| Date | Version |
|---|---|
| 2025.12.26 | ver. 1.0 |
SecureKorea Inc. (hereinafter referred to as "Company") establishes this privacy policy for GUARD-FORCE Alarm service users in accordance with Article 30 of the Personal Information Protection Act to protect the personal information and rights of data subjects and to handle user complaints related to personal information smoothly.
The personal information collected and used is as follows. Users may refuse to consent, but service use may be restricted if essential consent information is refused.
| Purpose of Use | Collection Purpose | Items Collected | Retention and Use Period |
|---|---|---|---|
| Member Registration | Confirmation of membership intention Identity verification and authentication Maintenance and management of membership Prevention of fraudulent use of services Various notices and complaint handling |
Email address Password Device identifier |
Until membership withdrawal However, if an investigation or inquiry is in progress due to violation of related laws, it will be retained until the end of such investigation or inquiry |
| Email Account Linking | Email reception through linking of Gmail, Outlook, iCloud accounts | Email account information OAuth token |
Until account linking is terminated |
| Email Filtering and Notifications | Email filtering and notification provision according to user-set rules | Email subject Email content Sender information Reception time |
Until membership withdrawal However, if an investigation or inquiry is in progress due to violation of related laws, it will be retained until the end of such investigation or inquiry |
| App Service Use | App function provision and service improvement | Device information (OS version, device model) App version information Service usage records |
Until membership withdrawal |
The sensitive information collected and used is as follows. Users may refuse to consent, but service use may be restricted if essential consent information is refused.
| Purpose of Use | Collection Purpose | Items Collected | Retention and Use Period |
|---|---|---|---|
| Email Content Analysis | Email content analysis and filtering according to user-set keywords | Email body content (may contain personal information) | Until membership withdrawal However, additional retention may be required according to legal retention periods |
The Company does not provide personal information to third parties without the prior consent of users. However, personal information may be provided to third parties after obtaining user consent within the scope necessary for users to use services of external partners, etc.
| Recipient | Purpose of Use | Items Provided | Retention and Use Period |
|---|---|---|---|
| User usage analysis and service improvement | Device information Cookie information User age User gender User interests Service page usage information Service page stay time |
Until membership withdrawal or service termination | |
| Apple | iCloud email service linking | iCloud account information OAuth token |
Until account linking is terminated |
| Microsoft | Outlook email service linking | Outlook account information OAuth token |
Until account linking is terminated |
Data subjects may exercise the following rights against the Company at any time.
1. Request for access to personal information: You may request access in accordance with Article 35 (Access to Personal Information) of the Personal Information Protection Act. However, access requests may be refused in accordance with Article 35, Paragraph 4 in the following cases:
2. Request for correction or deletion of personal information: You may request correction or deletion in accordance with Article 36 (Correction and Deletion of Personal Information) of the Personal Information Protection Act. However, deletion may not be requested if the personal information is specified as a collection target under other laws.
3. Request for suspension of processing of personal information: You may request suspension of processing in accordance with Article 37 (Suspension of Processing of Personal Information, etc.) of the Personal Information Protection Act. However, requests for suspension of processing may be refused in accordance with Article 37, Paragraph 2 in the following cases:
1. The Company destroys personal information without delay when it becomes unnecessary due to the expiration of the retention period or achievement of the processing purpose.
2. If personal information must continue to be preserved under other laws even after the retention period agreed with the data subject has elapsed or the processing purpose has been achieved, the personal information (or personal information file) is moved to a separate database (DB) or stored in a different location.
3. Personal information recorded and stored in electronic file format is destroyed using technical methods that make it impossible to reproduce the records, and personal information recorded and stored in paper documents is destroyed by shredding or incineration.
In accordance with Article 29 of the Personal Information Protection Act, the following technical, administrative, and physical measures necessary to ensure safety are being implemented.
1. Establishment and implementation of internal management plans
Internal management plans and regulations related to personal information protection are established and implemented.
2. Encryption of personal information
Major personal information such as passwords of data subjects is encrypted and stored and managed, and important information uses separate security functions such as encryption during storage and transmission or file locking functions.
3. Technical measures against hacking, etc.
Security programs are installed, regularly updated and checked, and systems are installed in areas controlled from external access to technically and physically monitor and block personal information leaks and damage caused by hacking or computer viruses.
4. Access restriction to personal information processing systems
Necessary measures are taken to control access to personal information by granting, changing, and deleting access rights to database systems that process personal information, and unauthorized access from outside is controlled using intrusion prevention systems.
5. Storage and prevention of tampering of access records
Records of access to personal information processing systems (web logs, summary information, etc.) are stored and managed for at least 2 years, and access records are managed to prevent tampering, theft, and loss.
6. Access control for unauthorized persons
A separate physical storage location is provided for personal information systems storing personal information, and procedures for controlling unauthorized persons are established and operated.
7. Minimization and training of employees handling personal information
Employees handling personal information are designated and limited to those in charge to minimize, and the safety of personal information is ensured through regular training to comply with related regulations and laws.
1. The Company may use technologies that automatically collect usage information within the app to improve services for users.
2. The app may automatically collect the following information for service provision and improvement:
3. The above information is used for purposes such as service provision, improvement, and security enhancement. Users can refuse the collection of some automatically collected information through app settings. However, refusal to collect essential information may restrict service use.
The Company is responsible for overall personal information processing tasks and has designated a personal information protection officer as follows to handle complaints and damage relief related to personal information processing.
| Type | Position | Name | Contact |
|---|---|---|---|
| Chief Officer | CEO | μ₯μμ | tim@securekoreainc.com |
| Protection Officer | Manager | μ₯μμ | tim@securekoreainc.com |
Data subjects may inquire about damage relief and counseling regarding personal information infringement to the following institutions. The following institutions are separate from the Company's services. If you are not satisfied with the Company's own personal information complaint handling and damage relief results, or need more detailed help, please contact them.
Scope: Reporting personal information infringement, application for counseling
Website: privacy.kisa.or.kr
Phone: (toll-free) 118
Scope: Application for personal information dispute mediation, group dispute mediation (civil resolution)
Website: www.kopico.go.kr
Phone: 1833-6972
Website: www.spo.go.kr
Phone: 02-3480-3570
Email: cid@spo.go.kr
Website: cyberbureau.police.go.kr
Phone: (toll-free) 182
This privacy policy takes effect from December 26, 2025.