RWA_NOVA Privacy Policy

To secure your personal information, Real World Asset Inc. (hereafter referred to as the Company) complies with legislation including the "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and the "Personal Information Protection Act." When applicable laws, government regulations, the business's terms and conditions, and internal policies change, the company may modify its personal information processing policy. In the event that this occurs, users will be notified via the company website.
  • 1. Personal information collection agreement

    Users must provide permission for the corporation to acquire their personal data. When a user picks and clicks the consent box for personal information collected during the membership registration process, they are deemed to have given their approval. The corporation has prepared the consent procedure for the personal information processing policy and terms of use.
  • 2. The gathering and use of personal data

    • The business may collect the minimal amount of personal information required to utilize the service when a user signs up for membership in order to access services including publishing articles, taking part in events, and utilizing site functionalities.
    • Only the purposes that were previously revealed to the user will be utilized for the information provided to use the company's services.
    • The business may directly or indirectly gather member's data, including cookies and access logs and account Information for marketing and advertising purposes when customers are using the service.
    • Blockchain transaction data : The nature of a public blockchain means that certain information is publicly available, including but not limited to: your wallet address; the address of a sender initiating a transaction; the address of a recipient; the maximum amount of gas fees that the sender is willing to allocate for executing the transaction; the price the sender is willing to pay per unit of gas; the nonce (a sequential number issued by the sender’s address); the cryptographic signature generated using the sender’s private key; the IP address from the requester (visible only to remote procedure call nodes); and any additional data needed for the transaction, such as invoking functions in a smart contract or providing arguments for those functions. When you authorize (i.e., use a crypto wallet to “sign”) a blockchain transaction through any of the Website, you are authorizing us to collect and use all information associated with that transaction which we will do in accordance with this Privacy Policy. Note that we are not able to control whether or how third parties use information that is stored on the blockchain, and we expressly disclaim responsibility for any such activities by third parties.
  • 3. Disclosure of information to third parties

    Anyhow, the corporation only uses or discloses user personal information within the parameters outlined in the section under "Purpose of Collection and Use of Personal Information." When giving or sharing a user's personal information with a third party, the corporation must inform the user beforehand about the recipient, the reason for using the recipient's personal information, the personal information to be given, and the duration of storage and use of the recipient's personal information. Individuals may give their consent in person, in writing, over the phone, by e-mail, or through the internet. The instances listed below are an exception, though.
    • If the user gives prior consent
    • When supplying information for statistical analysis, academic study, or market research in a format that does not allow for the identification of a specific person
    • In accordance with the rules of laws and regulations, or if the investigative agency requests it, in accordance with the steps and techniques outlined in laws for the purpose of conducting an inquiry
    • Should it be essential to settle costs for the delivery of other services, The corporation will make every effort not to disclose information against the intended intent of collection and usage.
  • 4. Personal information retention and usage duration

    While a member is using the corporation's services, the corporation keeps their personal data on file. In principle, when the intended purpose of collecting and using a member’s personal information is fulfilled, such information is promptly erased.

    ▶When the intent behind the collection and utilization is fulfilled

    • Registration details for members: When terminating the usage contract or leaving the membership
    • Payment details: When the bond's statute of limitations has run out or the payment has been made
    • Delivery details: after a test or event is over
    • Information on identification: after you establish your identity

    For the purpose of preventing confusion in service use, preventing abuse and abuse of rights, and preparing for disputes related to the infringement of rights such as defamation and requests for cooperation in investigations, for the 60 days specified in the terms and conditions, even if the member terminates the service use contract or is expelled Your personal information is kept on file. In order to secure the member's personal information, the member's personal information is now maintained and handled independently.

    The identity verification papers provided for verification will be destroyed right away if there is a disagreement, such as identity theft.

    The following data is kept on file for the allotted time, albeit, for the reasons listed below.

    • Record of display/advertisement: 6 months
    • Reasons for Preservation: Act on Consumer Protection in Electronic Commerce
    • Records on withdrawal of contracts or subscriptions: 5 years
    • Reasons for Preservation: Act on Consumer Protection in Electronic Commerce
    • Records on payment and supply of goods, etc.: 5 years
    • Reasons for Preservation: Act on Consumer Protection in Electronic Commerce
    • Records on the handling of consumer complaints or disputes: 3 years
    • Reasons for Preservation: Act on Consumer Protection in Electronic Commerce
    • Service visit records: 3 months
    • Reasons for Preservation: Communications Secrets Protection Act

    In order to preserve personal information, the corporation designates users who have not signed into the service in a year as inactive users, and the user's personal information is maintained and handled separately. Member registration information is treated independently from other personal information and is managed in line with the terms and conditions, personal information processing policy, and applicable legislation. Even though we save and manage personal information, we never use or disclose personal information until it's necessary to offer the service again or when it's required by applicable laws and regulations. If a dormant member wishes to utilize the service again, they can do so at any time by logging in and confirming their identity.

  • 5. Procedure and method of destruction of personal information

    After the purpose behind the gathering and use of personal information is satisfied, the corporation, in general, immediately destroys the information. The process and method for destruction are as follows.
    • Destruction procedure
    • The data that a member enters when registering for membership, for example, is kept for a while and then deleted in accordance with internal policy and other information protection requirements under applicable laws and regulations (refer to the period of retention and use) once the goal has been accomplished.
    • Unless otherwise required by law, this personal information will not be used for any reason other than the one for which it is being stored.
    • Destroying Technique
    • Paper with printed personal information is burned after being burned or shred using a shredder.
    • An electronic file containing personal information is erased using a technological procedure that renders the record unrecoverable.
  • 6. Rights and methods of exercise of users and legal representatives

    The company's website allows users to access and edit their personal information whenever they like.

    The information gathered about the legal representation is solely used to validate permission and, if necessary, to authenticate the legal representative's identification. It is kept on file until the kid resigns from membership.

    Users and their legal representatives have the right to seek at any time the access, rectification, and withdrawal of consent (withdrawal of membership) of registered minors.

    Alternatively, if you send a written, telephone, or email to the person in charge of protecting personal information ([contact@realworldsasset.io]), we will respond right away after doing the necessary identification verification.

  • 7. Matters concerning the installation, operation and rejection of devices that automatically collect personal information

    • What are cookies?
    • It is a very little text file that is downloaded to the user's computer's hard drive from the server that manages the company's website.
    • Cookies just identify the member's computer; they do not identify the specific member.
    • Purpose of use of cookies
    • By examining the access frequency, visit duration, and services utilized by members and non-members, it is used to identify users' preferences and areas of interest.
    • By calculating the frequency of visits and the level of engagement in various activities, it serves as data for target marketing.
    • In order to offer individualized service based on the foregoing, it serves as a material.
    • the setting up, using, and rejecting of cookies
    • The option to install cookies is available to users.
    • By configuring their web browser, users may choose whether or not to accept cookies.
    • It could be challenging for the business to offer services if you decline to install cookies.
  • 8. Administrative and technical safeguards to safeguard personal data

    The following technological and administrative steps are taken by the corporation while managing members' personal data to assure stability and prevent data loss, theft, leakage, alteration, or damage.
    • Technical Countermeasures
    • Personal information on the network may be securely communicated using a password scheme while registering and logging in thanks to Secure Socket Layer (SSL).
    • It is hard to access your company's servers without being in the internal network due to access to unlawful IPs and ports.
    • We are attempting to deploy the system in locations with external access control and to have as many different programs, technical, and management devices as is practical to assure additional security in order to avoid the loss of customer personal information as a result of external intrusion.
    • The personal information manager maintains and oversees the access records to the personal information processing system, and they are routinely checked to avoid misuse, loss, forgery, falsification, and other wrongful acts with regard to personal information. We save the connection records securely to avoid fraud, tampering, theft, or loss.
    • Administration of Justice
    • Create an internal management plan for personal information that addresses how the organization that protects personal information is structured and run, such as the appointment of a personal information protection officer. Every year, assess how well the internal management plan is being carried out.
    • Individuals shouldn't share your password with anybody because it basically protects the personal information of members. Since the password is routinely encrypted, nobody can find out what each member's password is—not even the operator. Members should be careful not to reveal their passwords, especially while using a PC in a public setting or while sharing one with others. After using the service, we advise you to log out and shut all open web browsers.
    • The company can keep the number of individuals with access to members' personal information to a minimum and sets up the required management and access processes to ensure compliance with this policy.
    • Personal information handlers carefully transfer their responsibilities in an environment where security is upheld and accountability for personal information infringement occurrences after entering and leaving the firm is made explicit.
  • 9. Officer in charge of personal information security

    The company has placed the following person in charge of personal information protection and relevant departments in order to safeguard users' personal information and manage complaints regarding personal information.
    • Personal Information Security Office
    • E-mail: contact@realworldsasset.io

    Users can contact the department in charge or the person in charge of personal information protection with any issues they may have regarding the protection of their personal information while using the company's services. Inquiries from users will receive a timely and sincere response from the business.

    Addendum

    ① The start date for this policy is July 09, 2024