Security

We provide a total security service that includes security consulting,
security system implementation, solution provision, and security monitoring.

LG CNS's Security Service

In the rapidly emerging the Fourth Industrial Revolution, new and innovative technologies such as IoT, AI, and cloud will accelerate customers’ digital transformation. LG CNS’s total security service includes security consulting, system implementation, solution provision, and security monitoring, providing security, privacy, and safety for customers’ digital transformation.

safe zone

Service Strengths

What security services does LG CNS offer?

  • 01Security Consulting

    • Information Security Masterplan Consulting

      Establishes comprehensive information protection measures

      Ideal for companies that need to establish or adjust security visions, objectives, or roadmaps

    • Personal Information protection Consulting

      Personal information leak response

      Ideal for companies with large amounts of personal information and multiple personal information systems

    • Information Security Certification Consulting

      ISMS-P and ISO certification response

      Ideal for companies seeking to acquire or renew an information security certification

    • Cloud Security Consulting

      Establishes cloud security measures

      Ideal for companies looking to securely design, build, and operate cloud resources

    • Factory Security Consulting

      Establishes factory security measures

      Ideal for companies wishing to improve the security of production lines and operate them safely

    • Physical Security Consulting

      Establishes physical security measures

      Ideal for companies planning to relocate or establish new business sites

    • Vulnerability Assessment and Preventative Hacking Simulation

      Diagnoses technical vulnerabilities

      Ideal for companies that frequently develop or change services and applications

  • 02Security Implementation

    • Smart Factory Security

      Designs and implements factory security

      Ideal for companies planning to construct, relocate, or expand factories

    • Smart City Security

      Designs and implements Smart City security

      Ideal for central or local governments that have a Smart City project plan

    • Public, Financial, and Corporate Security

      Designs and implements security for servers and databases.

      Ideal for organizations planning to develop a new system or change an existing one

    • Physical Security

      Illegal intrusion prevention and surveillance

      Ideal for companies with multiple dispersed business sites or a large warehouse

  • 03Security Solution

    • Cloud Environment Protection

      Protects the cloud environment

      Ideal for companies looking to strengthen public, hybrid, or multi-cloud security

    • Personal Information Security Management

      Automated personal information management

      Ideal for companies with large amounts of personal information and multiple personal information systems

    • Information Security Portal

      Integrated security management system

      Ideal for companies with new or expanding security systems

    • IoT Security Solutions

      Protects IoT devices

      Ideal for companies that sell B2B or B2C IoT devices

    • Access Control

      Controls the entry and exit of vehicles and people

      Ideal for companies with multiple dispersed business sites or a large warehouse

    • Video Surveillance

      Manages CCTV videos

      Ideal for companies with multiple dispersed business sites or a large warehouse

    • Physical Security Integrated Monitoring

      Integrated image and sensor monitoring

      Ideal for companies with multiple dispersed business sites or a large warehouse

  • 04Managed Security Service

    • Security Control

      Real-time IT security surveillance

      Ideal for companies with many B2C sites or many Internet connections

    • Security Management Shared Service

      Supports core security operations

      Ideal for companies with no security system or security staff

Services Provided

  • 01Security Consulting Service

    Security consulting by area

    LG CNS’s security consulting service proposes integrated information security models optimized for client companies that need advanced information protection systems. Based on the company's more than 20 years' security consulting experience and expertise, the service identifies the root causes of security vulnerabilities and provides realistic improvement plans.

    • Information security masterplan consulting

      Proposes an optimized security strategy through systematic risk analysis and practical implementation plan that includes HotFix and short-term and medium-term plans

    • Personal information protection consulting

      Eliminates the risk of personal information loss by analyzing the personal information status and life cycle

    • Information security certification consulting

      Improves information security management systems, and supports the acquisition or renewal of domestic and overseas security certifications such as ISMS-P and ISO27001

    • Cloud security consulting

      Proposes security requirements and safe design, implementation, and operation measures needed for public or hybrid cloud establishment

    • Factory security consulting

      Identifies security vulnerabilities in production lines and proposes protective measures for the non-disruptive operation of production environments

    • Physical security consulting

      Designs a safe physical security system by identifying security risks considering protection targets and internal and external physical environments

    Vulnerability assessment and hacking simulation

    LG CNS’s security service provides vulnerability assessment and preventative hacking simulation to help clients better respond to system intrusion or data loss caused by technical vulnerabilities. Based on various inspection checklists and scenarios developed in our dedicated vulnerability analysis, and hacking prevention labs, our consulting incluces diagnostics for the web operations and applications as well as IoT devices and industrial control facilities.

    • Web vulnerability diagnosis

      Performs OWASP-based web application inspection and hacking simulation
      The Open Web Application Security Project (OWASP)

    • Mobile vulnerability diagnosis

      Performs vulnerability diagnosis and hacking simulation for apps based on iOS and Android

    • IoT vulnerability diagnosis

      Performs vulnerability diagnosis and hacking simulation for IoT devices, gateways, and servers

    • ICS/SCADA vulnerability diagnosis

      Performs vulnerability diagnosis for facilities and equipment such as smart factory and power facilities
      Industrial Control System (ICS), Supervisory Control and Data Acquisition (SCADA)

    • Cloud vulnerability diagnosis

      Performs vulnerability diagnosis for public cloud environments such as AWS, Azure, and GCP

  • 02Security System Implementation

    Security system implementation for Smart Factory

    LG CNS’s security service provides an end-to-end security system that identifies and proactively counters possible security threats in production facilities, thereby minimizing the risk of production disruption. The system protects important facilities and prevents infomation breaches by utilizing ICS/SCADA experts experienced in factory security consulting and security system implementation in LG affiliates as well as the factory security solution suite that supports the integrated resolution of security threats without depending on specific vendors.

    • Security Accident Recognition and Response
      • Facility & Network actualization

        Graphically displays threat points such as inflow points in the production network

      • Security status monitoring

        Security monitoring of facility and production network status

    • Malware Response
      • External media control

        Restricts the connection of unauthorized media

      • Protection from malware

        Detects malware in facilities and takes protective measures

      • Network DMZ configuration

        Separately configures production networks

    • Facility Protection
      • Facility remote access control

        Controls remote access based on authorization levels maintain access records

      • Facility authentication and encryption of communication information

        Authentication and encryption to prevent information interception and falsification

    • Sensitive Information Breach Prevention
      • Intelligent video surveillance

        Monitors unauthorized access to key facilities

      • Access control

        Controls access to key facilities by authority

      • Visitors' management

        Manages visitors’ access cards and controls mobile devices

      • Risk-based security check

        Security screening for information breach points

    Security system implementation for Smart City

    LG CNS’s security service builds an end-to-end security system that protects all facilities and IT systems directly related to Smart City safety and privacy. This service proposes integrated security measures for IT security, IoT security, and physical security to protect all Smart City components and provides an intelligent security monitoring system that detects abnormalities based on information collected from different devices using AI technology.

    • IT Security
      • Integrated security | Intelligent security monitoring

        Security event integration and intelligent analysis

      • Applications | SSO, WAF

        Authentication and Authority management and protection against web vulnerabilities

      • DBMS | Encryption and access control

        Personal information encryption, de-identification, access control

      • Server | Anti-Virus and access control

        Malware detection and blocking, server access control

      • Network | DDoS, FW, IPS

        Protects against external DDoS attacks and vulnerability attacks

      • Terminal and PC | Anti-Virus, EDR, PC security

        Protects the PCs of the operator and the user

    • IoT Security
      • Device authentication, firmware integrity, secure updates, data protection

        Authentication, Encryption, Integrity verification, Site device updates

    • Physical Security
      • Video surveillance and access control, input and output control, and intrusion detection

        Physical security of integrated urban operation centers

    Security system implementation for public, finance, and corporate sectors

    LG CNS’s security service designs and implements security systems to help customers respond to security threats, such as the latest technologies and services such as cloud, IoT, and blockchain aside from the traditional IT systems. Based on proven design experience and implementation procedures that can be applied to various industries and business scales, service provides security systems that take into account future operational efficiency.

    • IT security system implementation

      Implements security systems such as firewalls, IPS, encryption systems, web firewalls, and SSO for protecting servers, networks, databases, and applications

    • Cloud security system implementation

      Implements security systems such as cloud firewall and encryption system to protect assets in cloud environments such as AWS, Azure, and GCP

    • IoT security system implementation

      Implements security systems such as mutual authentication and encryption systems to protect IoT devices, gateways, and servers

    • Blockchain-based security system implementation

      Implements security systems for access control, encryption, and monitoring to protect blockchain-based systems

    Physical security system implementation

    LG CNS’s security service implements physical security systems to protect important information assets from the physical risks of intrusion and theft. Services include information breach prevention, the safe management of major facilities, and personal safety protection. It can link various detection signals to CCTV images to provide intuitive screens and improve effectiveness in responding to physical security and environmental incidents.

    Device, Solution, Middleware, Unified Monitoring
  • 03Security Solutions

    LG CNS’s security service provides security solutions customized to the customer’s business.

    Security Solution
  • 04Security Management Service

    Security monitoring

    As a 24/7 service provided on the premises or in a cloud environment, it provides guidance on the latest security trends and prevention activities and detects and responds to internal and external security threats in real time to ensure the customer’s business stability.

    Security monitoring

    Various security control services can be provided depending on the customer environments.

    • Service Type
      • 01
        Infrastructure Security Management (ISM)
        Checks for internal and remote vulnerabilities
      • 02
        APT response
        Zombie PC monitoring
        Responds to email malware
      • 03
        Information exposure monitoring
        Checks for company/private information exposure
      • 04
        Network security
        Firewall/IPS service
        DDoS blocking service
      • 05
        Endpoint security
        Antivirus service
      • 06
        Web and application security
        Web firewall service
        Web forgery monitoring
    • Service History

      24/7 monitoring, security equipment operation, reporting, customer support (Help Desk), and breach response support

    LG CNS's Community Emergengency Response Team (CERT) has the highest-level accident forecasting and warning capability in Korea and provides total service that covers all areas from PC/server/network infrastructure to cloud depending on the client's business environment.

    Security management sharing service

    LG CNS's security specialists provide the essential security management task service for companies having difficulty in security management due to lack of security personnel. This service consists of 13 separate services that improve information security levels. From the Plan-Do-Check-Act (PDCA) perspective, it provides a wide range of services for all security management tasks with close support from LG CNS's top security experts, including hacking simulation specialists.

    Security management shared service

References

See the customers using LG CNS's
security service.

Manager contact details Close
Download

“*” indicates a required input field.

  • *Name
  • Company (department)
    Job Position
    Department name
  • Intent of Application
  • Receiving Marketing Information

    Please agree to receive marketing information and enter your company name and related work details to receive related newsletters and offline seminar information.

  • I Agree

    Click the link below and read the content carefully. By checking I Agree, you are deemed to have read and agreed to all of the following.

Top
Restriction on unauthorized collection of email addresses

Using email collection programs or any other technical devices to collect email addresses displayed on this website without permission is prohibited. Failure to comply will lead to criminal charges in accordance with the "Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc."

Posting date: 2010.8.30

OK
LG CNS's Privacy Policy Close

LG CNS (hereinafter referred to as the “Company”) takes every measure to protect the rights and interests of the user by complying with the personal data protection regulations for information and communications service providers and setting up a privacy policy pursuant to the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.”

The Company notifies you of its privacy policy as follows:

  • 1. Personal information items to be processed
    1.1.

    The Company collects the following types of personal information to facilitate customer consultation and provide various services:

    Contact
    • Required information : Name, contact number, email, company, job position
    Downloading materials
    • Required information : Name, email, Company, job
    • Optional information : position, department name
    Receiving blog updates
    • Required information : Name, email, occupation, company, job position
    • Optional information : Areas of interest

    You have the right to withhold consent to the collection of the required information and/or optional information. If you do not consent to the collection of the required information, however, use of service may be limited.

    1.2.

    The information below may be automatically generated and collected when you use our website services.

    IP address, cookies, date and time of visit, service use history

    1.3.

    How personal information is collected

    The Company collects personal information in the following ways:

    • When you use Contact Us, download materials: brochures, and white papers, and request to receive blog updates
    • When you access and use the services on LG CNS’s website
    • Through tools that collect the generated information
  • 2. Purposes of processing and using personal information

    The Company processes collected personal information for the following purposes:

    • To provide customer inquiry guidance (response) and status management
    • For smooth communication and handling of work among employees when answering customer inquiries
    • To provide resources and blog updates and use email marketing
  • 3. Sharing and providing collected personal information

    The Company shall use user's personal information within the scope specified in "2. Purposes of processing and using personal information,” and shall neither use such information beyond the scope of agreement without prior consent from the user nor disclose such personal information to third parties, in principle. The following cases are exceptions, however:

    • If the user has consented to the disclosure of information in advance
    • If such disclosure is in accordance with the laws, or if there is a request from an investigative agency according to the appropriate procedure and methods defined in the law for investigative purposes
  • 4. Processing and retention period of personal information

    The Company shall process and retain the following information for the specified period for the following reasons:

    4.1.

    Retaining information in accordance with company policy

    Processing and retention period of personal information
    Retention Items Retention Purpose Retention Period
    Name, email, contact number, company, job position Checking the inquirer’s details 60 months
    Name, email, occupation, company, job position, areas of interest Sending blog updates 60 months
    Name, contact number, email, company, job position, department name Email marketing 60 months

    If an individual has agreed to the retention period of personal information in advance, the Company may retain such information for the agreed-upon period.

    4.2.

    Retention of information in accordance with the relevant laws

    If an investigation is in progress due to a violation of related laws, the Company may retain personal information for a certain period of time until the investigation is completed according to the relevant laws.

  • 5. Consignment of personal information processing

    The Company consigns personal information processing as described below to improve its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to the relevant laws. In the event of a change of the consignee, the Company shall disclose the fact through this Privacy Policy without delay.

    • Consignee name: Amazon Web Service
    • Consignment work and purpose: Data storage and system operation
    • Personal information transferred from: AWS Seoul Region
    • Transferred personal information items: All personal information collected during the service provision process
    • Date and time of personal information transfer: When the user enters the necessary information for using the service
    • How personal information is transferred: Personal information is stored in the AWS cloud computing environment.
    • Period of retention and use of personal information: Personal information is stored until membership withdrawal or expiration of personal information.
  • 6. Rights of the user and the legal representative, how to exercise the rights
    • Users may view, modify, or request deletion of his or her registered personal information at any time. If the user is younger than 14 years, the user’s legal representative may do the same with the user’s personal information.
    • If you contact the manager of personal information protection via mail, phone, or email, the Company shall handle the request immediately after the request clarification procedure.
    • If the user requests correction of a personal information error, the Company may not use or provide the user’s personal information until the correction is completed. Moreover, if the incorrect personal information is already provided to a third party, the Company shall send the corrected information to the third party immediately.
    • The Company shall process personal information that has been canceled or deleted at the request of the user or legal representative according to “4.Processing and retention period of personal information,” and shall not view or use such information for any other purposes.
  • 7. Installation and operation of the automatic personal information collection tool and refusal by the user to use the tool

    The Company operates “cookies” that frequently store and find user information. A cookie refers to a very small text file sent by the server used to operate our website on browser and is stored on local computer hard disks. The Company uses cookies for the following purposes:

    ▶ Purpose of using cookies
    • You have the option to install or not to install cookies, which are used to analyze the frequency of access and visiting times of members and non-members for the identification of their preferences and interests and to track visitors and identify their degree of participation in various events and number of visits for the provision of targeted marketing and personalized services. Therefore, you can set web browser options to allow all cookies, check each time a cookie is saved, or refuse to save any cookies.
    ▶ How to refuse cookie installation

    Example : You can set the options in your web browser to allow all cookies, check and confirm each time a cookie is saved, or refuse to save any cookies.

    Example of setting the options (for Internet Explorer): At the top of the web browser, go to Tools> Internet Options> Privacy. If you refuse the installation of cookies, however, there may be difficulties in using our website services.

  • 8. Technical and administrative measures for protecting personal information

    The Company enforces technical and administrative measures to secure the safety of your personal information, so that it is not lost, stolen, leaked, altered, or damaged when processed.

    8.1.

    Technical measures for protecting personal information

    • The company enforces the following technical measures to secure the safety of your personal information and prevent it from getting lost, stolen, leaked, altered, or damaged when processed.
    • In preparation for external intrusions such as hacking, each server uses an intrusion prevention system and a vulnerability analysis system to maximize security.
    8.2.

    Administrative measures for protecting personal information

    • Restriction and training of personal information controllers

      Only the personal data protection officers of the Company can be assigned the role of personal information controller. Personal information controllers are given separate passwords that are regularly updated, and they must receive regular training to strengthen and emphasize compliance with the personal information processing policy.

    • Restriction of access to the personal information processing system

      The Company has set up internal standards for system access authority of personal information controllers to manage the granting, changes, and cancellation of access rights. The Company implements measures to manage personal information controllers, such as operating the standards for generating access passwords and managing password change intervals.

    If your personal information is lost, leaked, altered, or damaged by the mistake of an internal manager or in any technical or administrative accident, the Company shall immediately notify you of the fact, take appropriate measures, and make the corresponding compensation.

  • 9. Procedure and method for destroying personal information

    The Company shall destroy your personal information without delay after achieving the purpose of collecting and using personal information. The Company shall destroy personal information through the following procedure.

    9.1.

    Destruction procedure

    The Company shall store personal information entered for a certain period of time after the purpose of collecting this information is achieved for the purpose of protecting the information in accordance with the internal regulations and the relevant laws (see Processing and retention period of personal information), and then destroy the information at the end of the retention period. Personal information stored for said retention period is not used for other purposes unless required by law.

    9.2.

    Destruction method

    • Any personal information stored in electronic form shall be deleted from hard storage devices with technical methods that renders it irrecoverable.
    • Personal information printed on paper shall be shredded/pulverized by a grinder or destroyed by incineration.
  • 10. Contact information of the chief privacy officer and the personal data protection officer

    The Company designates the following department and chief privacy officer to protect users’ personal information and settle any complaints regarding personal information.

    Type Manager Team Email
    Chief Privacy Officer’s Corporate Auditing Unit infosec01@lgcns.com
    Personal Data Protection Cfficer Information Security Team
    Homepage Chief Privacy Officer’s Public Relations Team mediapr@lgcns.com
    Homepage Personal Data Protection Cfficer PR Team
    For other questions about reporting or consultation on privacy violations, please contact the following institutions.
  • 11. Etc

    Please note that this Privacy Policy does not apply to the collection of personal information by websites linked to the Company’s website.

  • 12. Duty of Notification

    In case of any additions, deletions, or modifications to the current Privacy Policy, the Company will notify you in advance through the Notification section of its website.

    Date of enforcement: 2019.9.20

Consent to LG CNS's Processing of Personal Information (Contact Us) Close
  • Processing and use of personal information

    The collection and use of personal information by LG CNS Co., Ltd. (hereafter referred to as the “Company”) require the consent of the user in accordance with the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to the collection and use of my personal information by the Company.

  • 1. Personal information items to be processed
    • Personal information items to be entered : name, contact number, email, company, job position
    • Automatically collected personal information items : IP address, cookies, date and time of visit, service use history
  • 2. Purpose of processing and using personal information

    The collected personal information is processed for the following purposes.

    • To provide information and guidance (answers) to customer inquiries and manage their status
    • For smooth communication and handling of work among employees to answer customer inquiries
  • 3. Consignment of personal information processing

    The Company consigns personal information processing as described below for the improvement of its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, and taking measures to ensure stability) pursuant to the relevant laws. In the event of a change of consignee, the Company shall disclose such fact through this Privacy Policy without delay.

    • Consignee name : Amazon Web Service
    • Consignment work and purpose : Data storage and system operation
    • Personal information transferred from : AWS Seoul Region
    • Personal information items transferred : All personal information collected during the service provision process
    • Date and time of personal information transfer: When users enter information necessary to use service
    • How personal information is transferred : Personal information is stored in the AWS cloud computing environment.
    • Period of retention and use of personal information : Personal information is stored until membership withdrawal or expiration of personal information.
  • 4. Treatment and Retention Period of Personal Information

    The Company shall destroy your personal information without delay after achieving the purpose of collecting and using such personal information. Nonetheless, the information below shall be retained for the specified period for the following reasons.

    • All entered personal information items shall be retained for 60 months and destroyed thereafter.
    • Individuals wishing to have their name and email information destroyed can contact us at webmaster@lgcns.com, and we will process such requests immediately.
    • If an individual has agreed to the retention period of personal information in advance, the Company may retain such information for the agreed-upon period.

    For more information on the collection and use of personal information, please refer to the <Privacy Policy> published on LG CNS's website (www.lgcns.com)

Consent to LG CNS's Processing of Personal Information (Regarding Data Download) Close
  • Processing and use of personal information

    Collection and use of personal information by LG CNS Co., Ltd. (hereafter referred to as the “Company”) requires consent of the user in accordance with the “Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to collection and use of my personal information by the Company.

  • 1. Personal information items to be processed
    • Personal information items to be entered: name, email, company (affiliation), work title, divisional affiliation
    • Personal information items automatically collected: IP addresses, cookies, date and time of visit, service use history
  • 2. Purpose of processing and using personal information

    Collected personal information is processed for the following purposes.

    • To provide resources and blog letters and use email marketing
  • 3. Consignment of personal information processing

    The Company consigns personal information processing as follows for improving its services and stipulates matters necessary to ensure that personal information is safely managed upon consignment contracts (prohibiting processing of personal information for other purposes than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to the relevant laws. In the event there is a change of consignee, the Company shall disclose this fact through this Privacy Policy without delay.

    • Consignee name: Amazon Web Service
    • Consignment work and purpose: Data storage and system operation
    • Personal information transferred from: AWS Seoul Region
    • Personal information items transferred: All personal information collected during the service provision process
    • Date and time of personal information transfer: When the user enters information necessary for service use
    • How personal information is transferred: Personal information is stored in the AWS cloud computing environment.
    • Retention and use period of personal information: Personal information is stored until membership withdrawal or the expiration of personal information.
  • 4. Treatment and Retention Period of Personal Information

    The Company shall destroy personal information without delay after achieving the purpose of collecting and using this personal information. However, the information below shall be retained for the specified period for the following reasons:

    • All entered personal information items shall be retained for 60 months and be destroyed thereafter.
    • Individuals wishing their name and email information to be destroyed can contact us at webmaster@lgcns.com, and we will process these requests immediately.
    • If the individual has agreed to the retention period of personal information in advance, the Company may retain such information for the agreed period.

    For more information on collection and use of personal information, please refer to the <Privacy Policy> published on the LG CNS website (www.lgcns.com).

Consent to LG CNS's Processing of Personal Information (Receiving Solution and Event Information) (Optional) Close

The collection and use of personal information by LG CNS Co., Ltd. (hereinafter referred to as the “Company”) require the consent of the user in accordance with the “Act on the Promotion of Information and Communications Network Utilization and Information Protection, etc.” I consent to the collection and use of my personal information by the Company.

  • 1. Personal information items to be processed
    • Personal information items to be entered: name, email, company (affiliation), department, job position
    • Automatically collected personal information items: IP address, cookies, date and time of visit, service use history
  • 2. Purpose of processing and using personal information

    Collected personal information is processed for the following purposes:

    • Receiving emails for information about newly launched LG CNS solutions, newsletters (blogs), and events.
  • 3. Consignment of personal information processing

    The Company consigns personal information processing as described below for the improvement of its services and stipulates the necessary matters to ensure that personal information is safely managed upon conclusion of consignment contracts (prohibiting the processing of personal information for purposes other than fulfilling the consignment contract, restricting re-consignment, taking measures to ensure stability) pursuant to relevant laws. In the event of a change of consignee, the Company shall disclose such fact through this Privacy Policy without delay.

    • Consignee name: Amazon Web Service
    • Consignment work and purpose : Data storage and system operation
    • Personal information transferred from : AWS Seoul Region
    • Personal information items transferred : All personal information collected during the service provision process
    • Date and time of personal information transfer: When users enter information necessary for service use
    • How personal information is transferred : Personal information is stored in the AWS cloud computing environment.
    • Period of retention and use of personal information : Personal information is stored until membership withdrawal or expiration of personal information.
  • 4. Treatment and Retention Period of Personal Information

    The Company shall destroy personal information without delay after achieving the purpose of collecting and using such personal information. Nonetheless, the information below shall be retained for the specified period for the following reasons:

    • All entered personal information items shall be retained for 60 months and shall be destroyed thereafter.
    • Individuals wishing to have their name and email information destroyed can contact us at webmaster@lgcns.com, and we will process such requests immediately.
    • If the individual has agreed to the retention period of personal information in advance, the Company may retain such information for the agreed-upon period.
  • 5. You may resuse the collection and use of personal information as described above.

    If you do not agree, however, receipt of LG CNS’s solution and event information may be restricted.

    For more information on the collection and use of personal information, please refer to the <Privacy Policy> published on the LG CNS website (www.lgcns.com)