Chapter 1: Items and Methods of Personal Information Collection
1. Collected Information
· Required: Name, date of birth, gender, mobile phone number, email, license number, affiliated hospital/institution, membership type (specialist, private practitioner, etc.), username, password
· Optional: Address, academic conference participation history, membership fee payment history, Academy activity records
2. Collection Methods
· Online registration and service use via website forms
· Offline registration forms or on-site registration at academic conferences
· Member inquiries and requests submitted by email, phone, or fax
Chapter 2: Purpose of Personal Information Collection and Use
The Academy uses collected personal information for the following purposes:
01) Membership Management: Registration, identity verification, credential verification, and assigning membership levels
02) Conference Management: Pre-registration, payment processing, abstract submission, and issuing participation certificates
03) Service Provision: Sending newsletters, journals, and announcements
04) Accounting: Verifying membership and registration fee payments, issuing tax invoices
05) Statistics and Research: Member statistics and analysis of academic activities
Chapter 3: Retention and Use Period of Personal Information
1. Personal information is destroyed without delay once its purpose has been fulfilled.
2. However, the following records are retained for the periods required by law:
· Membership information: 5 years after withdrawal
· Accounting and tax records: 5 years (in accordance with the Framework Act on National Taxes, Value-Added Tax Act, etc.)
· Conference participation records: 3 years (for record-keeping purposes)
Chapter 4: Provision of Personal Information to Third Parties
The Academy does not provide personal information to third parties except in the following cases:
01) With prior consent of the individual
02) When required by law (e.g., to the National Tax Service, police, etc.)
Chapter 5: Outsourcing of Personal Information Processing
The Academy may outsource personal information processing for efficient service provision as follows:
| Contractor |
Purpose of Outsourcing |
Retention Period |
| Hong Communication Co., Ltd. |
Website maintenance and management |
Until termination of contract |
| Allineun Saramdeul Co., Ltd. |
SMS, KakaoTalk notification, and friend talk delivery |
Stored and destroyed in accordance with relevant laws |
| Daou Technology Co., Ltd. |
Email delivery service |
Stored and destroyed in accordance with relevant laws |
| Toss Payments Co., Ltd. |
Processing membership and registration fee payments |
Stored and destroyed in accordance with relevant laws |
※ The Academy specifies necessary protective measures in contracts and supervises contractors.
Chapter 6: Rights of Data Subjects and How to Exercise Them
1. Members may view, correct, or request deletion of their personal information at any time, and may request membership withdrawal.
2. Requests for access, correction, deletion, or suspension of processing may be made via My Page on the website or by email.
3. Legal representatives may request access or correction of information for members under the age of 14.
Chapter 7: Destruction of Personal Information
1. Personal information is destroyed promptly after its intended purpose has been fulfilled.
2. Destruction methods:
· Electronic files:Permanently deleted using technical methods to prevent recovery
· Paper documents:Shredded or incinerated
Chapter 8: Measures to Ensure Safety of Personal Information
The Academy implements the following measures to ensure information security:
· Restricting access to personal information and training administrators
· Using secure servers (SSL encryption)
· Encrypting stored passwords
· Operating security programs to protect against hacking and viruses
Chapter 9: Personal Information Protection Officer and Contact Information
The Academy designates the following personnel to handle privacy-related inquiries and complaints:
Personal Information Protection Officer
· Restricting access and providing administrator training
· Secure Socket Layer (SSL) implementation
· Password encryption
· Security programs against hacking and viruses
Personal Information Manager
· Restricting access and providing administrator training
· Secure Socket Layer (SSL) implementation
· Password encryption
· Security programs against hacking and viruses
Chapter 10: Notification of Changes to the Privacy Policy
This Privacy Policy may be amended in accordance with relevant laws or the Academy’s internal policies. Any changes will be announced on the website.
· Effective Date: June 10, 2025
· Last Revised: June 10, 2025