Privacy Policy

We're always looking for new ways to provide the best services to our customers.

  • iconSIMPLE
  • iconTRANSPARENT
  • iconSECURE

To protect the personal information of the customer and to prevent the damage caused by the leakage of personal data, our site takes the customer's personal information very seriously, and we comply with the related laws and regulations that information and communication service, such as the Act on Promotion of Information Network Usage and Information Protection, and the Personal Information Protection Act.

Our privacy policy is subject to change due to changes in laws or guidelines related to protecting personal information or our policies, so please check with us whenever you visit our site.

General Rules
Our site is committed to protecting the privacy of users' personal information.
It is committed to safeguarding the personal information the user provides to the company while using its services.
Accordingly, the company complies with the unique information protection regulations of the related laws and regulations and the personal information protection guidelines established by the Ministry of Information and Communication, which should be complied with by the providers of information and communication services, such as the Promotion of Information Network Usage and Information Protection Act.
The company will disclose through its Privacy Policy how and in what manner personal information provided by users is being used and what measures are being taken to protect personal information.
The company discloses its privacy policy on the front page of the homepage so that users can easily view it at any time.
The company's privacy policy may change from time to time due to changes in the laws and guidelines of the government or changes in the company's internal policy Users are requested to check the privacy policy on the first page of the website from time to time.

1. Agreement to collect personal information
The company shall establish a procedure by which users can click the [Accept] button or the [Cancel] button on the contents of the company's personal information handling method or terms and conditions; if you click the [Accept] button, you agree to the collection of personal information.

2. Purpose of usage and collection of personal information
Personal information means information about an individual who is alive and includes information that can identify the individual by the name, date of birth, etc., included in the information (even if the information alone cannot identify a particular individual, including those that can be easily identified and combined with).
Personal information collected about individual customers and the purpose of collection and use is as follows.

- Name, ID, Password, Passport number (for foreigners only), E-mail address: Confirm your identity and confirm your membership
- Your ZedPay account, a copy of your photo ID (cover up the details other than your birth date), mobile number: ID verification for payment and withdrawal
- Optional: Materials to provide personalized services


3. Preventing fraudulent use of fraudulent customers and preventing unauthorized use
When a user joins a customer to use a membership service, the company receives online information essential for providing the service.
The vital information you receive when you sign up is your name, e-mail address, etc.
Also, to provide high-quality service, users can input optional phone numbers and account numbers, and we can also request personal information for statistical analysis or offer prizes during surveys or events at the exchange.
We do not collect sensitive personal information (such as race and ethnicity, ideology, creed, hometown and homeland, political orientation and criminal record, health status, and sex life) that may concern your basic human rights violations.
If we collect inevitably, we will ask for your prior consent, And, in any case, the information you enter will not be used for any other purpose other than for the purpose previously provided to you and will not be leaked out.

4. Retention and use period of personal information collected
When a company collects a user's personal information, the retention period is until membership termination (including withdrawal application and withdrawal of directorship).
In addition, at the time of termination, the company destroys the user's personal information and instructs the third party to destroy the personal information provided to the third party.
However, it is necessary to preserve it by following laws and regulations such as commercial law.
In that case, we have transaction history and minimum basic information for the period of preservation prescribed by laws and ordinances.
In addition, we will keep your data for the duration of your promised period if you notify the user in advance of the period of retention if the period of retention has stayed the same, and if the individual consents of the user.

- Records on contract or withdrawal of subscription: 5 years
- Record of payment and goods supply: 5 years
- Records of consumer complaints or disputes: 3 years

If a user requests access to transaction information, etc., which is held with the user's consent, the company shall take measures so that it can be read and confirmed without delay.

5. Procedures and methods of personal information destruction
In principle, the personal information of the user is destroyed without delay when the purpose of collecting and using the personal information is achieved, and the procedure and method of destroying the company's personal information is as follows
Destruction procedure.

- The information entered by the user for membership purposes is transferred to a separate DB after the purpose has been achieved (in the case of paper, separate documents).
According to internal policies and other relevant laws and regulations, it will be destroyed after a certain storage period.
Destruction Methods
- Personal information printed on paper is crushed or destroyed by crushing
- Personal information stored in the form of electronic files is deleted using a technical method that

6. Regarding the user's personal information management (reading, correcting, deleting, etc.
Users can log in to our site website anytime and read or correct the user's personal information by changing the customer's information.
In addition, we will fix it if you request by e-mail or in writing to the person in charge of personal information management on the company's homepage. However, the customer ID and the name cannot be corrected.
Users may withdraw their consent to withdraw or terminate their support to the collection and use of their personal information and to withdraw their consent to third parties through e-mail, telephone, fax, or other means.
In this case, the user must provide their ID and e-mail address for proof of identity.

7. Matters concerning the operation of cookies(cookies)
To provide customized services tailored to the customers, the company occasionally operates 'cookies' (cookies) to store and retrieve information.
The company identifies your computer concerning cookie management but does not personally identify you.
The user has a choice of 'cookies.' The user can accept all cookies by selecting [Tools]> [Internet Options]> [Security]> [User Defined Level] in the web browser, check each time a cookie is saved, or refuse to store all cookies.
However, if you refuse to store all cookies, you will not be able to use the services provided by the company through cookies.

8. Measures to Ensure the Safety of Personal Information
The company, according to Article 29 of the Personal Data Protection Act, has the following technical, administrative, and physical measures to ensure safety:
Minimization and training of personal information handling staff
We designate employees who handle personal information, limit them to the person in charge, and implement measures to manage personal information.

Regular self-audit conducted
We conduct our audits regularly (quarterly) to ensure the safety of handling personal information.

Establishment and implementation of the internal management plan
We have established and implemented an internal management plan to handle personal information safely.

Encryption of personal information
The user's personal information is encrypted, stored, and managed so only the user can know it.
The essential data use separate security functions such as encrypting the file and transmission data or using the file lock function.

Technical measures against hacking
The company installs security programs, periodically updates and checks, installs systems from outside controlled areas, and technically and physically monitors and blocks them to prevent leakage and damage of personal information caused by hacking or computer viruses.

Restrict access to personal information.
We take necessary measures to control access to personal information by granting, modifying, and deleting access to the database system that handles personal information.
We hold unauthorized access from outside by using an intrusion prevention system.
We are keeping connection logs and preventing forgery.
We support and manage the records of access to the personal information processing system for at least six months, and we use security features to prevent fraud, theft, and loss of access records.

Using a lock for document security
We keep the documents containing personal information and the auxiliary storage medium in a safe place with a lock.

Access control to unauthorized persons
We keep separate physical storage places for personal information and set up access control procedures.

9. Personal Information Management Officer and Person in Charge
The company is doing its best to ensure that you use the excellent information securely in case of any incidents that are against the notice to you in protecting personal information; the person in charge of personal information management is responsible.
The responsibility for maintaining the Security of the password of the user ID is related to the user.
The company does not ask the user directly about the password in any way, so please be careful not to let the password leak to the other person, especially if you are online in a public place.
Despite the company's technical remedies, we are not liable for damage to information due to unforeseen accidents caused by primary network dangers such as hacking.
The company has designated the personal information administrator and person in charge of collecting opinions and complaints about personal information, and the contact information is as follows [Personal information administrator].

10. Scope of Information Collection by third party libraries
ZedPay uses third-party libraries to provide our users with Security and the best user experience.
These libraries can get information like address, e-mail address, mobile phone number, etc. And this information is saved only during the service period to provide services or guarantee service quality continuously.

Ready to get started?

It only takes a few minutes to register your FREE ZedPay account.

Open an Accountimages