Privacy Policy

Startik (hereinafter referred to as "the Company") complies with personal information protection regulations under relevant laws such as the Personal Information Protection Act, and establishes a personal information processing policy in accordance with relevant laws to best protect user rights and interests.

  • Chapter 1. Purpose of Collection and Use of Personal Information
  • Chapter 2. Personal Information Items Collected and Collection Methods
  • Chapter 3. Retention and Use Period of Collected Personal Information
  • Chapter 4. Procedures and Methods for Destruction of Personal Information
  • Chapter 5. Provision and Sharing of Personal Information
  • Chapter 6. Installation, Operation, and Refusal of Automatic Personal Information Collection Devices
  • Chapter 7. Measures to Ensure Security of Personal Information
  • Chapter 8. User Rights and How to Exercise Them
  • Chapter 9. Personal Information Protection Officer and Consultation, Reporting
  • Chapter 10. Notice
Chapter 1. Purpose of Collection and Use of Personal Information
  • The personal information collected by the Company is used for the following purposes.
  • ① Performance of contracts related to service provision, fee settlement according to service provision, content provision, delivery of goods or invoices, identity verification and purchase, fee payment, fee collection
  • ② User Management
    Identity verification according to service use, personal identification, prevention of unauthorized use by bad members and unauthorized use, confirmation of membership intention, limitation of membership and number of memberships, record retention for dispute resolution, complaint handling and other civil affairs processing, delivery of notices
  • ③ Use for Marketing and Advertising
    Development and specialization of new services (products), understanding access frequency, statistics on members' service use, delivery of advertising information such as events
Chapter 2. Personal Information Items Collected and Collection Methods

[ Personal Information Items Collected ]

  • ① When using the service, the following information may be collected to identify members and provide optimized services.
    - ID, password, company name, business registration number, manager name, mobile phone number, email, browser type
  • ② When modifying personal information, the following information may be optionally collected additionally.
    - Address, fax number, phone number, English name, English address
  • ③ The following personal information may be collected for consultation services.
    - Name, phone number, email
  • ④ The Company may use user location information with user consent in certain services.

[ Collection Methods ]

  • The Company collects personal information through membership registration on the website, consultation boards, event participation, delivery requests, generated information collection tools, service application/use, etc.
Chapter 3. Retention and Use Period of Collected Personal Information
  • Personal information is processed and retained only within the retention and use period of personal information agreed upon when collecting personal information from the information subject, and is never used for other purposes.
    However, the following information is retained for the period specified below for the following reasons.
  • ① When it is necessary to retain information in accordance with the provisions of related laws such as the Act on Consumer Protection in Electronic Commerce, the Communications Secrets Protection Act, etc.
    • - Records related to contracts or withdrawal of subscription
    • ㆍRetention Reason: Act on Consumer Protection in Electronic Commerce
    • ㆍRetention Period: 5 years
    • - Records related to payment and supply of goods
    • ㆍRetention Reason: Act on Consumer Protection in Electronic Commerce
    • ㆍRetention Period: 5 years
    • - Records related to consumer complaints or dispute resolution
    • ㆍRetention Reason: Act on Consumer Protection in Electronic Commerce
    • ㆍRetention Period: 3 years
    • - Records related to visits (service usage records, access logs, access IP information)
    • ㆍRetention Reason: Communications Secrets Protection Act
    • ㆍRetention Period: 3 months
  • ② When member information is retained for a certain period according to the Company's internal policy
    • - Information collected during membership registration and service use
    • ㆍRetention Reason: Prevention of damage due to abnormal member withdrawal
    • ㆍRetention Period: 7 days after membership withdrawal request
    • - Member information of unauthorized users
    • ㆍRetention Reason: Prevention of unauthorized use
    • ㆍRetention Period: 1 year after membership withdrawal completion
Chapter 4. Procedures and Methods for Destruction of Personal Information
  • In principle, the Company destroys the information without delay after the purpose of collecting and using personal information is achieved or the retention and use period has elapsed. However, for the prevention of unauthorized use and resolution of disputes related to service use period and fees, member information (ID, order processing information, etc.) is retained for 1 year from the date of membership withdrawal completion.
    The procedures and methods for destruction are as follows.
  • ① Destruction Procedures
    Information entered by members for membership registration, etc., is stored for a certain period according to internal policies and related laws after the purpose is achieved, and then destroyed.
  • ② Destruction Methods
    Personal information printed on paper is destroyed by shredding or incineration, and personal information stored in electronic file format is deleted using technical methods that cannot reproduce the records.
Chapter 5. Provision and Sharing of Personal Information
  • In principle, the Company uses users' personal information only for the purpose of collection and use, and does not disclose it to third parties or other companies/institutions. However, exceptions are made in the following cases.
  • ① When the user has given prior consent
  • ② When required by investigative agencies in accordance with legal provisions or procedures and methods prescribed by law for investigative purposes
  • ③ Use and provision of personal information in accordance with the purpose of use
    • - When government agencies request domain name and nameserver information, etc., to perform their duties as prescribed by the relevant law
    • - When the Company uses member information for business contact
Chapter 6. Installation, Operation, and Refusal of Automatic Personal Information Collection Devices
  • In order to provide personalized and customized services to each individual user, the Company uses 'cookies' that store and retrieve user information from time to time, and identifies the type of browser used for user authentication.
Chapter 7. Measures to Ensure Security of Personal Information

In accordance with Article 29 of the Personal Information Protection Act, the Company implements the following technical, administrative, and physical measures necessary to ensure security.

  • ① Minimization and training of employees handling personal information
    - Measures are implemented to designate and minimize employees who handle personal information to manage personal information.
  • ② Establishment and implementation of internal management plans
    - Personal information protection guidelines are established and implemented for the safe processing of personal information.
  • ③ Technical measures against hacking, etc.
    - The Company installs security programs and conducts periodic updates and inspections to prevent leakage and damage of personal information due to hacking or computer viruses, and installs systems in areas where access from outside is controlled and monitors and blocks them technically and physically.
  • ④ Encryption of personal information
    - Users' personal information and passwords are encrypted and stored and managed so that only the user can know them, and important data uses separate security functions such as encrypting files and transmission data or using file locking functions.
  • ⑤ Access restrictions on personal information
    - Necessary measures (control) for access to personal information are taken through granting, changing, and revoking access rights to personal information processing systems, and unauthorized access from outside is controlled using intrusion prevention systems.
  • ⑥ Use of locking devices for document security
    - Documents containing personal information, auxiliary storage media, etc., are stored in a safe place with locking devices.
  • ⑦ Access control for unauthorized persons
    - A separate physical storage location for storing personal information is maintained, and access control procedures are established and operated for it.
Chapter 8. User Rights and How to Exercise Them
  • ① Users can view or modify their registered personal information at any time and request membership cancellation.
  • ② Users can exercise their right to request viewing, modification, withdrawal, and suspension of processing of personal information. The receiving and processing department is as follows.
    - Department: Service Operations Team
    - Email: cs@startik.co
    - Address: 3rd Floor, 108 Hyeonam-ro, Suji-gu, Yongin-si, Gyeonggi-do, South Korea
Chapter 9. Notice
  • When there are additions, deletions, or modifications to the content due to changes in laws/policies or security technology, notice is given through the Company's website announcements from 7 days before the effective date of the changes. However, if the content includes unfavorable terms for members, notice is given from 30 days before the effective date of the changes.
  • - Announcement Date: June 1, 2025
    - Effective Date: July 1, 2025