The purpose of this Agreement is to prescribe the rights, obligations, responsibilities, and other necessary matters concerning the use of STING and STING-related services provided by the STING Foundation (hereinafter referred to as the "Company").
Definitions of terms used in these terms and conditions are as follows.
1. Where an applicant has previously lost his/her membership under these terms and conditions
2. In the case of using a name other than his/her real name or the name of another person
3. Where false or incorrect information is entered or provided, or the details presented by the company are not entered
4. Where an application cannot be approved due to reasons attributable to the applicant or violates all other matters prescribed in this Agreement
5. Where a service is intended to be used for improper purposes or for separate business purposes
6. Where an application is made for a purpose that may violate relevant statutes or hinder social well-being or good customs
7. Where the applicant is a non-resident foreigner or under 19 years of age
The company shall endeavor to protect the personal information of its members as prescribed by relevant statutes, such as the Act on the Promotion of the Use of Information and Communication Networks, the Personal Information Protection Act, etc. Related Acts and subordinate statutes and the company's personal information processing policy apply to the protection and use of personal information. However, the company's personal information processing policy does not apply to externally linked screens other than those produced and provided by the company.
1. Stealing other people's information
2. Change the information posted by your company
3. Sending or posting information (computer programs, etc.) other than the information prescribed by the company
4. Infringement of intellectual property rights, such as copyrights of the company and other third parties
5. Impairs the reputation of the company and other third parties or interferes with their work
6. Disclosure or posting of obscene or violent messages, videos, voice, false information, or other information contrary to official documents to the Services
7. Use of services for profit without prior consent from the Company
8. Automated means such as agent, script, spider, spyware, toolbar, access to the service through other fraudulent methods, fraudulent generation or increase of exposure and clicks, application for service use, load the company's server.
9. The act of collecting personal information and account information of other members
10. Disrupting sound transaction order by unjustly affecting the market price of digital assets, etc.
11. Other illegal or unjust acts
1. The right to use, edit, store, duplicate, modify, disclose, transmit, publicly demonstrate, publicly post and distribute posts for the purpose of operating, improving, improving, developing, promoting new services, etc.
2. The right to produce and distribute secondary works of a post.
1. Discontinue access to services
2. Suspension of all activities in the service
1. For continuous password errors
2. In the event of hacking or fraud.
3. When suspected of identity theft
4. Where a government agency requests restrictions on services in accordance with relevant statutes;
5. Where he/she is reasonably involved or suspected of being involved in market price manipulation, money laundering, unfair trade, criminal acts, etc.
6. Where a user registered as a member is identified as a minor or a non-resident foreigner
7. Where it is confirmed that a member makes a digital asset deposit and withdrawal transaction under another person's name
8. Where any other ground corresponding to each subparagraph arises or measures are necessary to prevent such ground from occurring
1. Where a user registered as a member is identified as a minor or a non-resident foreigner
2. When hacking or fraud is suspected to have occurred.
3. When suspected of identity theft
4. Where a government agency requests restrictions on services in accordance with relevant statutes
5. Where he/she is reasonably involved or suspected of being involved in market price manipulation, money laundering, unfair trade, criminal acts, etc.
6. Where it is confirmed that a member deposits and withdraws digital assets into an account under another person's name
7. Where any other ground falling under any subparagraph arises or measures are necessary to prevent such ground from occurring;
8. Where a digital asset is deposited to be traded on behalf of another person, such as a purchasing agency;
9. Where it is difficult for the company to verify the IP that the member actually accessed, such as accessing using VPN.
10. In the case of an account used for a crime (such as voice phishing), such as requesting withdrawal of a digital asset equivalent to the deposit within 24 hours after deposit of a digital asset
1. Where a member violates his/her obligations prescribed in Article 10 of these Terms or falls under the grounds for restriction of use prescribed in Article 20;
2. In the case of violating related statutes, such as illegal communication and hacking, distribution of malicious programs, and excess of access rights, etc., which violate the Act on the Provision and Operation of Illegal Programs, Promotion of Information and Communication Network Use, Information Protection, etc.
3. In the event of an act or attempt that interferes with the smooth progress of the service provided by the company
4. Where any other reason arises that this contract cannot be maintained for any of the following reasons
1. Where it is inevitable, such as exhibition, catastrophe, natural disaster, or equivalent national emergency
2. In the case of compliance with administrative disposition, orders, etc. by a government agency
3. In the case of service failure of telecommunication service providers, including key telecommunication business operators, under the Telecommunications Business Act
4. Where a service failure occurs due to a defect in the outsourcing system or a reason attributable to the user that the company cannot manage
5. In the event of a server failure due to a momentary increase in access to the website or a flood of orders for some items, etc.
6. In-service transaction systems, deposit and withdrawal systems, and networks of each digital asset (e.g., Ethereum (ETH) network) failures or errors occur.
1. Appointment and management of information protection officers
2. Information Protection Training
3. Computer rooms (where computer equipment, telecommunications and security equipment is stored for digital asset transactions, essential business of the company), facilities in buildings, information protection systems (equipment and programs to protect information from leakage, forgery, damage, or information processing systems).
4. Cryptographic key (private key) management plan for signing required to prove disposal rights for digital assets
5. Establishment of countermeasures against information security incidents
6. Regular inspection of information protection measures and measures to respond to security incidents, etc.
7. Other information protection laws stipulate compliance by digital asset handlers
Upon receipt of an application for withdrawal of subscription from a member, the company shall refund the purchase price of paid content within three business days (three business days from the receipt confirmation date) only if the subscription under Article 24 (1) and (2) is not withdrawable. In such cases, if the company delays the refund, the delayed interest calculated by multiplying the interest rate prescribed by the Act on Consumer Protection in Electronic Commerce, etc. shall be paid.
1. Where the company is solely responsible for the purchase of paid content, but there is no service available for the purchase
2. for other consumer protection cases provided otherwise in the company.
The STING Foundation (hereinafter referred to as the "Company") values the privacy of users and is committed to protecting the privacy provided to the company to use the company's services (digital asset transaction services). Therefore, the company complies with laws related to personal information protection, such as the Act on the Promotion of Information and Communication Network Use and Information Protection, etc. and the Personal Information Protection Act.
The company discloses this personal information processing policy on the first screen of the website so that users can easily check it at any time.
This personal information processing policy may be changed in accordance with the relevant statutes and the company's internal policies, and the amendment can be easily confirmed through version management.
The personal information items collected by the company are as follows.
Sortation | point of collection | Collection Items |
---|---|---|
join membership | STING join membership | Whether to receive Kakao account (email) or Apple account (email), STING nickname, and event information (optional) |
Level 1 Email Authentication | ||
Digital Asset Transactions | Level 2 Mobile Phone Identification | Name, mobile number, date of birth, gender, domestic/foreign information, subscribed carrier, identification information (CI, DI) |
Sortation | point of collection | Collection Items |
---|---|---|
Event | Payment of utility bills | a copy of one's identification card |
financial fraud | Unstopped Transaction | Name, date of birth, gender, account information, damage deposit and withdrawal transaction details |
Cash Receipt Issuance | Register cash receipt information | Mobile phone number, business number |
Sortation | point of collection | Collection Items |
---|---|---|
Automatically generated items during service access | Using the STING service | Device information (OS, model name, carrier, device identification number, language information), IP address, service usage record, cookie |
The company processes the user's personal information for the following purposes. The personal information being processed shall not be used for any purpose other than the following, and if the purpose of use is changed, necessary measures, such as obtaining separate consent pursuant to Article 18 of the Personal Information Protection Act, will be implemented.
① The company shall process personal information within the period of retention and use of personal information under Acts and subordinate statutes or the period of retention and use of personal information agreed upon when collecting personal information from users.
② The period of retention and use of each personal information is as follows.
Sortation | Reason for possession |
---|---|
join membership | Managing members, consulting with users, and handling civil petitions (if there is no financial history of transactions); |
Digital Asset Transactions | Identification of identity according to the use of services provided by the company, management of information on payment and withdrawal processing in digital asset transactions, and determination of transaction relationships; |
Additional authentication | Process withdrawal of members, initialization of mobile phone number and withdrawal account, and verification of deposit fact. |
Provided, That if an investigation or investigation is under way due to a violation of relevant statutes, it shall be retained and used until the completion of the relevant investigation or investigation.
Sortation | Related Laws |
---|---|
Records of withdrawal of contracts or subscriptions, etc. | The Consumer Protection Act in E-commerce, etc. |
Records of payment and supply of goods, etc. | |
Records of consumer complaints or disputes | |
Records of marking and advertising | |
Records of compensation and misappropriation. | |
Login History | Communication Secret Protection Act |
Record of payment of utility bills | Framework Act on National Taxes |
Customer verification records to raise withdrawal limits | Specific Financial Information Act |
③ The period of retention and use of personal information is from signing a service use contract (member registration) to termination of a service use contract (withdrawal application). Except as otherwise provided for in other Acts and subordinate statutes or at the request of users, the company shall destroy the personal information of users who are not reused for the period defined in Acts (one year) or store and manage it separately from the personal information of other users. Provided, That the fact that personal information is destroyed or stored separately and managed by 30 days prior to the expiration of the period, and the items of the relevant personal information shall be notified to the user by e-mail, writing, FAX, telephone, or similar means.
① The company shall process the user's personal information only to the extent specified in Article 2 (Purpose of Processing Personal Information), and shall provide personal information to third parties only if it falls under Articles 17 and 18 of the Personal Information Protection Act.
Service Name | Offered by | Purpose of delivery | Third Party Offerings | Period of use |
---|---|---|---|---|
Real name verification account service | K-Bank | Prevention of money laundering (provided upon request of data) | Name, date of birth, account information, transaction details | Until withdrawal of membership or termination of partnership agreements. |
① The company entrusts the personal information to external companies to perform some of the necessary tasks in providing services. And we manage and supervise the entrusted company not to violate the relevant laws.
② The following companies are entrusted with the processing of personal information.
Trustee | Consignment Purpose | Personal Information Period |
---|---|---|
KT Co., Ltd. | Kakao Notification Tok Sending Agency | Until withdrawal of membership or termination of consignment contract. |
KT Co., Ltd. | SMS Shipping Service | |
KT Co., Ltd. | Staking Service |
Trustee | Consignment Purpose | Entrusted Items | Country of Consignment | Date of Consignment, Method | Period of use |
---|---|---|---|---|---|
Twilio Inc. | Send an Informed Mail | the United States | When email is sent, transferred over the network when using the service | 30 Days After Email Sent |
1. Items stored separately: name, mobile phone number, email, date of birth, gender, identification information (CI, DI), account information
1. Permanently delete personal information stored in electronic file format so that records cannot be played
2. Personal information recorded and stored in paper documents is shredded or incinerated with a grinder.
In order to ensure safety so that personal information is not lost, stolen, leaked, tampered with, or damaged while processing the personal information of users, the company shall:
① The company uses 'cookie' to store user information and bring it in frequently to provide convenience to users.
② Cookies are small amounts of information that a website sends to a customer's computer browser (such as Internet Explorer).
- Internet Explorer: Select Tools Menu > Select Internet Options > Click the Privacy tab > Advanced Privacy Settings > Cookie Level Settings
- Chrome : Select Settings Menu > Select Display Advanced Settings > Privacy and Security > Select Content Settings > Set Cookie Level
- Safari : Select Configuration Menu > Select Privacy Tab > Set Cookie and Website Data Level
① In order to protect users' personal information and handle complaints related to personal information, the company designates the relevant departments and persons in charge of personal information protection as follows:
② All complaints related to personal information protection arising from the user's use of the company's services can be inquired to the person in charge of personal information protection and the department in charge. The company will answer and deal with the user's inquiries.
You can contact the following institutions if you need damage relief or counseling for privacy violations.
The company can provide users with links to other external sites. In this case, the company has no control over the external site, so it cannot guarantee the usefulness, integrity, and legality of services or data received from the external site, and the privacy policy of the linked external site is irrelevant to the company.
If there is any addition, deletion, or revision of the contents of the current privacy policy, we will notify you at least seven days before the revision through "Notice". However, if there is an important change in user rights, such as the collection and utilization of personal information and the provision of third parties, it will be notified at least 30 days in advance.
This personal information processing policy V2.9 will take effect from October 13, 2020. You can check the previous privacy policy below.
All digital assets that can be traded in STING are not legal money and are not guaranteed value by a particular entity.
No one guarantees its value, and depending on the circumstances, the transaction can be rejected by the other party at any time, so the actual value can be valued at zero at any time.
It is traded around the world 24 hours a day, 365 days, and can be exposed to rapid changes in market prices due to speculative demand and changes in the domestic and international regulatory environment.
With the possibility of losses caused by changes in value, digital asset investment judgments are attributable to the investor himself, and gains and losses from digital asset investments are attributable to him, so please avoid excessive investment and invest carefully.
o Suspension of digital asset withdrawals
o Temporary or permanent suspension of the account;
o Verification procedures for contrasting financial institution damage report information;
o Request for investigation to financial regulators and investigative agencies;
STING(STN) coins issued by the STING Foundation are exchanged and distributed with other digital assets, such as Ethereum (ETH), and cannot be purchased in legal currency such as KRW or USD. In addition, the company does not act on behalf of any purchase or sale of STN coins.
The company does not guarantee the value of the STING(STN) coin, and the company shall not bear any compensation, compensation, or other responsibility for any loss, loss, debt, or other damage to the member who owns or trades the STING(STN) coin.