Privacy Policy
TidySingle (hereinafter referred to as the "Company" or "TidySingle") complies with the personal information protection regulations of relevant laws and regulations that the information and communication service providers must comply with, such as the communication secret protection law, the telecommunication business law, the telecommunication network use promotion and the information protection law. We are doing our best to protect the rights of users by establishing a privacy policy in accordance with relevant laws and regulations.

1. Personal Information types and methods of collection
1)  Items of Personal Information collected
The Company collects personal information such as the user's email address and device IP (device ID or IMEI) for smooth user consultations and various services at the time of initial registration. In the process of using the service, we collect e-mail, ID, cookie, date and time of visit, service usage record, bad usage record, device information, IP address, and optionally collect name, mutual SNS information, address and account information. When selling / purchasing products, information such as mobile phone number, address, email, credit card information, bank account information and payment records may be collected. Even if you do not enter optional information, there is no restriction on the use of the service, and we do not collect sensitive personal information (race, ideology and creed, political inclination or criminal record, medical information) that may infringe on the basic human rights of users.

2)  How to collect Personal Information
It is collected automatically by running or using the service program provided by the company, or through voluntary provision of the user during the subscription or use of the service.

3)  Online Payment Information
The Company does NOT store or collect any information about credit or debit cards used for online payments..

2. Purpose of collecting and using personal information
1)  The company that cooperates with TidySingle may provide services such as automatic registration and recommendation by collecting and using the user's phone number and the phone number of the third party stored in the phone book in the user's phone. You can also collect and store your device's unique number (device ID or IMEI) when you sign up and use it as your account for personal identification in combination with your phone number. Note that user status information, user name, ID, and picture are information that users register to describe themselves in the process of communicating with other users or company' services.

2)  This is to fulfill the contract regarding service provision and provide contents. Also it is for the purpose of providing specific personalized services, sending goods or invoices, verifying identity, purchasing and billing, and collecting charges.

3)  Member management It is for membership management, identity verification, personal identification, prevention of illegal use of bad members, confirmation of membership intention, restriction of registration and number of registration, preservation of records for dispute settlement, and complaint handling.

4)  New services, marketing and advertisement
It is for the development of new services and the provision of customized services, the provision of services and advertisements according to statistical characteristics, the validation of services, the provision of event and advertisement information, the provision of participation opportunities, the identification of access frequency, and the statistics on the use of services by members.

3. Sharing and Providing Personal Information
The Company shall use the personal information of users within the scope of the above and do not use it beyond the scope or disclose the user's personal information without the prior consent of the user. However, if the users agree to the disclosure in advance, the relevant information may be disclosed for the purpose of revitalizing the commerce in accordance with the provisions of the law or when requested by the investigating agency according to the procedures and methods prescribed by the law for the purpose of investigation. The company is doing its best to promote sound services, but cannot completely exclude unjust people who access services for other purposes. Please note that the company is not responsible for any damages of users who suffer from such unjust access.

4. Consigning services
Some company services can be entrusted to an external company to perform some of the tasks necessary to provide the service. In such case we supervise them to comply with laws and regulations related to personal information protection, confidentiality of personal information, prohibition of offering to third parties, burden of liability in case of accident, entrustment period, obligation to destroy personal information.

5. Retention and Use Period of Personal Information
In principle, the personal information of the user is destroyed without delay when the purpose of collecting and using the personal information is achieved. However, the following information will be retained for the period specified for the reasons below.
1)  Due to company internal policy - Period of retention: 1 year

2)  Other retention by internal policy
If it is necessary to preserve the information the company keeps it for a certain period of time. In this case, the company uses the information kept only for the purpose of keeping it, and the retention period is as follows.

• Record of contract or withdrawal -retention period: 5 years
• Record of payment and supply of goods - retention period: 5 years
• Records of consumer complaints or disputes - retention period: 3 years
• Record of identity verification - retention period: 6 months

6. Personal information destruction procedure and method
1)  Destruction procedure
The information entered by the user for membership registration, etc., is stored in a file according to the company's regulations after the purpose is achieved. The personal information will not be used for any purpose other than that held by law.

2)  How to destroy
Personal information printed on paper is shredded or destroyed by incineration. Personal information stored in the form of electronic files will be deleted to the best of our ability to prevent the record from being restored.

7. Protection of Personal Information
1)  Countermeasures against hacking
The company is doing its best to prevent member's personal information from being leaked or damaged by hacking or computer viruses. We are backing up our data from time to time in preparation for the loss of personal information, and we can securely transmit personal information over the network through encrypted communication.

2)  Minimization and training of handling staff
The company's personal information handling staff is limited to the person in charge, and a separate password is assigned for this purpose, and the company always emphasizes compliance with the personal information handling policy through the occasional training of the person in charge.

8. Responsible Manager for personal information
You can report the complaints related to personal information protection while using the company's services to the personal information manager. The company will promptly and fully respond to the users.
Manager Name : Park, Peter
Title : Officer
Email : tidysingle@yahoo.com

9. Duty of notice
If there is any addition, deletion or modification of the contents of the current privay policy, we will notify you through the "ContactUs" screen as soon as we can.


O
Terms of Use   ||    Privacy Policy   ||    Contact_Us
© 2024 TidySingle LLC, Renton, WA, USA
O