Timeline Infinity

Privacy Policy

Timeline Infinity Privacy Policy

1. Items and Methods of Personal Information Collection

① Items of Personal Information Collected

Timeline Infinity (hereinafter referred to as the "Service") collects minimal personal information necessary for service provision.

② Methods of Personal Information Collection

Personal information is collected through information automatically collected during service use and information directly entered by users.

2. Purpose of Collection and Use of Personal Information

Collected personal information is used for the following purposes:

3. Sharing and Provision of Personal Information

The Service uses users' personal information within the scope notified in "2. Purpose of Collection and Use of Personal Information" and does not use it beyond that scope or disclose users' personal information to external parties without the user's prior consent.

However, exceptions are made in the following cases:

4. Entrustment of Personal Information Processing

The Service does not entrust users' information to external companies without user consent. If such a need arises in the future, prior consent will be obtained from users regarding the entrustment target and the scope of entrusted work.

5. Retention and Use Period of Personal Information

Users' personal information is destroyed without delay once the purpose of collection and use is achieved.

However, the following information is retained for the specified period:

6. Procedures and Methods for Destruction of Personal Information

Users' personal information is destroyed without delay once the purpose of collection and use is achieved.

① Destruction Procedures

Information entered by users for service use is moved to a separate database after the purpose is achieved and destroyed after being stored for a certain period in accordance with internal policies and other related laws for information protection.

② Destruction Methods

7. Rights of Users and Legal Representatives and Methods of Exercise

Users and legal representatives may at any time inquire about, modify, or request deletion of their registered personal information.

To inquire about, modify, or delete personal information, please contact the personal information manager in writing or by email, and we will take action without delay.

8. Installation, Operation, and Refusal of Automatic Personal Information Collection Devices

The Service uses 'cookies' that store and retrieve user information from time to time to provide customized services to users.

① Purpose of Cookie Use

Cookies are used to understand users' visits and usage patterns for each service and website visited, popular search terms, secure connection status, user scale, etc., to provide optimized information to users.

② Installation, Operation, and Refusal of Cookies

Users have the right to choose whether to install cookies. Therefore, users can allow all cookies, check each time cookies are stored, or refuse to store all cookies by setting options in their web browser. However, if you refuse to store cookies, you may have difficulty using some services.

③ Cookie Creation for Google Advertising

As an external ad server partner, Google uses cookies to provide ads on the publisher's site. Google may serve ads based on site visit records such as publisher sites using DART cookies. Users can opt out of DART cookie use on the Google Advertising and Content Network Privacy Policy page.

9. Technical and Administrative Protection Measures for Personal Information

The Service implements the following technical and administrative measures to ensure that personal information is not lost, stolen, leaked, altered, or damaged when handling users' personal information:

① Measures Against Hacking

The Service does its best to prevent users' personal information from being leaked or damaged by hacking or computer viruses. Data is backed up regularly to prepare for damage to personal information, and the latest antivirus programs are used to prevent users' personal information or data from being leaked or damaged. Encrypted communication is used to safely transmit personal information over the network.

Intrusion prevention systems are used to control unauthorized access from outside, and we strive to equip all possible technical devices to ensure system security.

10. Contact Information of Personal Information Manager and Person in Charge

Users can report all personal information protection-related complaints that occur while using the Service to the personal information manager.

The Service will provide prompt and sufficient responses to users' reports.

Personal Information Manager

For other reports or consultations regarding personal information infringement, please contact the following organizations:

11. Others

Please note that this "Privacy Policy" does not apply to websites linked to the Service that collect personal information.

12. Obligation to Notify

If there are additions, deletions, or modifications to the current Privacy Policy, we will notify you through the homepage notice at least 7 days before the revision.

Announcement Date: January 1, 2024

Effective Date: January 1, 2024