♦ What We Collect
We collect the following information to help you create your account, provide customer service, and various services.
♦ How We Collect
We collect information when you use our Service to provide, maintain, improve, develop our Service, to track and block illegal users, to protect the Service users, and to provide advertisements with high relevance to users.
We use personal information of users within the scopes mentioned in “Collecting Personal Information & Its Purpose”. We do not use personal information of users beyond those scopes without the consent of users, or share with external parties. However, for social log-in, we may share information in order to process social log-in.
We consign personal information to the following companies to improve our Service. We have clearly stipulated in a consignment agreement according to related laws to safely manage personal information. The following are consignees and their purpose.
|Consignee||Entrusted Task||Personal Information
Retention and Use Period
|IOS In app purchase||Processing Transactions||
Until the account is terminated
or termination of the consignment contract
|Android In app purchase||Processing Transactions|
In principle, we immediately destroy the personal information of users once the purpose of personal information collection is achieved. However, certain information will be retained up to 5 years for management purposes.
♦ Company Policy for Retention of Personal Information
We aim to maintain technical and administrative securities for your personal information to prevent loss, theft, leakage, alteration, or damage of your personal information.
♦ Encoding Passwords
Gomics users’ passwords are encoded, and therefore only you know the password. Only you can access and change personal information.
♦ Measures Against Hacking
We aim to protect your personal information from hacking and computer viruses to prevent leakage or damage of personal information. To prevent your personal information from being damaged, we back-up our data regularly, and transfer personal information through encoded networks.
We take measures to stop and monitor breaches by using a firewall system and other technology.
These Terms were last modified on (수정된 날짜)