Certified Administrative Attorney at Translation

At World Translate, customer satisfaction is our top priority. We will continue to do our best until even more of our clients achieve success.

기밀보안유지

세계 번역은 정식 계약을 체결한 원어민이 사람을 생각하고, 언어에 있어 최고의 전문가 집단이 근무하는 회사입니다.

World Translate protects all of your personal information in accordance with Article 23 of the Certified Administrative Attorney Act.

At World Translate, the security of each and every customer's personal data is our top priority.

Article 23 (Confidentiality) of the Certified Administrative Attorney Act An administrative attorney or a person who was an administrative attorney (including administrative office staff or former staff) must not disclose to others any information learned in the course of their duties without legitimate reason.

Purpose of Processing Personal Information

Retention Period of Personal Information

Destruction Procedure and Method of Personal Information

Server Security

Purpose of Processing Personal Information

World Translate processes personal information only to the minimum extent necessary for performing its administrative duties.

Retention Period of Personal Information

World Translate processes personal information within the period permitted by law or within the retention and usage period agreed upon at the time of collection.
(The retention period for original documents and translations received for inquiries or service requests is 30 days.)

Destruction Procedure and Method of Personal Information

The procedures and methods for destroying personal information are as follows:
1-1). Destruction Procedure: World Translate selects personal information (or files) to be destroyed when the reason for destruction occurs, and destroys them upon approval by the department's data protection officer.A
1-2). Destruction Method: Personal information stored in electronic files is destroyed in a manner that makes recovery impossible, and paper documents are shredded.

Server Security

Personal information theft is fundamentally blocked through secure servers, firewalls, and encryption protocols.