• company
    • Overview
    • History
    • Business Area
    • Customers & Partners
    • Location
  • tech & service
    • Technology
    • Service
    • Loop Center
  • solution
    • Solutions
    • Recycling Solutions
    • Sorting & Packaging Automation
    • Custom Automation
    • Reference
  • store
  • pr center
    • Blog
    • News
    • Inquiry
    • Recruitment Information
ENG
  • KOR
Korean English
  • Company
    • Overview
    • History
    • Business Area
    • Customers & Partners
    • Location
  • Tech & Service
    • Technology
    • Service
    • Loop Center
  • Solutions
    • Solutions
    • Recycling Solutions
    • Sorting & Packaging Automation
    • Custom Automation
    • Reference
  • Store
  • PR Center
    • Blog
    • News
    • Inquiry
    • Recruitment Information

Reference

AI-powered custom automation solutions

Total 9 posts.

  • Mobile Wafer
    Mobile Wafer Mobile manipulator for semiconductor wafer transfer
  • Stacker - Paper Bag Handling
    Stacker - Paper Bag Handling Dedicated robot system for paper bag depalletizing and palletizing
  • TriArmX
    TriArmX 3-arm based autonomous operation robot system
  • MeltBot
    MeltBot Hot-melt dispensing robot system
  • PressWorker
    PressWorker Automotive interior press robot system
  • FruitPacker – Apple
    FruitPacker – Apple Fruit weight-based combination and packaging robot system
  • 1
  • 2

Robot AI based
Automation
Robotic Solutions

© Copyright 2026 THOTH Inc. All copyrights reserved.
  • head office

    402, 4th floor, A-3, 582 Daedeok-daero, Yuseong-gu, Daejeon (Okto Building, Doryong-dong)

  • Research Institute/Hanam Branch

    144 Shinwoo-sil-ro, Hanam-si, Gyeonggi-do

  • Seoul branch

    5th floor, G-lite Building, 43-11 Seongnae-dong, Gangdong-gu, Seoul

  • Jeju branch

    201 Digital Convergence Center, 241 Cheomdan-ro, Jeju-si, Jeju Special Self-Governing Province

02-463-8030
admin@thoth.ws
© Copyright 2026 THOTH Inc. All copyrights reserved.

Personal Information Processing Guidelines

THOTH (hereinafter referred to as the "Company") establishes and discloses the following personal information processing guidelines in accordance with Article 30 of the Personal Information Protection Act to protect the personal information of information subjects and to promptly and smoothly handle related grievances.


Article 1 (Purpose of Processing Personal Information)

The Company processes personal information for the following purposes. The personal information being processed will not be used for purposes other than the following, and if the purpose of use changes, necessary measures will be taken, such as obtaining separate consent in accordance with Article 18 of the Personal Information Protection Act.

  1. 1. Providing responses to customer inquiries on the website and managing current status
Article 2 (Processing and Retention Period of Personal Information)
  1. 1. The Company processes and retains personal information within the retention and use period of personal information according to laws or the retention and use period of personal information consented to when collecting personal information from information subjects.
  2. 2. The processing and retention period is as follows.

    - Within 3 years from the date of receipt of customer inquiries on the website

Article 3 (Provision of Personal Information to Third Parties)
  1. The Company uses personal information within the scope notified in advance and, in principle, does not use it beyond that scope or disclose personal information externally without the prior consent of the information subject. However, the following cases are exceptions.
    - Where the information subject has given prior consent
    - Where required by law, or where a law enforcement agency requests it for investigative purposes in accordance with procedures and methods prescribed by law
Article 4 (Entrustment of Personal Information Processing)
  1. In principle, the Company does not entrust the processing of personal information without the user's consent. However, for smooth and improved customer service, the Company may entrust the management of personal information to other companies within a limited scope. When entering into an entrustment contract, the Company will notify, through notices and this privacy policy, matters such as the entrustee, entrusted work details, entrustment period, contract contents (compliance with personal information protection laws, prohibition of provision to third parties, allocation of responsibility, etc.), and secure management of personal information in accordance with applicable laws, and will obtain prior consent when necessary.
Article 5 (Rights, Duties and Exercise Methods of Information Subjects)
  1. 1. Information subjects may exercise the following rights related to personal information protection against the Company at any time.

    - Request to access personal information
    - Request for correction in case of errors, etc.
    - Request for deletion
    - Request to suspend processing

  2. 2. The exercise of rights under paragraph 1 may be made to the Company in writing, by telephone, or by email, and the Company will take action without delay.
  3. 3. If an information subject requests correction or deletion of errors in personal information, the Company will not use or provide the personal information until the correction or deletion is completed.
  4. 4. The exercise of rights under paragraph 1 may be made through an agent such as a legal representative of the information subject or an authorized person. In this case, a power of attorney in accordance with Form No. 11 attached to the Enforcement Rules of the Personal Information Protection Act must be submitted.
  5. 5. Information subjects shall not infringe on the personal information and privacy of themselves or others processed by the Company in violation of the Personal Information Protection Act and other related laws.
Article 6 (Personal Information Items Processed) The Company processes the following personal information items.
  1. 1. Providing responses to customer inquiries on the website and managing current status

    - Required items: Name, contact information (telephone number, email address), company name

  2. 2. The following personal information items may be automatically generated and collected during use of internet services.

    - IP address, cookies, MAC address, service usage records, visit records, records of improper use, etc.

Article 7 (Destruction of Personal Information)
  1. 1. The Company destroys personal information without delay when it becomes unnecessary, such as upon expiration of the retention period or achievement of the processing purpose.
  2. 2. The procedure and method for destroying personal information are as follows.

    - Destruction procedure
    The Company selects personal information for which a reason for destruction has occurred and destroys it after obtaining approval from the Company's personal information protection officer.
    - Destruction method
    Personal information printed on paper is destroyed by shredding or incineration. Personal information stored in electronic file format is deleted using technical methods that prevent the records from being reproduced.

Article 8 (Measures to Ensure Security of Personal Information)
  1. The Company takes the following measures to ensure the security of personal information.
  2. 1. Administrative measures: establishment and implementation of internal management plans, regular employee training, etc.
  3. 2. Technical measures: management of access rights to personal information processing systems, etc.
Article 9 (Installation, Operation and Refusal of Automatic Personal Information Collection Devices)
  1. 1. The Company uses "cookies" that store and retrieve usage information from time to time to provide individualized customized services to users.
  2. 2. Cookies are small amounts of information sent by the server (http) operating the website to the user's computer browser and may be stored on the hard disk of the user's PC.
  3. 3. Purpose of use of cookies: Used to provide optimized information to users by identifying visit and usage patterns for each service and website visited, popular search terms, secure connection status, etc.
  4. 4. Installation, operation and refusal of cookies: You can refuse to store cookies through option settings in your web browser's privacy menu (e.g., Tools > Internet Options > Privacy in some browsers).
  5. 5. If you refuse to store cookies, you may experience difficulties in using customized services.
Article 11 (Remedies for Infringement of Rights and Interests)
  1. Information subjects may contact the institutions below for damage relief and consultation regarding personal information infringement. (The institutions below are separate from the Company. If you are not satisfied with the Company's own personal information complaint handling or damage relief results, or if you need further assistance, please contact them.)
  2. 1. Personal Information Infringement Report Center (operated by Korea Internet & Security Agency)
    - Responsibilities: Reporting personal information infringement, applying for consultation
    - Website: privacy.kisa.or.kr
    - Telephone: 118 (without area code)
    - Address: 3F, Personal Information Infringement Report Center, 9 Jinheung-gil, Naju-si, Jeollanam-do 58324, Republic of Korea
  3. 2. Personal Information Dispute Mediation Committee
    - Responsibilities: Application for personal information dispute mediation, collective dispute mediation (civil resolution)
    - Website: www.kopico.go.kr
    - Telephone: 1833-6972 (without area code)
    - Address: 12F, Government Seoul Building, 209 Sejong-daero, Jongno-gu, Seoul 03171, Republic of Korea
  4. 3. Cyber Crime Investigation Division, Supreme Prosecutors' Office: 02-3480-3573 (www.spo.go.kr)
  5. 4. Cyber Safety Bureau, Korean National Police Agency: 182 (cyberbureau.police.go.kr)
Article 12 (Changes to Privacy Policy)
  1. This privacy policy is effective from December 1, 2024.

Email Unsolicited Collection Denial

To prevent unsolicited third-party emails from being sent indiscriminately to users of the THOTH website, we refuse any unauthorized collection of email addresses posted on this website through email harvesting programs or other technical devices. Please note that violations may result in criminal penalties under applicable law.

Posted: April 1, 2024


Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.
Article 48 (Prohibition of Infringement on Information and Communications Networks, etc.)
  1. 1. No one shall access an information and communications network without legitimate access authority or beyond permitted access authority.
  2. 2. No one shall, without legitimate grounds, transmit or distribute programs (hereinafter referred to as "malicious programs") that may damage, destroy, alter, or forge information and communications systems, data, or programs, or interfere with their operation.
  3. 3. No one shall disrupt an information and communications network by sending large volumes of signals or data, processing improper commands, or other methods for the purpose of interfering with its stable operation.
Article 65 (Penal Provisions)
  1. 1. Any person who falls under any of the subparagraphs of the following paragraph shall be punished by imprisonment for not more than five years or by a fine not exceeding KRW 50 million.
  2. 2. Attempted offenses under paragraph (1), subparagraph 9 shall also be punished.