Skip to contents
Skip Global navigation
Skip Contents
Skip Footer

ICT Innovatorleading the 4th Industrial Revolution

Privacy Policy

The Electronics and Telecommunications Research Institute (ETRI) develops and discloses the following personal information handling guidelines to protect personal information in accordance with Privacy Act and take care of related matters quickly and properly.

  • Article 1 (Purpose of collection, items, use and period of use of personal information)

    We shall NOT collect or use the personal information for any other purposes. If the purpose of use changes, we shall take necessary actions such as getting an approval.
    ※ For disclosure of the personal information files, follow the following steps; Privacy Information Protection Portal (www.privacy.go.kr) → Civil Petition on Personal Information → Request for Personal Information → [Personal Information File List Search].

  • Article 2 (Supply of personal information to third party)

    We shall handle personal information within the scope stipulated in Article 1 above. The personal information shall NOT be disclosed to a third party unless the provisions of Articles 17 and 18 (ex: getting approval, particular laws, etc.) met.

  • Article 3 (Handling of personal information by proxy)
    1. ① We shall stipulate the followings (ex: Inhibition of handling personal information with other purposes in accordance with Privacy Act, technical & managerial protection, restriction on reassignment, supervision on assignee, responsibilities such as compensation, etc.) at signing of the assignment agreement and supervise the assignee if he/she safely handles personal information.
    2. ② If the details or the assignee change(s), it shall be disclosed immediately in accordance with the Privacy Policy.
  • Article 4 (Rights and duties and methods of exercising those rights)
    1. ① The information owners shall have the right to exercise one of the followings for privacy protection against us any time:
      1. 1. Request for personal information
      2. 2. Request for correction of errors
      3. 3. Request for deletion
      4. 4. Request for stopping the process
    2. ② The right stipulated in the Paragraph ① above can be executed in writing, on the phone, by email or by fax. Then, we shall take an action immediately.
    3. ③ If the information owner requests personal information to be corrected or deleted, we shall NOT use or provide the information until it is properly corrected or deleted.
    4. ④ The right stipulated in the Paragraph ① above can be executed by proxy or legal representative. In this case, a power of attorney prepared in accordance with No. 11 Form of Enforcement Regulation of Privacy Act should be submitted
    5. ⑤ The information owners shall NOT interrupt us from handling their information and infringe on others' privacy by violating related laws such as Privacy Act.
  • Article 5 (Destruction of personal information)
    1. ① We shall immediately destruct personal information if it become unnecessary because of reasonable reasons such as the expiry of the holding period and achievement of the purpose.
    2. ② We shall immediately destruct personal information if it become unnecessary because of reasonable reasons such as the expiry of the holding period and achievement of the purpose.
    3. ③ The personal information shall be destructed as follows:
      1. 1. Destruction procedure
        We shall select the personal information (or personal information file) which is subject to destruction and destruct it after getting an approval from the Privacy Policy Manager.
      2. 2. Destruction method
        In terms of destruction of personal information, digital records should not be recovered while paper records should be shredded or incinerated.
  • Article 6 (Securing safety of personal information)
    1. ① We shall take following actions to keep personal information safe:
      1. 1. Managerial action: Establishment and execution of international management plan, regular staff education, etc.
      2. 2. Technical action: Restriction on access to personal information processing system, installation of access control system, encryption of identification information, installation of security program, etc.
      3. 3. Physical action: Restriction on access to a computer room, archive, etc.
  • Article 7 (Personal information control manager)
    1. ① We shall be responsible for the duties associated with handling of personal information and have the personal information control manager to handle the personal information-related matters as follows:
      1. 1. Personal information control manager
        • Name: Park, Jong Pal
        • Job Title: Director of Operating & Security Office
        • Job Position: Chief administration manager
        • TEL: 042-860-0880 send to
      2. 2. Personal information control staff
        • Dept.: Information Security Team
        • Person in charge: Chief technical manager Kim Gi-jae
        • TEL: 042-860-4804 send to
    2. ② Information owners shall contact the personal information control manger and the related department to ask matters associated with the protection of personal information, complaints and compensation. We shall promptly respond to these questions.
  • Article 8 (Request for personal information)
    1. ① The information owners shall have the right to ask for personal information in accordance with Privacy Act. Then, we shall take a prompt action to allow the information owners to read the personal information.
      1. 1. Department to handle the request for personal information
        • Dept.: Information Security Team
        • Person in charge: Chief technical manager Kim Gi-jae
        • TEL: 042-860-4804 send to
      2. 2. Personal information control staff
        • Dept.: Information Security Team
        • Person in charge: Chief technical manager Kim Gi-jae
        • TEL: 042-860-4804 send to
    2. ② Information owners are allowed to get access to personal information through the website of Personal Information Protection Portal in addition to through the department to handle the request for personal information above.
      Privacy Information Protection Portal → Civil Petition on Personal Information → Request for Personal Information (real-name verification required through the Internet Personal Identification Number (I-PIN))
  • Article 9 (Remedy for infringement on rights and interests)

    The information owners shall have the right to ask for consultation and remedy for infringement of personal information.

    1. ① The organization below is a separate agency which is not related with us. If you are not satisfied with our actions on the handling of the complaints and remedies or want to get more information, feel free to contact us.
      1. 1. Personal Information Infringement Report Center (operated by Korea Internet Security Agency)
        • Website : privacy.kisa.or.kr
        • TEL : Just dial 118
      2. 2. Personal Information Dispute Mediation Committee (operated by Korea Internet Security Agency)
        • Website : privacy.kisa.or.kr
        • TEL: Just dial 118
      3. 3. Cyber Crime Investigation Agency: 02-3480-3573 (www.spo.go.kr)
      4. 4. Cyber Terror Response Center: 1566-0112 (www.netan.go.kr)
    2. ② Information owners are allowed to get access to personal information through the website of Personal Information Protection Portal in addition to through the department to handle the request for personal information above.
      Privacy Information Protection Portal → Civil Petition on Personal Information → Request for Personal Information (real-name verification required through the Internet Personal Identification Number (I-PIN))
  • Article 11 (Amendment of Privacy Policy)
    1. ① The Privacy Policy shall become effective on July 31, 2012
TOP