메뉴 바로가기
주메뉴 바로가기
컨텐츠 바로가기

컨텐츠

Ehtics Management Report

Huons is operating Fair Trace Compliance Program (CP).

All employees and managers of Huons are taking initiatives to bring in transparent management by incorporating fair trade compliance culture through the fair trade compliance program.

Subjects to report
  • - Receiving monetary gifts, entertainment, and convenience inappropriately from stakeholders
  • - Getting benefits or damaging the firm by taking advantage of positions and titles
  • - Impeding other employees’s work for the interests of themselves or others
  • - Disclosing business secrets and customer information without allowance
  • - Violating fair trade codes when handling medical products.

Ethical Management Report

Ethical Management Report
Ethical Management Report
--
Private Information Handling Policy

Please refer to private information handling policy for more information.

Private Information Handling Policy

 

Please refer to private information handling policy for more information.

Huons (hereafter referred to as “the firm”) highly values customer information and complies with “private information ptection act” and other relevant rules. The firm set and has complied with private information hanlding policy to protect the precious private information of our customers and the content is as follows;


The 1st Article General Rules

A. Private information refers to the information that can identify individuals in accordance with name and identification numbers and includes other information that does not identify alone but help identify an individual in combincation with other information.

B. The firm always publicizes private information handling policy on its official website in order for customers to check it out at any time.

C. The firm will be sure to announce any adjustment of prive information handling policy on the website by assigning the date of adjustment


The 2nd Article Items of Private Information to be Collected and Used
 
The firm collects and uses the following items:
A. Information for Job Application
- Necessary items: ID, password, name, data of birth, original address, current address, email, contact number (home and mobile), foreing/native
-Optional items: military information, physical conditions, family, job preference, academic backgrounds, foreign language/computer literacy, licenses, self introduction, career

B. Membershp Information
-ID, password, name, ID number, address, contract information (home and mobile phone), email

C. Supplier information
- Business name, Business registration no., CEO name, CEO ID number, business address, industry, sub-industry, telephone number, Institue symbol, email


The 3rd Article (Colleciton of Private Information and the purposes)

A. Information for Job Application
- Job application and recruiting requirements (Identifying applicants, judging appropriateness, announcing results)

B. membership information
- The purpose of managing members and sending gifts for special events

C. Suppliers’ information
- The purpose of collecting tax information to issues tax receipts and others.


The 4th Article (Time period of holding private information and using it)

Basically, the firm removes all private information immediately after the purpose of collecting and using it is accomplished. However, it reserves the information for the specific time period when it should comply with commercial law, e-commerce customer protection act, and other rules and regulation that specify the time period.
 
The 5th Article (Procedure of removing private information and the method)
 
The removing procedure and ways that the firm has set are as follows;

A. Removing procedure
- The information that users put in for job application will be transferred to databases after the purpose is accomplished (paper-based application will be transferred to a file cabinet), reserved for a certain period of tem specified in internal policies or other acts and removed. The private information moved to databases will never be used for other purposes than specified ones unless acts specify.

 B. Ways to remove
- Electronic file for private information will be removed in a way that they are never recovered.
- Private information wrttten in printed documents, paper, and other recoding media will be shredded or incinerated.


The 6th Article (Providing private information to the 3rd party)
 
In principle, the firm does not provide any private information to the third party. However, the following cases will be exceptions.
 
 -When customers agree
- When the information is necessary to protect the life, body, and wealth of information provider and 3rd party but there is no prior agreement because legal agents are under the condition that they cannot express or addresses are unkonw.
- When the information is provided for statistical and research purposes with individuals not identifiable
- When it is necessary to comply with legal requirements and other regulations such as tax reports


The 7th Artcile (Consignment of Collected Private Information)
To carry out services, the firm manages private information by consigning the task of handling private information to an independent specialty firm.
- Cineflower/Essel/Yourbirthday: delivering birthday cakes and bouquet to employees and managers
- Panaci: Managing IT system for compensation
-Youngrimwon: Managing ERP system
-Nami: Business card
- Dongyang life insurance/Seoul Guarantee Insurance
- Huam Resource Development Institute


The 8th Article (The rights and duties of information providers and the Way to Exercise)
 When customers request revising erroneous information, we do not use or provide it until the completion of revision. If an errorenous information is providered to the 3rd party, we will immediately let him/her know the revision and correct for it.
After the deadline for job application is passed, however, inquiries, revision, and deletion may be not possible for the procedural fairness and smooth recruiting process.


The 9th Article (Way to Guarantee Safety for Protection of Private Information)
The firm prepares the following managerial, technical, and physical measures to prevent private information from loss, stealing, disclosure, falsification, and damage and to secure safety in the process of handling customer information.

A. Manageiral measures
- The firm sets and undertakes internal management plans for handling private information safely.
The firm limits the access to private information by authorizing employees who directly address information providers in charge of sales and marketing, managing private information, and other tasks related to the information only.
- The firm provides regular education to the employees handling private information to ensure that they comply with private information protection act even after their retirement.
 
B. Technical Measures
- The firm complies with legal acts that specifiy safe storage and transmission of private information
- The firm undertakes measures to prevent computer viruses by using vaccine programs. The programs are regualarly updated and the new versions are also immediately provided to prevent private information from being hacked when unknown viruses unexpectedly occur.
- The firm dedicates to maintaining security to prepare for hacking and external break-ins by allowing authorized persons only to each server.

C. Physical Measures
- The firm ensures to protect private information and the system for handing private information by adopting physical measures including locking devices.
- Only authorized employees can access information archive and IT center.


The 10th Article (Civil services related to Private Information)
The firm has designated the following department and person to protect private information and address customer complaints.
Department in charge of private information: HR department
Telephone no.: 070-7492-5002
Manager in charge of private information: Manager of Strategic Management Division
Telephone no.: 070-7492-5038
Email:ys122@huons.com
 You can report any concerns related to private information that occur while using our service to the department and manager in charge of it. The firm will immediately provide detailed answers about them.

Feel free to contact the following institutes if you need further consultations and reports regarding other private information issues.
1. Private Information Infringement Reporting Center (www.118.or.kr/118)
2. Information Protection and Accreditation Committee (www.eprivacy.or.kr/02-580-0533~4)
3.     Office for investigating advanced crimes at Superme Public Prosecutor’s Office (www.spo.go.kr/02-3480-2000)
4. Cyber terror response center at Policy Agency (www.netan.go.kr/02-1566-0112)

The rules concerning private information was revised on September 30, 2011. The firm will notify the reasons for adjustment and the content through its official website when it has to add, delete, and revise the rules due to the enaction and revisions of legal acts, changes in governmental policies, and a firm’s internal policy and technology.


Date of enforcement for revised rules: June 1, 2012