잇싸

Contains ads
5K+
Downloads
Content rating
Teen
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

1. Issa Information Disclosure

* Name of place of business: Mirmedia Strategy Research Institute

* Business number: 709-81-01309

* Representative Name: Lee Dong-hyung

* Business address: 16th floor, 76, Sangamsan-ro, Mapo-gu, Seoul (Sangam-dong, YTN New Square)

* Representative phone number: 02-6263-0609



2. Issa membership registration information

* EastSideStory (hereafter referred to as Issa) is available for membership only for users who have been verified as adults through mobile phone authentication. Only members who have signed up and logged in can write articles and comments.

You can browse most of the content without logging in. Please be aware that teenagers can view the bulletin board when writing posts, and that posts that are problematic for teenagers to read may be deleted arbitrarily in some cases in accordance with the posting deletion and withdrawal (prohibition of access) regulations.

When a minor joins ISSA through illegal means such as cell phone theft, all responsibility lies with the person concerned, and ISSA does not take any legal responsibility.



3. Rules for deleting and forbidding postings and prohibiting access

In order to operate a smooth community, we will guide you through the rules for deleting, forbidding, and prohibiting access to posts. Restrictions on members are judged by the management team depending on the content of the post or controversy, and may be treated with caution or prohibition of access from time to time. The access restriction rules are as follows.

3.1. Permanent access to dung flies is prohibited immediately upon discovery

3.2. Posts that exceed a certain level

3.3. Intentional fomentation of disputes

3.4. Meaningless and excessive papering and writing that creates displeasure

3.5. Notice of violation of the law or illegal acts

3.6. Management, impersonating others

3.7. Behaviors considered inappropriate in terms of social norms

3.8. Various kinds of discrimination, excessive derogatory remarks against a specific class

3.9. Illegal data sharing (all types of data considered illegal under domestic law)

3.10. Leakage of personal information of others, theft of personal information

3.11. Community server attacks, cyber terrorism, acts that harm community operation

3.12 .Intentional spoiling of media such as movies or dramas



4. Issa user guide

4.1. Writing and commenting

Issa believes that the success and failure of the community depends on how quickly and conveniently they write enjoyable and informative articles. We hope that the articles created through Issa will be spread and reproduced in other communities and various social media to give joy and benefit to many people. We have prepared the following devices so that members can write comfortably and easily.

* When writing a post or comment, you can view images and videos even if you provide links to images and videos.

* When writing an article, it will be posted in the same form as viewed on the original site with only links from Twitter, Instagram, and Facebook.

* You can upload your own videos as well as YouTube (20MBytes)

In addition, if members convey to the management team what they were uncomfortable with when writing, we will actively review and reflect it.



4.2. Popular posts and popular comments

Articles with more than 30 recommendations (October 4, 2022) are classified as ‘popular posts’. Posts with more than 100,000 views or more than 1,000 recommendations (August 31, 2022) are classified as ‘Hall of Fame’ and recorded so that they will remain in the history of Issa. Each standard number can be changed according to the increase or decrease of the number of users. In addition, among the comments with more than 5 recommendations, rankings are determined according to the number of recommendations, and the best comments 1, 2, and 3 are placed at the top of the comment area.
Updated on
21 Feb 2023

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region and age The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection
Data isn’t encrypted
Data can’t be deleted