Privacy Policy

General Outline

T&G Ventures (the "Company) abides Personal Information Protection regulations, such as Personal Information Protection act, and protects personal information and rights of users as well solving any problems deriving from the use of personal information by following the policy below.

Privacy policy of the company includes the terms below.

1. Purpose of collecting personal information
2. Period for retention and use of personal information
3. Collected items and method of collection
4. Users' right to access and option
5. Destruction of personal information
6. Personal and contact information of personal in charge of protection of personal information
7. Measures to ensure safety of personal information
8. Modification of Privacy Protection Policy

1. Purpose of collecting personal information

(1) The Company uses the collected information of users for the following purposes. The information is not used in any other purposes, and if the Company desires to use the information other than those expressly stated in this Policy, the Company agrees that it will obtain consent from the users.

① Member management and identification
② Providing answers to any user inquiries
③ Performance of contract and service fee settlement regarding provision of services demanded by the users
④ Improvement of existing services and development of new services

2. Period for retention and use of personal information

(1) By law, the Company desctructs personal information of users without delay when: the purpose of its collection and use has been achieved; the legal or management needs are satisfied; or users requests: Provided that, if it is required to retain the information by relevant laws and regulations, the Company will retain member information for certain period as designated by relevant laws and regulations. The information to be retained as required by relevant laws and regulations are as follows:

① The Protection of Communications Secrets Act
- Log record of users such as internet/data detecting the place of user connection: 3 months
② The Act on Consumer Protection in Electronic Commerce
- Record on payment and supply of goods : 5 years
- Record regarding contract or withdrawal of subscription: 5 years
- Record on consumer complaint or dispute treatment: 3 years

(2) Yet, the Company will retain member information for certain period as described in below terms.

① When investigation regarding relevant law or regulation is in process: until the end of investigation.
② When liabilities and debt caused by the use of service remains: until the settlement of liabilities and debt.br>
3. Collected items and method of collection

(1) The Company collects items below to provide various services which require customized services such as membership, customer services, etc.

Title Collected Items Purpose of collected items
Required Information ID (e-maill address), password, full name, date of birth, mobile phone number - Membership registration and management of member information
- Providing membership services
- Personal verification
Optional Information ATOM e-wallet address - Customized services



(2) The Company does not collect financial information (bank account password, credit card information, cryptocurrency recovery key, password) and social security number which provide risks of fradulent use in any way.

(3) In the course of using services, the information as described below may be created and collected.

A. Service usage record
Connection log, cookie, internet protocol information, delegation and undelegation records, fradulent use record, MAC address, ATOM rewards, real ATOM income, total held ATOM)
B. Service transaction information
Information collected for service fee billing, services related to transactions, customer service and complaint handling, such as terms of transaction, trasaction time, and transaction amount.

(4) Method of personal information collection

The Company collects personal information online through the methods below.
A. Information manually input by the user
B. Usage of information collection tools

4. Users' right to access and option

(1) The suers may exercise the following options regarding the collection, use and sharing of personal information by the Company.

1. Exercise the right to access to personal information
2. Make corrections
3. Request for deletion
4. Request the withdrawal of their consent provided before

(2) By enforcement decree of Protection law, in order to exercise the above options, you, as an user, can contact the Company by document, e-mail, FAX and other methods, and the Company will take measures without delay.

(3) The user may exercise the options of (1) through legal representative as main agents of information. A power of attorney following annexed paper number 11 of The Personal Information Protection enforcement regulation must be submitted.

(4) By Article 35 Clause 5, Article 37 Clause 2 of Personal Information Protection Act, the power of main agent of information may be limited.

(5) The user cannot request for modification and deletion of Personal Information if other legislation specifies the requested information to be collected madatorily.

(6) The Company verifies the legal rights of main agent of information when the main agent requests for disclosure, modification, deletion or withdrawal.

(7) The Company make efforts to notify the users that any information collected from sources other than the user, the main agent of information may request for suspesion of treatment of personal information.

5. Destruction of personal information

The Company destructs the information immediately after the purpose of its collection and use have been achieved without delay.

(1) Destruction Procedure
① The Company destructs the information immediately after the purposes of its collection and use have been achieved without delay.
② If any information is to be retained as required by relevant laws and regulations, the Company retain it for the period as required by those laws and regulations before destruction and, in such event, the personal information which is stored and managed separately will never be used for other purposes.

(2) Destruction Method
① Hard copies of personal information by shredding with a pulverizer or incinerating it
② Delete personal information stored in the form of electric file by using tehchnological method making that the information could not be restored.

6. Personal and contact information of personal in charge of protection of personal information

(1) The Company designated Personal Information Protection personnel who is responsible for the Company's privacy policy, processing and complaint handling regarding the privacy policy as the member below. In case of an issue regarding Privacy Policy and personal information protection user may contact the designated staff .

[Staff responsible for managing personal information]
- Name : Woosik Kim
- Company : T&G Ventures
- Phone Number : 031-566-2019
- e-mail : contact@nodeateam.com

(2) For other privacy complaint, contact the organizations below. (The below organizations are separate from the Company, and should be contacted when the Company's personal information protection does not satisfy the user's need.)

- Privacy Complaints Center : 118 (privacy.kisa.or.kr)
- Personal Information Dispute Mediation Committee : 1833-6972 (www.kopico.go.kr)
- Prosecution Service : 1301 (www.spo.go.kr)
- Korean National Policy Agency Cyber Bureau : 182, (cyberbureau.police.go.kr)

7. Measures to ensure safety of personal information

(1) In order to prevent the loss, theft, leakage, alteration or damage of personal information of the users, the Company takes technical, managerial and physical measures for securing safety as follows:

① Managerial measures: Provide education and training for staffs treating personal information
- Appoint a staff responsible for protecting personal information
The Company limits the processing of personal information only to designated staff who holds passwords to access personal information storage and receives training on personal information protection.
- Establish and execute internal management plan
For safe handling of personal information, the Company establishes and execute internal management plan.
- Internal audits on regular basis
② Technical measures: Protection of personal information
- Limited access to personal information storage
To limit access to personal information, authority to access personal information processing database is controlled, and prevent external intrustion through adopting Intrusion Prevention System.
- Forgery prevention of connection log
- Technical measures preventing hacking, etc.
③ Physical measures: Store documents and backing storage containing personal information in safe places with locking device
- Store documents and backing storage containing personal information in safe places with locking device
Documents containing personal information, backing storage etc., are stored in safe places with locking devices.

8. Modification of Privacy Protection Policy

The Company has the right to amend or modify this Policy from the time to time and, in such case, the Company will make a public notice to the users.
This Privacy Policy will be effective on the 10th day of April, 2019.

TOP