Legal Policy
Use of Trademarks, Logos and Copyrights
This page is owned and operated by company. The presentation and each of the materials, including trademarks (IRIVER and Astell&Kern), logos (IRIVER and Astell&Kern), text, photo images, wordmark, variation, slogan, and taglines (the evolution of a masterpiece, Music Friend in my Pocket) posted on the page located at [URL address to be inserted], are protected by the applicable laws as regards intellectual property, and are owned by company, or have been subjected to authorization of use granted to it.
No material from the page may be copied, reproduced, modified (including parody), republished, uploaded, distorted, transmitted, or distributed in any way, on any support, in total or in part, without prior written consent, except for press use only, on condition that intellectual property rights and all other property rights are respected. The only authorized copies are for personal, non-commercial, home use.
All authorized use of visuals, whether constituting the page or included within it, must not be distorted, modified or altered in any way whatsoever.
Company reserves the right to take legal action against any counterfeit of its intellectual property rights.
Privacy Policy
The “AK TWS APP” service provided by Dreamus Company (hereinafter referred to as the “Company”) places top priority on protecting the personal information of each customer. To this end, the Company uses its best endeavor to handle such information safely in compliance with the relevant laws and regulations, including the Personal Information Protection Act and the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. We inform you that this “AK TWS APP” does NOT process any personal information.
1. Purposes and items of collection/use of personal information and retention period
The Company does NOT collect, use or retain any personal information.
2. Consignment or provision of personal information to third party for processing
The Company does NOT retain any personal information. Therefore, there is also no personal information consigned or provided.
3. Destruction of personal information
The Company does NOT collect, use or retain any personal information. Therefore, there is also no personal information to be destroyed.
4. Rights and obligations of customers and their legal representatives, and the exercise of rights
(1) Customers can exercise the right to request to view, correct, delete, or suspend the processing of personal information at any time.
(2) The exercise of rights pursuant to Paragraph (1) may be done in writing, e-mail, fax, etc. in accordance with Article 41 (1) of the Enforcement Decree of the Personal Information Protection Act, and the Company will take action without delay.
(3) The exercise of rights pursuant to Paragraph (1) may be done through an agent such as a legal representative or a person who has been delegated. In this case, the customer must submit a power of attorney in accordance with the form of Attachment No. 11 of the Notice on Personal Information Processing Method (No. 2020-7).
(4) A request to view or suspend the processing of personal information may be restricted pursuant to Articles 35 (4) and 37 (2) of the Personal Information Protection Act.
(5) For any information subject to collection by other laws and regulations, the correction or deletion of such information cannot be requested.
(6) Upon a request to view, correct, delete, or suspend the processing of personal information by a customer according to the rights of such customer, the Company shall confirm whether the person who made the request is the customer himself/herself or legitimate agent.
5. Measures to ensure the safety of personal information
The Company takes the following measures to ensure the safety of personal information.
(1) Technical measures
The Company has implemented the following technical measures to prevent the loss, theft, leakage, tampering, or damage of personal information when handling, thereby securing the safety thereof.
i. Personal information is protected with a password, and critical data is protected with an additional security function, encryption.
ii. The Company prevents damage caused by computer viruses through the use of antivirus software. It deters privacy infringement by regularly updating the antivirus software and ensuring the immediate provision of the updated software when the computer gets infected with a virus.
iii. The Company adopts a security system (Secure Sockets Layer, SSL) using a cryptographic algorithm for the secure transmission of personal information over the networks.
(2) Administrative measures
i. The Company minimizes the number of persons who have access to personal information. Persons with access are as follows:
- Persons who directly provide services to customers;
- Persons in charge of personal information management, such as personal information protection officer and personal information protection manager; and
- Persons who unavoidably handle personal information when performing their duties
ii. The Company has established a procedure necessary for access and management of customers’ personal information, ensuring the understanding and compliance of such procedure among employees, and conducting regular in-house training and outsourced training on new security technologies and personal information protection obligations for those who handle personal information.
iii. The handover of responsibilities of a person who handles personal information is carried out while thoroughly maintaining security, and clearly defining liability for personal information infringement after joining and leaving the Company.
iv. Access is controlled by designating the computer room and data storage room as restricted areas.
v. When processing customers’ personal information using a computer, the Company designates a person with access to personal information and provides an identification code (ID) and a password, and regularly updates the password.
vi. The Company prevents information leakage by employees in advance by requiring newly hired employees to sign an information protection pledge or personal information protection pledge, and by establishing a procedure for regular inspections on the implementation of this privacy policy and the employees’ compliance.
vii. The Company requires retiring employees to sign a confidentiality agreement to deter the damage, infringement, or leakage of personal information by those who handled customers’ personal information in the course of their job.
viii. The Company is not liable for any problem that occurred due to a customer’s own mistakes or basic internet risks.
ix. When visiting another website while logged in to one site from a shared PC, be sure to exit from the website before accessing a new site. Otherwise, the personal information of the customer, such as name and mobile phone number, may easily be leaked to others through the browser.
x. In addition, if the personal information is lost, leaked, tampered, or damaged due to the mistake of an internal manager or an accident in technical management, the Company will immediately notify the customers affected and provide appropriate countermeasures and compensation.
6. Matters concerning the installation and operation of an automatic personal information collection device and its rejection
The Company does NOT use “cookies” that store and frequently retrieve the customer’s information of usage.
7. Contact information of the personal information protection officer and personal information protection manager
The Company has a personal information protection officer and a personal information protection manager to protect the personal information of customers and handle complaints related to personal information. If you have any questions on personal information, please contact the personal information protection officer and personal information protection manager below:
(1) Personal information protection officer
- Name: Jeajoon Kim
- Department: CISO of DREAMUS COMPANY
- Contact: 1577-5557 / iriver@iriver.com
(2) Personal information protection manager
- Name: Sunghun Kim / Unit Leader
- Department: IRIVER Business Co. Device Business Office CS Unit
- Contact: 1577-5557 / iriver@iriver.com
8. Methods to request access to personal information and remedy infringement of rights
(1) Reception/processing department of personal information access request
- Name: Sunghun Kim / Unit Leader
- Department: IRIVER Business Co. Device Business Office CS Unit
- Contact: 1577-5557 / iriver@iriver.com
(2) Customers may apply for dispute resolution or consultation to the Personal Information Dispute Mediation Committee, the Personal Information Infringement Report Center of the Korea Internet & Security Agency, etc. In addition, for reports and consultations on other personal information infringement, please contact organizations as follows:
1. Personal Information Dispute Mediation Committee: 1833-6972 (www.kopico.go.kr)
2. Personal Information Infringement Report Center: 118 (privacy.kisa.or.kr)
3. Supreme Prosecutors’ Office: 1301 (www.spo.go.kr)
4. Korean National Police Agency: 182 (ecrm.cyber.go.kr)
Anyone whose rights or interests have been infringed due to a disposition or omission by the head of a public institution under Article 35 (Access to Personal Information), Article 36 (Rectification or Erasure of Personal Information), and Article 37 (Suspension of Processing of Personal Information) of the Personal Information Protection Act may file an administrative appeal in accordance with the Administrative Appeals Act.
※ For more information on administrative appeal, please refer to the website of the Online Administrative Appeals (www.simpan.go.kr).
9. Amendment to the Privacy Policy
This privacy policy is effective from February 7, 2022.