Privacy Policy
RSUPPORT Privacy Policy
This Privacy Policy sets forth how RSUPPORT gains access to and uses your personal information in the context of service. Please read it carefully before using service.
■ Introduction
RSUPPORT Co., Ltd. (“RSUPPORT”, “we”, or “our”) is committed to protecting the information of those individuals and organizations who use service contained herein.
This Privacy Policy sets forth how we collect, use, and share information we obtain as a result of your use of service and, in particular, sets forth:
1. What information we obtain from service;
2. How we use the information that we obtain;
3. When we share information with others; and
4. How you control our use and sharing of your information
Your service may provide access to software application and links to other services owned and operated by third parties including operating system providers and other contents and application providers. These third party services are outside the scope of this Privacy Policy and have their own policies that apply to the collection, use and sharing of information in connection with their services. We encourage you to read those policies. RSUPPORT is not responsible or liable for the privacy practices of such third parties.
■ How RSUPPORT Uses the Personal Information It Obtains
We use information obtained from your use of service for various purposes, including:
1. To provide service you requested;
2. To analyze, review and improve service we offer;
3. To protect and defend our rights and property, including by way of legal proceedings;
4. To comply with regulatory requirements; and
5. For internal record keeping.
The legal basis on which we will rely on to process your personal information will typically be one of the following:
1. Contract: where it is necessary to perform a contract with you
2. Legitimate interests: where it is necessary to pursue our or a third party’s legitimate interests (this includes where it is necessary for our business with public interest purposes or to exercise public authority granted to us, and where it is necessary to protect our or a third party’s material interests)
3. Consent: where you have consented to provide it. You have the right to withdraw your consent at any time
4. Legal obligation: where the processing is necessary for compliance with our legal obligations
■ Period of Retention of Users’ Personal Information
We will take reasonable measures to ensure that we only keep your personal information for as long as is necessary for us to provide you with service or for the purpose for which it was collected or as required by applicable law. We apply criteria to determine the appropriate retention period for different categories of personal information you provide us with. For instance, we will keep information necessary to protect us in a legal claim, such as information relating to a contract, for the term of the contract and up to one year thereafter. After the expiration of such a period, the relevant information will be deleted or anonymized. Where we have collected the personal information based on your consent and we have no other legal basis to continue with that processing, if you subsequently withdraw your consent, then we will delete your personal information.
If you request for deletion of your personal information because it is no longer needed, or based on an objection to the processing or a claim that the processing is illegal, you have the right to request a restriction on the processing while we verify your request for deletion.
■ Information Obtained by Service
The information we may collect when you use the service is as follows:
Service | Menu | Collected personal information item |
---|---|---|
RSUPPORT Corporate Site | Partnership Inquiry | (Required) Company Name, Email, Mobile |
Contact US | (Required) Name, Email, Phone Number | |
Customer Feedback | (Required) Email | |
RemoteCall | Free Trial | (Required) Name, Company Name, Phone Number, Email |
Use of service | (Required) OS Information, IP Address(Public, Private), MAC Address, Service usage record, Device Information, Cookies, Payment History(Optional) Name, Phone Number, Email, Location Information | |
RemoteView | Purchase | (Required) ID, Name, Cell phone number, phone number, Email |
Free Trial | (Required) Company ID, User ID, password, Name, Phone Number, Email, Company Name | |
Use of service | (Required) OS Information, IP Address(Public, Private), Service usage record, Device Information, Cookies, Payment History In the process of remotely controlling Android devices, RSUPPORT utilize the Google Account stored in the operating system. This information is used solely for the purpose of providing the service during usage and is not stored in the database. |
|
RemoteMeeting | Purchase | (Required) ID, Name, Cell phone number, phone number, Email |
Free Trial | (Required) Company Name, Department Name, Time Zone, Name, Contact Number, Email | |
Use of service | (Required) OS Information, IP Address(Public, Private), Service usage record, Recorded Files, Device Information, Cookies, Payment History | |
Mobizen | Sign Up | (Required) Google Email (Optional) Name, Profile Image [Simple Login Method(Google)] |
Use of service | (Required) OS Information, IP Address, Cookies, Country Information, Regional Information, Access Device Information, Payment History | |
LiteCam | Purchase | (Required) Email, Name, Country, Credit Card Number, Expiration Date, Security Code (Optional) Zip/Postal Code, City, Company, Street Address |
HelpDesk | Submit a request | [RemoteCall, RemoteView, RemoteMeeting] (Required) Email, Name, Company Name, Phone Number, Company ID/User ID [RemoteVS] (Required) Email, Name, Company Name, Phone Number [Mobizen] (Required) Email [LiteCam] (Required) Email, Name, Company Name, Phone Number |
RFICE | Free Trial | (Required) Email (Optional) Profile Image [Simple Login Method(Google, Apple)] For your convenience, we offer a simple login option using Google or Apple. When you log in, the RFICE service will access your email address, language preference, and profile photo from the selected login platform. By linking your RFICE account with a login platform account, you agree to comply with the platform’s privacy policy. For more details, please refer to the following links: – Google Privacy Policy – Revoke Google Access – Apple Privacy Policy – Revoke Apple Access |
Use of service | (Required) OS Information, IP Address, Service usage record, Access Device Information (Optional) Phone Number, Recorded Files |
|
AI:repoto | Sign Up | (Required) Email, Name, Company Name, Phone Number [Simple Login Method(Google, Microsoft)] For your convenience, we offer a simple login option using Google or Microsoft. When you log in through a supported platform, the AI:repoto service collects publicly available personal information associated with your account. Additionally, you can view, modify, share, and permanently delete schedules in Google Calendar through the service. By linking your AI:repoto account with a login platform account, you agree to the respective platform’s privacy policy. For more details, please refer to the following links: – Google Privacy Policy – Revoke Google Access – Microsoft Privacy Policy |
Use of service | As part of the service, users’ call recordings, teleconferences, and other audio and video files are transmitted to the AI:repoto server. Audio files are converted to text, and the converted text is stored on the AI:repoto server. This allows users and workspace members to access and utilize the content anytime, anywhere. Service Details: [Telephone Conversion Service] (Required) Call recording files, file properties (e.g., name, duration) (Optional) Caller’s phone number [Video Conference Recording and Text Conversion Service] (Required) Video files, calendar details (user’s schedule), online meeting access links [On-Site Voice Recording and Text Conversion Service] (Required) Voice recording files [Meeting Summary Generation Service] (Required) Text-converted content |
■ Protection of Children’s Personal Information
Protecting the personal information of children is important to us.
For that reason, When collecting personal information of children under the age of 16, the child may be asked for minimum information, such as the name and contact information of the legal representative.
■ Sharing of Personal Information
While we generally do not share personal information with third parties, please note that in the following circumstances, we may share personal information with the third parties:
1. Third parties when required by law: As required by court order or other government or law enforcement authorities in order to comply with legal process or law;
2. Third parties in connection with corporate transactions: In connection with a corporate event, such as a merger or sale of all or part of our business (including that of a division or subsidiary), where we may need to disclose information to a potential buyer and its professional advisors.
3. Third parties when it is necessary to protect our services: In order to protect and defend our rights and assets, including by way of legal action
4. Third parties when it is to protect any of our users’ personal safety or assets: In order to protect the safety or assets of our users or the public
5. All data collected during the use of the service is stored on systems provided by the following cloud platforms:
ㆍAmazon Web Services, Inc. (“AWS”): AWS may have access to your data, and its data privacy policy governs the handling of all data stored within AWS’s systems.
ㆍOracle Cloud Infrastructure (“OCI”): OCI may have access to your data, and its data privacy policy governs the handling of all data stored within OCI’s systems.
■ Transfer of Personal Information
We may need to transfer your information (including your personal information) in countries other than the country you reside, for example to our headquarters in South Korea. This will include transferring your information outside the European Economic Area or Switzerland. We may transfer your personal information in this manner in order to provide you with the Services and for any other purposes outlined in this Privacy Policy, consistent with this Privacy Policy and any applicable laws. You will need to provide your consent to this in order to use the Services. You should also bear in mind that the data protection laws in many of these countries may not offer the same level of protection as those in your home country. However, before transferring your information we will take necessary steps to ensure that such information will be afforded the same level of protection. By agreeing to this Privacy Policy you expressly consent to us and our business associates and suppliers processing your data in any jurisdiction, including, without limitation, South Korea and the United States of America, in accordance with this Privacy Policy. For further information on how we handle and protect your personal information, please contact us at privacy@rsupport.com.
■ Accessing Your Information and Your Rights
Under the laws of each jurisdiction, you may have the right to request access to, rectification or deletion of, the personal information we hold about you or the right to object to or restrict certain types of processing of your personal information (or to withdraw your consent to our personal information processing), or to receive a machine-readable copy of your personal information. If permitted by law, a small fee for providing you with such service may be charged. Please note that we may decline to process your requests to the extent permitted by law if they are unreasonable or malicious, jeopardize the privacy of others, or are extremely impractical. For further information or to exercise any of these rights, please contact us at privacy@rsupport.com.
■ Security
We are using the following efforts to protect the secrecy and maintain the security of your personal information.
[Operation of Security Management System]
ㆍWe take security measures in accordance with the data protection regulations.
ㆍWe have established and are implementing our internal management system designed to prevent data loss, ensure data integrity and regulate access to data.
ㆍWhen our employee accesses any personal data he/she must use his/her ID and password to authenticate such access, and we have established and are in compliance with the regulations on password setting requirements (such as combination of characters and numbers and length of password), frequency of password change, and other management matters.
[Internal Regulations for Information Security]
ㆍWe have enacted and are implementing the information security policies and detailed guidelines for the protection of data assets
ㆍWe are carrying out security campaigns together with our annual information security training in order to improve knowledge of our officers and employees on information security.
ㆍWe are operating a separate division for managing information security and personal information, and annually amend our information protection policies and guidelines and carry them out in accordance with the annual plan, and have enacted and are implementing internal rules regarding information security.
[Compliance with Security Standard Technology]
ㆍWe have established and are implementing our internal management system based on the international/domestic information protection management system standards in order to protect our information assets.
ㆍSensitive personal information such as passwords are safely stored by using SHA-2 based SHA-256 cryptographic hash algorithm.
ㆍWe develop and review in compliance with safe development security guidelines, and have established and are applying countermeasures and precautionary measures with respect to relevant cyber security threats.
[Full Maintenance of Information Security Audit System]
ㆍSecurity settings through account management, access control, system security settings, service & log management, and patch management to prepare the system against any outside security breach is compulsory.
ㆍWe comply with the laws and regulations relating to information security, and our internal information security policies and guidelines, and carry out internal security audit and verification activity once a year in order to confirm that effective functions are maintained.
ㆍWe also periodically detect and promptly resolve any potential security vulnerability issues through utilizing simulation hacking service of a third party security agency.
ㆍIn response to the annually released top 10 list of web vulnerabilities (OWASP TOP10), we eliminate related vulnerabilities and pay full attention to inspections through various inspection tools.
[AI processing security of user data]
To ensure the protection of user information while providing AI-powered functions within the company’s services, the following measures have been implemented:
ㆍAI processing of user data: AI does not learn from input or output data. Uploaded data is retained for a limited period for service provision and can be deleted upon the user’s request.
ㆍData Encryption: Data is encrypted during transfer using TLS 1.2+ and stored securely with AES-256 encryption, preventing unauthorized access from external sources.
ㆍAccess control: Access to user data is restricted to a minimum number of authorized personnel, and a strict access control system is in place. All access to user data is logged and can be reviewed for accountability.
ㆍEnsuring the reliability and fairness of AI systems: AI models are regularly reviewed and managed to ensure fair and unbiased operation. Advanced technical measures are taken to protect users’ data and maintain system integrity.
ㆍSecurity and Audit System Operations: Regular security audits are conducted to safeguard user data. The company maintains detailed activity logs for all data processing and prepares for potential security incidents.
Notwithstanding the foregoing, we do not guarantee that no third party would interfere with the communication between you and RSUPPORT or that we would not be exposed to a security breach, due to the design methods of the Internet, continuous technological changes and any other factors that are beyond our control. We shall not be responsible for any leakage or exposure of personal information due to any transmission errors or unauthorized or unlawful action of a third party
■ Why RSUPPORT Uses Cookies and Other Similar Technologies and How to Reject
[What is Cookie?]
A cookie is a small text-only file sent to your browser by a server used in operating a website which you visit and saved in your computer’s hard drive. When you visit the website again, the server of that site will read the cookie saved in your hard drive and uses it to maintain your preferences and provide customized services. The cookie does not automatically/actively collect personally identifiable information, and you may refuse to save or delete such cookie.
[Purpose of Using Cookies and Information Obtained]
We use the cookies for target marketing and provide you with personally customized services by analyzing frequency, number and time of your visit and understanding your preferences, field of interest, and level of your participation in various events.
We only collect anonymous information generated by the cookies (such as demographic data) through the cookies and other similar technologies, and do not collect personally identifiable information. We do not combine such anonymous information with any personally identifiable information obtained through other ways.
[Use of Other Similar Technologies]
Analysis Service Provider | Privacy Policy |
---|---|
Google Analytics | https://marketingplatform.google.com/about/analytics/terms/kr |
Google Firebase | https://firebase.google.com/support/privacy |
You have the right to election in respect of the installation of cookies. You may reject (opt-out) the automated collection of cookies by using one of the following methods; however, please note that if you elect to reject the collection of cookies, you may experience difficulties in using the services.
ㆍHow to Reject the Collection of Cookies in the Microsoft Edge Browser
① Select [Settings] from the More menu in the upper right corner.
② On the [Settings] tab, select [Cookies and site permissions].
③ In [Manage and delete cookies and site data], click [Disable].
ㆍHow to Reject the Collection of Cookies in the Chrome Browser
① Select [Settings] from the More menu in the upper right corner.
② Select [Advanced] at the bottom.
③ In [Privacy & Security], select [Content Settings].
④ Select [Cookies] and turn [Allow sites to save and read cookie data] off.
■ Use of custom online ads
1. The company uses the user’s ad identifier, visit history, cookie data, etc. (“activity log”) to provide useful advertising to the users considering their characteristics. An Advertising id is a nonpersistent, non-persistent identifier that is used to provide customized information or advertising to users with an id issued by the mobile operating system and is not used to identify individuals.
Custom ad service providers that collect activity logs | Items in the activity log you collect | Activity log collection method | Purpose of activity log collection | Activity log retention period |
---|---|---|---|---|
AdMob | Advertising identifiers, IP-based approximate location information, cookie data, payment information, app activity information, app information, and performance information | Automatic collection and transmission when using the service | to provide customized ads based on estimated gender and age groups and interests based on demographic characteristics | Retention of the activity log in accordance with the length of the contract with the online customized advertising service provider and the retention of relevant laws |
UnityAds | ||||
Pangle | ||||
AppLovin |
2. By changing the settings of the device or contacting a custom ad provider, users can refuse to use the advertising id for ads based on interest or reset it.
ㆍMicrosoft Edge users: (Settings→Privacy, search, and services→’Tracking prevention’,
‘Always use “Strict” tracking prevention when browsing InPrivate’ ON)
ㆍChrome users: (Settings→Privacy and Security→’Block third-party cookies’ ON)
ㆍAndroid users: (Settings→Google→Ads→’Opt Out of Ads Personalization’ ON)
ㆍiOS Users: (Settings→Privacy→Advertising→’Limit Ad Tracking’ ON)
To find out how to contact a custom ad provider, please refer to the contact number within the link of your custom ad provider above. For more information on how to save users, please contact us at privacy@rsupport.com
■ Contact Information
RSUPPORT’s Data Protection Officer’s contact information is as follow:
RSUPPORT Co., Ltd.
Data Protection Officer, DPO: Director of Global Marketing Division
Address: 12, Godeokbizvalley-ro 2ga-gil, Gangdong-gu, Seoul, 05203, Republic of Korea
E-mail: privacy@rsupport.com
If you have any questions or comments about this Privacy Policy or RSUPPORT’s processing of your personal information, please reach out to us at the address, phone number or email address written above. You also have the right to lodge a complaint with a data protection authority; however, we would encourage you to first contact us directly to resolve any concerns.
■ Changes to RSUPPORT’s Privacy Policy
This Privacy Policy may be amended or updated by us from time to time. If we make a material change to our Privacy Policy, we will inform you through our website or other means, and will publish it on our website for review by the users. Please refer to our last updated Privacy Policy. You may be required to agree to the amended/updated Privacy Policy in order to continue using the relevant service.
Last updated Date: December 13, 2024