This Data Privacy Notice informs you about how and for which purposes we will process your personal data and explains your rights under applicable data protection law.

We are strongly dedicated to handling your personal data always responsibly, diligently and in compliance with all legal requirements. State of the art professional standards will be applied to protect the integrity and security of your personal data.

1. Purpose of Processing Personal Information
We, G.I.T (hereinafter referred to as ‘We’) processes personal information for the following purposes and does not use it for purposes other than the following purposes: - Contract implementation, Charge, Customer consultation and processing - Collection Method : Email, Telephone, Purchase System (Quotation, Contact etc)

2. Processing and Retention Period of Personal Information
We processes and retains personal information within the period of holding and using the personal information that is agreed upon when personal information is collected from the subject of the information, and the period of holding or using the personal information is determined according to laws and regulations. - Personal information that is not needed after the retention period will be deleted, and the user can request the data

3. The user of rights and obligations of the subject of the information, the legal representative, and the exercise method thereof may exercise the following rights as a personal information object:

The subject of the information may exercise the rights related to personal information protection stipulated in the following items at any time: Personal information reading request Correction request when there is an error Deletion request Processing stop request

4. Creating an item of personal information that is processed
We processes the following personal information items:
- Required items: Name, company name, e-mail, contact, mobile phone number, contents of inquiry

5. Retention & application period of the gathered personal information
A.The Company will retain and use a customer’s personal information until the purpose for his or her “Agreement on the Gathering & Use of Personal Information” is fulfilled. In addition, once such purpose is fulfilled, the corresponding information will be immediately destroyed. B. However, if such information to be destroyed needs to be retained in accordance with governing laws (i.e. Commercial Act, etc.), the Company will accordingly retain such information. In this event, the Company will use such information only for the retention purpose, and its retention period will be set as follows.

6. Process & Method for Destroying
Personal Information In general, the Company will immediately destroy any personal information after the purpose of its gathering & use is fulfilled. The Company’s destroying process and method are as follows. A.Destroying process 1) Any information you entered will be retained for a certain period of time and then destroyed after its purpose is fulfilled in accordance with governing laws and the Company’s bylaws (see the retention/use period). 2) In addition, such personal information will not be used for any other purpose than retention unless otherwise stipulated in governing laws. B.Destroying method - All personal information printed on papers shall be destroyed with a paper shredder or through incineration. - In addition, such electronically-saved personal information (file, etc.) shall be deleted based on a non-rewritable technique. - In addition, such personal information will not be used for any other purpose than retention unless otherwise stipulated in governing laws.

7. Sharing of personal information with a third party
The Company will use a user’s personal information in accordance with the provisions specified in the "3. Purpose of gathering & use personal information" and will not use or disclose such information without the prior permission by the user. However, such non-disclosure obligation will not apply in any of the following events. A.If a user agrees on such disclosure B. If such disclosure is required in accordance with governing laws or is requested by an investigation agency
-Purpose : Product delivery
-To whom : Shipping company
-Personal items provided : Consignee name and contact information
However, inquiries about G-scan AM products can be shared with EZDS companies.

8. Technical/Administrative Actions for Privacy Protection  
With regard to the handling of any user’s personal information, the Company has implemented the following technical actions to prevent the loss, theft, leakage, falsification or damage of the user’s personal information.

A. A user’s personal information and password will be encrypted, stored and managed so that such data are only available to the user. In addition, certain critical data will be encrypted or security-locked.

B. In order to prevent any hacking or computer virus for privacy infringement, the Company has installed some security programs, performed regular security updates/inspections, established remote-accessrestricted systems, and monitored on such programs & systems technically & physically.

C. In addition, the Company has implemented the following security measures: Management (i.e. assignment, modification, termination, etc.) of certain access authorities to any personal-information processing database system, intrusion blocking system, and so forth.

D. Furthermore, the Company will appoint a representative in charge of processing personal information, and only the representative will be authorized to take any action in connection with such processing.

- Minimization and training of personal information handling staff We are taking measures to manage personal information by minimizing the number of employees by designating staff members who deal with personal information and limiting this duty to the person in charge.

-Establishment and enforcement of the internal management plan We have established and enforced an internal management plan for the safe handling of personal information.

-Technical measures against hacking We has installed a security program, periodically updates and inspects it, and installed this system in an area where access from outside is controlled. It is technically and physically monitored and blocked to prevent leakage and damage of personal information by hacking or computer virus, among others.

-Access restriction for personal information We are taking necessary measures to control access to personal information through granting, changing, and cancelling access rights to the database system that processes personal information. We also control unauthorized access from outside by using an intrusion prevention system.

-Use of a lock for document security We keep documents and auxiliary storage devices with personal information in a safe place with a lock.

-Access control for unauthorized persons We have set up a separate physical storage area for storing personal information. We have established and are using access control procedures.

Obligation of Notice

When there is the addition, deletiWhen there is the addition, deletion or modification of the content of this policy due to changes in laws, regulations, policies or security technologies, we will inform you of the reasons for and contents of the change through the homepage at least 7 days before the enforcement of the changed privacy policy.
However, the Company will make such posting at least 30 days prior to any modification to the following data: Gathering & use of personal information, disclosure to a third party, and so forth.

If you have any questions regarding your rights or if you have any specific requests relating to your personal data please contact us at the contact information stated below: