what is specified in "The Processing and Retention Period of Personal Information Collected by the Company", and ensures that it is not accessed or used for any other purpose.
3) Users must not violate the Personal Information Protection Act and related laws, infringing on their own or others' personal information and privacy in accordance with this personal information processing policy.
4) In the case of children under the age of 14, legal guardians have the right to inquire or modify the child's personal information, and withdraw consent for the collection and use of the information. At this time, the minimum personal information of the legal guardian can be collected from the respective child.

8. Technical/Administrative Protection Measures for Personal Information

1) The company has devised the following technical/administrative measures to ensure the safety of applicants' personal information so that it is not lost, stolen, leaked, tampered with, or damaged.
2) Password Encryption - The password set during the company's job application is encrypted and stored and managed so that only the person knows it, and it is possible for the person who knows the password to check and change personal information.
3) Countermeasures against hacking, etc. - The company does its best to prevent applicants' personal information from being leaked or damaged by hacking or computer viruses. In preparation for damage to personal information, data is regularly backed up, and the latest antivirus programs are used to prevent applicants' personal information or data from being leaked or damaged, and encrypted communication is used to safely transmit personal information over the network. In addition, an intrusion prevention system is used to control unauthorized access from outside, and the company is striving to equip all possible technical devices to ensure security systematically.
4) Minimizing and training personal information processing employees - The company’s personal information-related processing employees are limited to the person in charge, and a separate password is assigned and regularly renewed for this, and ad hoc training is conducted, emphasizing the protection of applicants' personal information.
5) Operation of a personal information protection dedicated organization - Through in-house personal information protection organizations, the company strives to immediately correct and rectify problems by checking the implementation of the company's personal information processing policies and compliance of the person in charge. However, the company is not responsible for any problems that may occur due to the user's own negligence or problems on the Internet, such as leakage of personal information such as passwords and social security numbers.

1) The company has devised the following technical/administrative measures to ensure the safety of applicants' personal information so that it is not lost, stolen, leaked, tampered with, or damaged.
2) Password Encryption - The password set during the company's job application is encrypted and stored and managed so that only the person knows it, and it is possible for the person who knows the password to check and change personal information.
3) Countermeasures against hacking, etc. - The company does its best to prevent applicants' personal information from being leaked or damaged by hacking or computer viruses. In preparation for damage to personal information, data is regularly backed up, and the latest antivirus programs are used to prevent applicants' personal information or data from being leaked or damaged, and encrypted communication is used to safely transmit personal information over the network. In addition, an intrusion prevention system is used to control unauthorized access from outside, and the company is striving to equip all possible technical devices to ensure security systematically.
4) Minimizing and training personal information processing employees - The company’s personal information-related processing employees are limited to the person in charge, and a separate password is assigned and regularly renewed for this, and ad hoc training is conducted, emphasizing the protection of applicants' personal information.
5) Operation of a personal information protection dedicated organization - Through in-house personal information protection organizations, the company strives to immediately correct and rectify problems by checking the implementation of the company's personal information processing policies and compliance of the person in charge. However, the company is not responsible for any problems that may occur due to the user's own negligence or problems on the Internet, such as leakage of personal information such as passwords and social security numbers.

1) The company has devised the following technical/administrative measures to ensure the safety of applicants' personal information so that it is not lost, stolen, leaked, tampered with, or damaged.
2) Password Encryption - The password set during the company's job application is encrypted and stored and managed so that only the person knows it, and it is possible for the person who knows the password to check and change personal information.
3) Countermeasures against hacking, etc. - The company does its best to prevent applicants' personal information from being leaked or damaged by hacking or computer viruses. In preparation for damage to personal information, data is regularly backed up, and the latest antivirus programs are used to prevent applicants' personal information or data from being leaked or damaged, and encrypted communication is used to safely transmit personal information over the network. In addition, an intrusion prevention system is used to control unauthorized access from outside, and the company is striving to equip all possible technical devices to ensure security systematically.
4) Minimizing and training personal information processing employees - The company’s personal information-related processing employees are limited to the person in charge, and a separate password is assigned and regularly renewed for this, and ad hoc training is conducted, emphasizing the protection of applicants' personal information.
5) Operation of a personal information protection dedicated organization - Through in-house personal information protection organizations, the company strives to immediately correct and rectify problems by checking the implementation of the company's personal information processing policies and compliance of the person in charge. However, the company is not responsible for any problems that may occur due to the user's own negligence or problems on the Internet, such as leakage of personal information such as passwords and social security numbers.

1) The company has devised the following technical/administrative measures to ensure the safety of applicants' personal information so that it is not lost, stolen, leaked, tampered with, or damaged.
2) Password Encryption - The password set during the company's job application is encrypted and stored and managed so that only the person knows it, and it is possible for the person who knows the password to check and change personal information.
3) Countermeasures against hacking, etc. - The company does its best to prevent applicants' personal information from being leaked or damaged by hacking or computer viruses. In preparation for damage to personal information, data is regularly backed up, and the latest antivirus programs are used to prevent applicants' personal information or data from being leaked or damaged, and encrypted communication is used to safely transmit personal information over the network. In addition, an intrusion prevention system is used to control unauthorized access from outside, and the company is striving to equip all possible technical devices to ensure security systematically.
4) Minimizing and training personal information processing employees - The company’s personal information-related processing employees are limited to the person in charge, and a separate password is assigned and regularly renewed for this, and ad hoc training is conducted, emphasizing the protection of applicants' personal information.
5) Operation of a personal information protection dedicated organization - Through in-house personal information protection organizations, the company strives to immediately correct and rectify problems by checking the implementation of the company's personal information processing policies and compliance of the person in charge. However, the company is not responsible for any problems that may occur due to the user's own negligence or problems on the Internet, such as leakage of personal information such as passwords and social security numbers.

9. Matters related to the installation and operation of devices that automatically collect personal information such as internet access information files, and the rejection thereof

'The company' uses cookies to provide personalized services to users. Cookies are small data files sent from an HTTP server to the user's browser and are stored on the user's device. Cookies may contain information about the websites used and the user's personal information, which may be shared with the server. Users can choose to allow all cookies, to be checked each time cookies are saved, or to refuse the storage of all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] based on web browser options (IE standard).

'The company' uses cookies to provide personalized services to users. Cookies are small data files sent from an HTTP server to the user's browser and are stored on the user's device. Cookies may contain information about the websites used and the user's personal information, which may be shared with the server. Users can choose to allow all cookies, to be checked each time cookies are saved, or to refuse the storage of all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] based on web browser options (IE standard).

'The company' uses cookies to provide personalized services to users. Cookies are small data files sent from an HTTP server to the user's browser and are stored on the user's device. Cookies may contain information about the websites used and the user's personal information, which may be shared with the server. Users can choose to allow all cookies, to be checked each time cookies are saved, or to refuse the storage of all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] based on web browser options (IE standard).

'The company' uses cookies to provide personalized services to users. Cookies are small data files sent from an HTTP server to the user's browser and are stored on the user's device. Cookies may contain information about the websites used and the user's personal information, which may be shared with the server. Users can choose to allow all cookies, to be checked each time cookies are saved, or to refuse the storage of all cookies by selecting [Tools] > [Internet Options] > [Security] > [Custom Level] based on web browser options (IE standard).

10. Privacy Officer and Guidance for Related Departments

1) You can report any complaints related to personal information protection that arise from using the company's online job application process to the person in charge of personal information protection or the relevant department. The company will provide prompt and adequate responses to the reports of the users.

2) Personal Information Protection Officer and Department in charge of Personal Information Protection Work
- Personal Information Protection Officer: Head of IT Planning Office
- Department in charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com

3) If you have any inquiries related to personal information regarding recruitment, please contact the department below.
- Department in charge: People Partner Team
- Email: recruit@estsoft.com

4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency's Personal Information Infringement Center, and other related organizations to seek remedy from personal information infringement. For reports and consultations on other personal information infringements, please inquire at the following organizations.
- Personal Information Infringement Report Center (operated by the Korea Internet & Security Agency) (https://privacy.kisa.or.kr / direct 118)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / direct 1301)
- National Police Agency Cyber Security Bureau (http://cyberbureau.police.go.kr / direct 182)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)

1) You can report any complaints related to personal information protection that arise from using the company's online job application process to the person in charge of personal information protection or the relevant department. The company will provide prompt and adequate responses to the reports of the users.

2) Personal Information Protection Officer and Department in charge of Personal Information Protection Work
- Personal Information Protection Officer: Head of IT Planning Office
- Department in charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com

3) If you have any inquiries related to personal information regarding recruitment, please contact the department below.
- Department in charge: People Partner Team
- Email: recruit@estsoft.com

4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency's Personal Information Infringement Center, and other related organizations to seek remedy from personal information infringement. For reports and consultations on other personal information infringements, please inquire at the following organizations.
- Personal Information Infringement Report Center (operated by the Korea Internet & Security Agency) (https://privacy.kisa.or.kr / direct 118)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / direct 1301)
- National Police Agency Cyber Security Bureau (http://cyberbureau.police.go.kr / direct 182)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)

1) You can report any complaints related to personal information protection that arise from using the company's online job application process to the person in charge of personal information protection or the relevant department. The company will provide prompt and adequate responses to the reports of the users.

2) Personal Information Protection Officer and Department in charge of Personal Information Protection Work
- Personal Information Protection Officer: Head of IT Planning Office
- Department in charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com

3) If you have any inquiries related to personal information regarding recruitment, please contact the department below.
- Department in charge: People Partner Team
- Email: recruit@estsoft.com

4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency's Personal Information Infringement Center, and other related organizations to seek remedy from personal information infringement. For reports and consultations on other personal information infringements, please inquire at the following organizations.
- Personal Information Infringement Report Center (operated by the Korea Internet & Security Agency) (https://privacy.kisa.or.kr / direct 118)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / direct 1301)
- National Police Agency Cyber Security Bureau (http://cyberbureau.police.go.kr / direct 182)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)

1) You can report any complaints related to personal information protection that arise from using the company's online job application process to the person in charge of personal information protection or the relevant department. The company will provide prompt and adequate responses to the reports of the users.

2) Personal Information Protection Officer and Department in charge of Personal Information Protection Work
- Personal Information Protection Officer: Head of IT Planning Office
- Department in charge: Information Security Team
- Phone: 02-583-4620
- Contact: privacy@estsoft.com

3) If you have any inquiries related to personal information regarding recruitment, please contact the department below.
- Department in charge: People Partner Team
- Email: recruit@estsoft.com

4) Users can apply for dispute resolution or counseling to the Personal Information Dispute Mediation Committee, Korea Internet & Security Agency's Personal Information Infringement Center, and other related organizations to seek remedy from personal information infringement. For reports and consultations on other personal information infringements, please inquire at the following organizations.
- Personal Information Infringement Report Center (operated by the Korea Internet & Security Agency) (https://privacy.kisa.or.kr / direct 118)
- Supreme Prosecutors' Office Cyber Investigation Department (http://www.spo.go.kr / direct 1301)
- National Police Agency Cyber Security Bureau (http://cyberbureau.police.go.kr / direct 182)
- Personal Information Dispute Mediation Committee (https://www.kopico.go.kr/)

11. Duty of Notification

1) In case of any addition, deletion, or modification of the current Privacy Policy, it will be announced through the 'Notices' section on the website at least 7 days prior to the amendment. However, in the case of significant changes that affect user rights, such as the collection and use of personal information or provision to third parties, it will be announced at least 30 days in advance.
2) Announcement Date: September 8, 2022 3) Implementation Date: September 22, 2022

1) In case of any addition, deletion, or modification of the current Privacy Policy, it will be announced through the 'Notices' section on the website at least 7 days prior to the amendment. However, in the case of significant changes that affect user rights, such as the collection and use of personal information or provision to third parties, it will be announced at least 30 days in advance.
2) Announcement Date: September 8, 2022 3) Implementation Date: September 22, 2022

1) In case of any addition, deletion, or modification of the current Privacy Policy, it will be announced through the 'Notices' section on the website at least 7 days prior to the amendment. However, in the case of significant changes that affect user rights, such as the collection and use of personal information or provision to third parties, it will be announced at least 30 days in advance.
2) Announcement Date: September 8, 2022 3) Implementation Date: September 22, 2022

1) In case of any addition, deletion, or modification of the current Privacy Policy, it will be announced through the 'Notices' section on the website at least 7 days prior to the amendment. However, in the case of significant changes that affect user rights, such as the collection and use of personal information or provision to third parties, it will be announced at least 30 days in advance.
2) Announcement Date: September 8, 2022 3) Implementation Date: September 22, 2022

  1. 1.

    AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

  2. 2.

    Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor
    Expansion of educational businesses in various fields such as AI content

  3. 3.

    Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning
    Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

  4. 4.

    Companies can focus on their inherent customer value by providing data and solutions using AI

    as an API.

  5. 5.

    Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,
    provides the utility environment that users want.

  1. 1.

    AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

  2. 2.

    Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor
    Expansion of educational businesses in various fields such as AI content

  3. 3.

    Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning
    Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

  4. 4.

    We provide data and solutions utilizing AI through APIs to enable companies to focus on their inherent customer value.

  5. 5.

    Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,
    provides the utility environment that users want.

  1. 1.

    AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

  2. 2.

    Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor
    Expansion of educational businesses in various fields such as AI content

  3. 3.

    Implementing 'moving pictures' by applying EST AI technology, producing various AI human contents such as 'face transformation, makeup application, and clothing creation' for new employees including analysts and announcers, and utilizing them

  4. 4.

    Companies can focus on their inherent customer value by providing data and solutions using AI
    as an API.

  5. 5.

    Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,
    provides the utility environment that users want.

  1. 1.

    AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

  2. 2.

    Expansion of educational businesses in various fields, such as the establishment of celebrity lecture video courses, production of TOEIC speaking educational content, and AI content as a fitness training instructor

  3. 3.

    Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning
    Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

  4. 4.

    We provide data and solutions utilizing AI through APIs to enable companies to focus on their intrinsic customer value.

  5. 5.

    Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,
    provides the utility environment that users want.