Privacy Policy

All the personal information handled on GC Genome website is based on the “Act on Promotion of Information and Communications Network Utilization and Information Protection”, and the “Act on Personal Information Protection” or is collected, retained and processed with the consent of information provider. Also, GC Genome follows below policy to improve the personal information protection and rights of the information provider, and efficiently respond to any difficulties.

[Go to Information and Communication Network Act] [Go to Korea Personal Information Protection Act]

1. Personal Information Collection•Use/Purpose, Collected Personal Information Items and Collection Method.

A. GC Genome processes personal information for the following reasons. The personal information will not be used for any purpoes other than those stated below, and if the purpose is changed, the company shall ask for the consent from the information subject beforehand.

  • ① Inquiry Personal information will be processed for inquiry purposes

B. GC Genome website processes the following personal information items:

Order Personal Information Use Personal Information Item Collection Method
1 Inquiry Required Item:Name, email The personal information is collected if she/he agrees to its collection
and inputs the information himself/herself

2. Provision of Personal Information to Third Parties

GC Genome website shall process the information subject’s personal information within the scope specified in “1. Personal Information Collection/Use purpose, Collected personal items and collection method” only, and shall not process the information outside the original scope or provide it to the third parties without the consent from the information subject unless the following:

​A. When the information subject has given separate consent

B. When there is a special regulation in the legislation C. When it is deemed to be clearly required for the benefit of the life, body, and property of the information subject or a third party, but the information subject or the legal representative is not in a position to express their intention or it is not possible to receive consent beforehand due to unknown address, etc.

D. When it is necessary for the production of statistics, academic research purposes, etc. and the personal information is provided in a format that does not allow specific individuals to be identified

E. When it is not possible to execute judicial work designated by other legislation, if the personal information is not used for purposes other than the intended purpose or if it is not provided to a third party

F. When it is necessary to provide it to a foreign government or international organization to honor a treaty or other international agreements

G. When it is necessary for a criminal investigation and prosecution and maintaining a prosecution

H. When it is necessary for a court trial proceeding

I. When it is necessary for sentencing and enforcement of preventive custody and protective disposition

3. Personal Information Processing and Retention Period

A. The GC Genome Website shall process and retain personal information on the basis of the legislation or within the scope of the consent received.

B. The personal information processing and retention period are as follows:

order Personal Information Use Personal Information Item Operation Basis Purpose Retention Period
1 Inquiry Required Item:Name, email Information Subject’s Consent Inquiry 3 years

4. Destroying Personal Information

A. The GC Genome website shall destroy personal information without delay in cases where it has become unnecessary, such as retention period has expired, the processing purpose has been achieved, etc. However, that is not the case when it has to be retained in accordance with other legislation.

B. The personal information destruction procedure and method are as follows:

  • ① Destruction Procedure
    In cases where the personal information has become unnecessary, such as the personal information purpose has been achieved, retention period has expired, the relevant service has been discontinued, business has been terminated, etc. the personal information shall be destroyed without delay on the date that it is deemed unnecessary.
  • ② Destruction Method
    Personal information recorded and stored in an electronic file form shall be destroyed so that the record cannot be retrieved, and personal information recorded and stored on paper documents shall be shredded with a paper shredder or incinerated.

5. User and Legal representative’s Rights and Exercise method

A. The information subject can exercise the following rights related to personal information protection at any time:

  • ① Demand to view personal information
  • ② Demand to rectify any errors, etc.
  • ③ Demand deletion
  • ④ Demand to stop processing

B. The exercising of rights according to “A” must be done by phone or e-mail or fax and the GC Genome website shall respond to it without delay.

C. If the information subject has demanded the rectification or deletion of a personal information error, etc., the GC genome website shall not use or provide the relevant personal information until it is rectified or deleted.

D. The exercising of rights according to “A” may be done through an agent, such as the information subject’s legal representative or an entrusted person, etc. In this case, a power of attorney for the personal information processing must be submitted.

E. Requests for access to personal information and suspension of processing may be restricted in accordance with Article 35 (5) and Article 37 (2) of the Personal Information Protection Act.

F. Requests for correction and deletion of personal information cannot be processed if the personal information is specified for collection in other laws and regulations..

G. Check whether the person who made the request, such as a request for viewing, request for correction or deletion according to the rights of the data subject, is the person or a legitimate agent..

[Personal information processing power of attorney]

H. If there is a personal information infringement and there is a need to report or consult about it, the following agencies can offer assistance:

▶ Personal Information Dispute Mediation Committee (No Area Code) 1833-6972 http://www.kopico.go.kr

▶ Personal Data Infringement Call Center (No Area Code) 118 http://privacy.kisa.or.kr

▶ Supreme Prosecutors’ Office Cyber Crime Investigation Division (No Area Code) 1301 http://spo.go.kr(cid@spo.go.kr)

▶ National Police Agency Cyber Bureau (No Area Code) 182 https://www.police.go.kr/www/security/cyber.jsp

6. Matters Regarding the Installation, Operation, and Rejection of the Automatic Personal Information Collection Device

A. Personal information may be accumulated with the collection of “automatically generated information items (cookie, IP, etc.)” when a user uses the GC Genome homepage. A cookie is a temporary file created automatically when a website is accessed, and it is stored on the user’s computer hard drive.
B. The Company uses cookies for the purpose stated below. The user has the option regarding cookie storage of allowing all cookies or rejecting cookie storage by selecting the option on the web browser.

  • ① Purpose of Cookies
    When using a service that requires logging in, a cookie provides convenience by making it unnecessary to type in the ID and password every time. Also, a cookie is used for customized marketing services, such as event participation identification, etc.
  • ② How to Reject Cookies
    The user can select the option on the web browser he or she uses to allow all cookies or reject cookie storage.

7. Personal Information Security Officer

A. Inquiries about personal information security, complaint handling, damage relief, etc. can be directed to the personal information security officer and the department in charge. They will reply and respond to information subjects’ inquiries without delay.

Category Affiliation Name/Title Contact No. Email
Personal Information Security Officer Precision Medicine Center Kim Jee-Hoon/Director 031-280-9994 kim1001@gccorp.com
Personal Information Security Staff LIMS Team Byun Sang-Jae/Manager 031-280-9995 sayaya@gccorp.com

▶ Personal Information Dispute Mediation Committee (No Area Code) 1833-6972 http://www.kopico.go.kr

▶ Personal Data Infringement Call Center (No Area Code) 118 http://privacy.kisa.or.kr

▶ Supreme Prosecutors’ Office Cyber Crime Investigation Division (No Area Code) 1301 http://spo.go.kr(cid@spo.go.kr)

▶ National Police Agency Cyber Bureau (No Area Code) 182 https://www.police.go.kr/www/security/cyber.jsp

8. Request to view personal information

A.Information subject can request the following department to view his/her personal information based on Article 35 of the Personal Information Protection Act. GC Genome will try to promptly process the request ​for information subjects’ access to personal information.

Category Affiliation Name/Title Contact No. Email
Personal Information Security Staff LIMS Team Byun Sang-Jae/Manager 031-280-9995 sayaya@gccorp.com

9. Personal Information Safety Security Measures

A. The following measures shall be taken to secure personal information safety:

  • ① Establish and implement internal management plan
    An internal management plan shall be established and implemented in accordance with the “Personal Information Technical & Administrative Security Measures Standard” and the “Personal Information Safety Security Measures Standard.”
  • ② Restrict access to personal information
    Necessary measures shall be taken to control access to personal information by granting, changing and canceling the authority to access the personal information processing system. A firewall shall be used to restrict unauthorized access from the outside.
  • ③ Retain access records and tampering
    Personal information processing system access records shall be retained and managed for at least six months. Access records shall be properly managed to make sure they are not forged, falsified, stolen or lost.
  • ④ Encrypt personal information
    Personal information shall be safely stored and managed through encryption, etc. Also, separate security functions shall be used for encrypting important data when storing and transmitting, etc.
  • ⑤ Install security program and inspect and update it regularly
    To prevent personal information leaks and damage due to hacking, computer viruses, etc. security programs shall be installed and regularly inspected and updated.
  • ⑥ Restrict access of unauthorized personnel
    The personal information processing system, which stores the personal information, shall be kept in a physically separate location, and an access control procedure shall be established and operated.

10. Changes in the Privacy Policy

A. This Privacy Policy shall be applied from 2020. 04. 29
B. Click below to view previous version of the policy