🔑Privacy Policy

U2EX (hereinafter referred to as “Company”) values customers’ personal information and maintains ‘Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.’, ‘Act on Consumer Protection in Electronic Commerce, etc.’, and ‘Communication Secrets’. We comply with laws such as the 'Protection Act', 'Telecommunications Business Act', and 'Personal Information Protection Act' and the administrative guidelines of administrative agencies, and protect user rights and interests by establishing a personal information processing policy in accordance with relevant laws and regulations.

The “Company’s” personal information processing policy may change in accordance with changes in laws or guidelines related to personal information protection and changes in our policies, so customers are advised to check it frequently when visiting our site.

The “Company’s” personal information processing policy contains the following contents.

  1. Items and collection methods of personal information collected

  2. Purpose of collection and use of personal information

  3. Provision of personal information

  4. Entrustment of processing of personal information

  5. Retention and use period of personal information

  6. Procedures and methods for destroying personal information

  7. Rights of users and legal representatives and methods of exercising them

  8. Measures to ensure the safety of personal information

  9. Matters concerning the installation and operation of automatic personal information collection devices and their refusal

  10. person in charge

  11. Notification obligation


1. Items of personal information collected and methods of collection

  1. Items of personal information collected

    1. ①The “Company” does not collect sensitive personal information (race and ethnicity, ideology and creed, place of origin and domicile, political inclination and criminal record, health status and sexual life) that may violate users’ basic human rights. However, sensitive personal information may be processed in any of the following cases.

    2. ②When applying for asset transfer, if the information subject in the name of the account is unable to apply for asset transfer directly (imprisoned for a crime), an agent with a power of attorney applies for asset transfer using a certificate of incarceration as proof.

  2. “Company” collects and uses only essential personal information as follows.

    1. ①Confirmation of identity and intention to sign up for membership [Individual member] - Name, date of birth, gender, mobile phone number, linkage information (CI), duplicate membership confirmation information (DI), email address, password

    2. ②[Corporate Member]

    3. ③Mobile phone number, email address, password, country code

    4. ④Identity verification for payment

    5. ⑤Name, date of birth, copy of ID card, mobile phone number Customer verification system

      • [Individual member] - Name (Korean/English), residence (address), nationality, copy of ID card (passport)

      • [Corporate Member] - Corporate customer confirmation (name (Korean/English), date of birth, gender, nationality, mobile phone number, email address, residence (address)), power of attorney for representative/agent (name, resident registration number, residence (address), mobile phone number), Corporate seal certificate (representative name, representative resident registration number), corporate business registration certificate (representative name, representative resident registration number), shareholder list (representative name, residence (address), resident registration number), representative/agent identification card

    6. ⑥Reset OTP

      • - Name, email address, mobile phone number, copy of ID (passport)

    7. ⑦Prevention of illegal use by delinquent members and prevention of unauthorized use

      • - Automatically generated: User access point information (IP address, visit date and time, device information, browser, country)

      • - Use of additional services: Personal authentication information (2-channel authentication information), mobile phone number

    8. ⑧Reset OTP

      • - Name, email address, mobile phone number, copy of ID (passport)

      • ※ Masking (blocking) information: Attach a photo holding your ID card and a copy of your ID card with personal information other than name and date of birth masked (blocked).

    9. ⑨Other items collected for evidentiary purposes

      • - Name, mobile phone number, email address

    10. ⑩원화 입출금 거래 서비스 이용

      • - Name, date of birth, gender, CI (user identification information), mobile phone number

    11. ⑪Name change application processing items

      • Copy of resident registration card for each country (ID number, name before and after name change, address) The following information may be generated and collected during the use or processing of the ‘Service’.

      • - Service usage records, payment records, usage suspension and cancellation records, access logs, cookies, user access IP addresses, defective or abnormal usage records, advertising identifiers (ADID/IDFA)

  3. The “Company” collects and uses only personal information that has been agreed upon by the customer as follows.

  4. U2EX name, mobile phone number, email address

  5. Method of collecting personal information “Company” collects personal information in the following ways.

    1. Homepage, consultation bulletin board, email

    2. Collection through generated information collection tool.

2. Purpose of Collecting and Using Personal Information;

The “Company” collects and uses customers’ personal information for the following purposes.

  1. Member management

    1. Identity verification and personal identification when using membership services

    2. Prevention of fraudulent use by delinquent members and prevention of unauthorized use

    3. Confirmation of intent to join, limit membership and number of subscriptions

    4. Verification of minors

    5. Customer support (customer consultation, receipt and processing of customer complaints, record preservation for dispute resolution)

    6. Maintenance and management of membership

    7. Service Notices and Notifications

    8. Processing of name change applications

  2. Used for marketing and advertising

    • - Providing optimized services to customers

    • - New service (product) development and specialization

    • - Provision of services and advertisements based on demographic characteristics

    • - Determine the frequency of web page access

    • - Statistics on service use

    • - Planning web services and events that meet customer interests

    • - Advertising, publicity, promotion or member participation space operation for the products and services of the company and its affiliates

3. Provision of personal information

The “Company” does not use the customer’s personal information or provide it to a third party beyond the scope notified to the customer at the time of collection or specified in the Terms of Service. However, exceptions are made with the customer's consent or in the following cases.

Partnership: In order to provide better services, customer personal information may be provided to or shared with affiliates. When providing or sharing personal information, we inform customers in advance who the affiliate is, what personal information items are provided or shared, why such personal information should be provided or shared, and for how long and how it will be protected and managed. Consent will be sought by individually notifying customers in writing or via e-mail. If the customer does not consent, the information will not be provided to or shared with affiliates. When there is a change in the partnership or when the partnership is terminated, notification or consent is requested through the same procedure.

  1. Personal information provision history

4.Entrustment of processing of personal information

In order to provide smooth and improved services, the “Company” may entrust management of personal information to third parties to a limited extent. Currently, the companies to which we entrust the processing of personal information in order to fulfill the service contract with members are as follows, and in accordance with relevant laws and regulations, we stipulate the necessary matters to ensure that personal information is safely managed when entering into a consignment contract.

5. Retention and use period of personal information

“The “Company” processes personal information in accordance with the retention and use period of personal information in accordance with relevant laws or the personal information retention and use period agreed upon when collecting personal information from customers

1. The “Company” retains and uses personal information only when necessary as described below.

- Personal information retention and use period for virtual asset trading services

- Preservation according to laws and regulations in accordance with the provision of goods or services

※ However, in case of accident investigation, dispute resolution, civil complaint processing, and fulfillment of statutory obligations, it is separated and stored separately.

2. If the customer requests to view transaction information held with the customer's consent, we will take steps to allow the customer to view and confirm the information without delay.

6. Personal information destruction procedures and methods

  1. After the purpose of use of the collected personal information is achieved, the “Company” destroys or stores the information separately according to the storage period and use period. The procedure, timing, and method are as follows.

  2. Destruction procedure and timing

  3. The personal information entered by the customer for service subscription, etc. has expired after the purpose of use, such as service termination, has been achieved, in accordance with the internal policy and other relevant laws and regulations (refer to the retention and use period of personal information above). It will be destroyed immediately afterwards. In general, if there is no remaining credit-debt relationship, personal information collected when registering as a member of the “Company” and managed in the form of an electronic file is deleted immediately at the time of membership withdrawal.

  4. Method of destruction Personal information printed on paper is destroyed by crushing, incinerating, or dissolving with chemicals, and personal information stored in electronic files is deleted using technical methods that render the records unrecoverable..

7. Rights of users and legal representatives and methods of exercising them

  1. Users and their legal representatives may exercise the following rights regarding their registered personal information at any time.

    • Request to view personal information

    • Request for correction if there is an error in personal information

    • Request for deletion of personal information

    • Request to suspend processing of personal information

  2. Users and their legal representatives can log in to the “Company” website (https://u2ex.net/) and view or correct their personal information in ‘Change Member Information’, or send an e-mail or written request to the ‘Company’s’ personal information protection manager. Correction is possible through .

  3. Users and their legal representatives can withdraw (cancel) their ‘consent to collection and use of personal information’ via email.

  4. If the user or legal representative requests correction or deletion of errors in personal information, the personal information will not be used or provided until processing is completed. In addition, the “Company” processes personal information that has been canceled or deleted at the request of the user or legal representative as specified in “Retention and Use Period of Personal Information” and processes it so that it cannot be viewed or used for any other purpose.

8.Measures to ensure the safety of personal information

The “Company” is taking the following measures to ensure the stability of personal information.

  1. Administrative protection measures

    1. ①Establishment and implementation of an internal management plan

      • - Matters pertaining to the designation of a personal information protection officer

      • - Matters pertaining to the roles and responsibilities of the personal information protection officer and personal information handler

      • - Matters concerning measures necessary to ensure the safety of personal information

      • - Matters related to training for personal information handlers and consignment companies

      • - Other matters necessary to protect personal information

    2. ②Conduct regular self-audit

      • - Separation of duties between personal information protection officer and auditor

      • - Matters pertaining to the roles and responsibilities of personal information auditors

      • - Regular self-audit to ensure safety in handling personal information

    3. ③Technical protection measures

      • - In order to prevent leakage of customer information by personal information handlers, we operate a personal information leak prevention system and apply a safe encryption algorithm to personal information transmitted through terminals (PCs) and networks.

      • - Access rights to the personal information processing system are limited to the minimum necessary to perform work, and one user account is differentially granted to each person in charge. If the personal information handler changes, the access rights to the personal information system are changed or Expunge and keep records for at least 5 years. In addition, we have established and applied password creation rules for personal information handlers.

      • - When an individual's unique identification information and password are transmitted or received through an information and communication network or transmitted through auxiliary storage media, etc., they are stored using commercial encryption software, and the password is encrypted and stored using a safe encryption algorithm.

      • - The personal information handler's access records to the personal information processing system are stored and managed for at least 2 years, and the personal information handler's access records are stored safely to prevent them from being forged, altered, stolen, or lost.

      • - We install and operate security programs such as anti-virus software that can prevent and treat malicious programs on the personal information processing system or work computer, use the automatic update function of the security program, and periodically inspect the terminal (PC). is being implemented.

    4. ④Physical protective measures

We establish and operate access control procedures for physical storage locations where personal information is stored, such as computer rooms and data storage rooms, and documents and auxiliary storage media containing personal information are stored and managed in a safe location with a lock.

9. Matters concerning the installation/operation of automatic personal information collection devices and their refusal

  1. There are cases where cookies are installed and operated to store and retrieve customer information from time to time through the Internet service provided by the “Company.” A cookie is a string of information that a web server sends to a web browser, stores it, and then sends it back to the server when an additional request is made. When a customer accesses the “Company” website, the contents of the cookie in the customer’s browser can be read, additional information can be found, and services can be provided without additional input, such as name, upon access

    1. ①The “Company” may use customer information collected through cookies for the following purposes.

    2. ②Provide differentiated information according to individual interests

    3. ③Analyze the access frequency or stay time of members and non-members to identify users’ tastes and interests and use them for target marketing.

    4. ④Tracks the content you are interested in and provides personalized service the next time you log in.

    5. ⑤Information on the period of use when using paid services

    6. ⑥Analyze customers’ habits and use them as a measure for service reform, etc.

  2. Customers have the option to install cookies. You can accept all cookies, send notification when cookies are installed, or reject all cookies by going to “Tools > Internet Options > Privacy > Advanced” at the top of your web browser. However, if the customer refuses to install cookies, there may be inconvenience in using the service or difficulties in providing the service.

  3. Cookies expire when you close your browser or log out.

10. Person in charge

  1. The “Company” values the protection of customers’ personal information and is doing its best to prevent customers’ personal information from being damaged, infringed, or leaked. However, despite technical supplementary measures, we are not responsible for damage to information due to unexpected accidents caused by basic network risks such as hacking, and for various disputes caused by postings made by visitors..

  2. When customers inquire about personal information protection, the customer center responds quickly and faithfully. Additionally, if a customer wishes to contact the personal information protection manager of the “Company,” please contact us at the contact number or email below and we will promptly and faithfully respond to any inquiries regarding personal information.

11. Notification obligation

The current personal information processing policy was revised on November 21, 2023, and if there are additions, deletions, or modifications to the content due to changes in government policy or security technology, the changes will be announced through 'Notice' on the website before implementation. We will notify you.

These terms and conditions will take effect from January 15, 2024.

Last updated