If you wish to receive Hyundai Motor Group Newsletter, please select “Subscribe”. If you do not want further subscription, please select “Unsubscribe”
Your personal information will be discarded without delay after fulfilling the purpose of collection and use unless it is required to retain such information under the applicable laws or Hyundai Motor Group’s internal policies.
Your personal information shall be destroyed without delay when you delete the account, in principle, and once the purpose of collection and use of the personal information has been accomplished. However, if some information requires storage in compliance with related legislation, such information shall be stored for specific period designated by related law.
The personal information is transferred to a separate database once the purpose of collection and use is achieved (hard copies are moved to a separate cabinet), saved for a certain period in accordance with the internal policy and the reason of information protection stated by other relevant legislation (see period of retention and use), and destroyed. The corresponding personal information is not used for the purpose other than for retention, unless that purpose derives from the law. Personal information printed on paper will be shredded or incinerated and if such information is saved in electronic file format, it will be erased using a technology that does not allow recovery of records.
Hyundai Motor Group stores and manages your personal information in encrypted form, according to related legislation and internal policy for the purpose of safety acquisition that will prevent loss, theft, leak, falsification or damage of personal information while handling such information. Hyundai Motor Group does its best to prevent leakage or damage of the user’s personal information by hacking or computer viruses.
Hyundai Motor Group also frequently makes back-up copies of the personal information in case of deterioration, prevents leakage or damage of the information by using the latest vaccine programs, and uses encrypted communication to facilitate safe transmission of personal information on the network. In addition, the Company controls external intrusion utilizing intrusion prevention system, and does its best to be equipped with all possible technological instruments to ensure system security.
Date of Implementation : April 30, 2015