Privacy Policy
Standards for the collection, use, retention, and protection of personal information at Login Network
Privacy Policy
Login Network Co., Ltd. values customers' personal information and complies with applicable laws and regulations, including the Personal Information Protection Act and the Act on Promotion of Information and Communications Network Utilization and Information Protection. This Privacy Policy explains how customers' personal information is processed and for what purposes.
Customers have the right to refuse consent to the collection, use, provision, or outsourcing of personal information described below. However, if consent for required items is refused, use of the service may be restricted. Refusal of consent for optional items does not affect service use. (Personal Information Protection Act, Article 15(2) and Article 22(5))
Article 1 (Purpose of Collection and Use of Personal Information)
The company collects and uses personal information for the following purposes. Collected personal information is not used for any purpose other than those listed below. If the purpose of use changes, separate consent will be obtained.
- Handling personal information related to customs administration procedures in general, including import and export declarations
- Providing services and performing contracts, including applications, changes, termination, identity verification, customer support, and complaint handling
- Compliance with legal obligations under applicable laws such as the Electronic Commerce Act and the Customs Act
Article 2 (Items of Personal Information Processed)
Login Network Co., Ltd. collects personal information only within the minimum scope necessary to provide services.
| Category | Items |
|---|---|
| Required | Name, mobile phone number, email address, postal code, personal customs clearance code |
| Optional | Landline phone number, address |
Collection Method
- Entered directly by customers through the internet and mobile devices
- Collected directly through written forms, fax, telephone, email, and similar channels
Article 3 (Processing and Retention Period of Personal Information)
The processing and retention period of personal information at Login Network Co., Ltd. is as follows. Personal information is retained until the purpose of processing is achieved and is destroyed without delay once the purpose has been fulfilled. However, where retention is required by applicable law, it is stored separately from other personal information for the period prescribed by law.
1) Retention Based on Internal Company Policy
| Retained Item | Retention Period | Basis |
|---|---|---|
| Service usage records | 1 year after service termination | Proof of consent |
| Consent records | 1 year after withdrawal of consent | Proof of consent |
2) Retention Required by Law
| Retained Item | Retention Period | Legal Basis |
|---|---|---|
| Records of contracts and withdrawals | 5 years | Electronic Commerce Act |
| Payment and supply of goods records | 5 years | Electronic Commerce Act |
| Consumer complaints and dispute records | 3 years | Electronic Commerce Act |
| Identity verification records | 3 months | Enforcement Decree of the Protection of Communications Secrets Act, Article 41 |
| Import and export declaration records | 5 years | Customs Act |
Article 4 (Provision of Personal Information to Third Parties)
As a general rule, Login Network Co., Ltd. uses customers' personal information only within the scope of the purpose of collection and use and does not provide it to third parties without the data subject's consent. Exceptions are made in the following cases under Articles 17 and 18 of the Personal Information Protection Act.
- Where separate consent has been obtained from the data subject
- Where specially prescribed by law or unavoidable for compliance with statutory obligations
- Where necessary to protect urgent life, bodily safety, or property interests
- Where provided in a form that does not identify specific individuals for statistics or academic research
- Where necessary for criminal investigation, prosecution, or maintenance of prosecution
- Where necessary for the performance of court duties
- Where necessary for execution of criminal sentences, custody, or protective measures
Current Third-Party Provision Status
| Recipient | Purpose | Provided Items | Retention / Use Period |
|---|---|---|---|
| Customs brokers in partnership with the company | Review and proxy filing of import/export declarations, customs consultation | Name, address, customs clearance code, mobile phone number, email address, declaration-related information | Until the outsourcing contract ends or the purpose is achieved |
| Insurance companies in partnership with the company | Preparation and issuance of insurance policies | Name, address, mobile phone number, email address, information related to policy issuance | 5 years after termination of the insurance contract (Commercial Act, Article 662) |
Detailed information regarding third-party provision, including retention period, right to refuse consent, and withdrawal procedures, is available through the separate Consent for Provision of Personal Information to Third Parties.
Article 5 (Outsourcing of Personal Information Processing)
Login Network Co., Ltd. outsources personal information processing tasks as follows to ensure smooth service operation.
- When entering into an outsourcing contract, the company's obligation to ensure the outsourced party's secure handling of personal information is specified in the contract pursuant to Article 26 of the Personal Information Protection Act.
- If the outsourced party changes, this policy will be updated and disclosed.
| Entrusted Party | Outsourced Task | Retention / Use Period |
|---|---|---|
| (To be specified) | (To be specified) | Until the outsourcing contract ends |
Article 6 (Processing of Pseudonymized Information)
Login Network Co., Ltd. may process pseudonymized information for the purposes of statistics, scientific research, and preservation of records in the public interest. (Personal Information Protection Act, Article 28-2)
- When processing pseudonymized information, additional information required to restore the original state is stored separately, and technical and administrative safeguards are implemented to prevent re-identification.
- The company is not currently processing pseudonymized information, but if such processing begins, this policy will be updated and disclosed.
Article 7 (Destruction of Personal Information)
As a general rule, Login Network Co., Ltd. destroys personal information without delay once the purpose of collection and processing has been achieved.
| Form | Destruction Method |
|---|---|
| Electronic files | Permanently deleted using a method that prevents recovery |
| Printed documents | Shredded or incinerated |
Article 8 (Rights and Obligations of Data Subjects and How to Exercise Them)
Data subjects may exercise the following rights at any time with respect to Login Network Co., Ltd.
- Request access — confirm retained personal information
- Request correction or deletion — correct inaccurate information and delete unnecessary information
- Request suspension of processing — temporarily halt the processing of personal information
- Withdraw consent — withdraw consent for collection, use, and provision
- Request transmission (data portability) — request that personal information be transmitted to another personal information controller (Personal Information Protection Act, Article 35-2)
How to Exercise These Rights
- Submit a request to the personal information protection manager in writing, by phone, or by email
- A processing result will be notified within 10 days after the request
- If access is restricted or denied under applicable law, the reason will be explained
Article 9 (Measures to Ensure the Security of Personal Information)
Login Network Co., Ltd. implements the following protective measures in accordance with Article 30 of the Enforcement Decree of the Personal Information Protection Act.
Technical Measures
- Encryption of personal information, including SSL/TLS for data in transit and encryption of passwords and unique identifiers at rest
- Operation of access control systems such as firewalls and intrusion detection systems
- Installation and periodic updates of security programs
Administrative Measures
- Minimization of employees handling personal information and provision of regular training
- Establishment and implementation of internal personal information management plans
- Management and periodic review of access rights to personal information processing systems
Physical Measures
- Access control for server rooms and document storage rooms
- Lock management for documents and removable media containing personal information
Article 10 (Chief Privacy Officer and Responsible Personnel)
Login Network Co., Ltd. designates the following persons to protect personal information and handle related complaints.
| Role | Name | Position | Contact |
|---|---|---|---|
| Chief Information Security Officer (CISO) and Chief Privacy Officer (CPO) | Kim Jeong-min | Chief Executive Officer | 032-744-6000 / jmkim@loginnw.co.kr |
| Technical Security Lead (CISO Support) | Cho Jae-sik | Director | 032-744-6000 / jscho@loginnw.co.kr |
| Infrastructure Operation and Management (CPO Support) | Shin Byeong-cheol | Director | 032-744-6000 / bcshin@loginnw.co.kr |
| Administrative and Personnel Security | Shin Tae-cheol | Team Leader | 032-744-6000 / tcshin@loginnw.co.kr |
Article 11 (Remedies for Infringement of Rights)
If you need consultation or relief for damage caused by infringement of personal information, you may contact the following institutions.
| Institution | Service | Contact |
|---|---|---|
| Personal Information Infringement Report Center (KISA) | Report and consultation on privacy infringement | privacy.kisa.or.kr / ☎ 118 |
| Personal Information Dispute Mediation Committee | Dispute mediation application | www.kopico.go.kr / ☎ 02-2100-2499 |
| Supreme Prosecutors' Office Cyber Investigation Division | Request for investigation | www.spo.go.kr / ☎ Area code +1301 |
| National Police Agency Cyber Safety Bureau | Request for investigation | www.netan.go.kr / ☎ 182 |
Article 12 (Changes to This Privacy Policy)
This policy may be revised in accordance with changes in laws or services.
- Important changes, such as changes to collected items or purposes of use: announced 30 days before the effective date
- General changes: announced 7 days before the effective date
- This Privacy Policy is posted on the website.
| Item | Details |
|---|---|
| Notice Date | April 20, 2026 |
| Effective Date | May 1, 2026 |
| Version | v3.0 (Previous version: v2.0 / effective November 1, 2025) |
| Legal Basis | Personal Information Protection Act [Act No. 20897, amended April 1, 2025, effective October 2, 2025] / Enforcement Decree of the Personal Information Protection Act [Presidential Decree No. 35343, amended February 25, 2025, effective March 13, 2025] |