MEAWschool.com
meawschool
BUY POINTS
BASIC DIAGNOSIS COURSE
BASIC DIAGNOSIS COURSE PACKAGES
BASIC DIAGNOSIS COURSE
1. Introduction to MEAW
1. Introduction to MEAW
2. Orthodontic Data Base
2. Panorama Analysis
1. Panorama Analysis (Part 1)
3. Panorama Analysis (Part 2)
3. Cephalometric Analysis
1. Initial Evaluation of Lateral Ceph
2. Tracing Cephalograms
3. Cephalometric Landmarks (Part 1)
4. Cephalometric Landmarks (Part 2)
5. Cephalometric Planes
6. Cephalometric Angles (Part 1)
7. Cephalometric Angles (Part 2)
8. ROC Analysis in Orthodontics
9. Cephalometric Functional Analysis
10. Vertical Analysis
11. Overbite Depth Indicator (ODI)
12. Horizontal Analysis
13. Anteroposterior Dysplasia Indicator
4. Model Analysis
1. Model Fabrication
2. Model Analysis (Part 1)
3. Model Analysis (Part 2)
4. Model Analysis (Part 3)
5. Model Analysis Worksheet (Part 4)
6. Hands-on Practice (Part 5)
7. Hands-on Practice (Part 6)
8. Summary of Model Analysis
ADVANCED DIAGNOSIS COURSE
ADVANCED DIAGNOSIS COURSE PACKAGES
ADVANCED DIAGNOSIS COURSE
1. Causes of Malocclusion
1. Causes of Malocclusion: Introduction
2. Adaptation and Compensation
3. Causes of Malocclusion (Part 1): Environmental Origin
4. Causes of Malocclusion (Part 2): Environmental Origin
5. Causes of Malocclusion (Part 3): Dental Origin I
6. Causes of Malocclusion (Part 4): Dental Origin II
7. Causes of Malocclusion (Part 5): Dental Origin III
8. Causes of Malocclusion (Part 6): Dental Origin IV
9. Causes of Malocclusion (Part 7): Skeletal Origin
10. Discrepancy
11. Low vertical dimension
2. Skeletal Pattern Analysis
1. Vertical Analysis: ODI
2. Horizontal Analysis: APDI
3. AB-maxillomandibular Triangle
4. Exercise: ODI, APDI and CF
5. Combination Factor (CF) (Part 1)
6. Combination Factor (CF) (Part 2)
7. Skeletal Pattern Analysis (Part 1)
8. Skeletal Pattern Analysis (Part 2)
9. Revies of Landmarks for ODI, APDI, and CF
3. Occlusal Plane Analysis
1. Introduction to Occlusal Plane
2. Occlusal Plane Analysis
3. Occlusal Plane: Implication
4. Factors Affecting Occlusal Plane
5. Posterior Occlusal Plane (POP)
6. Dr. Jeong-il Kim, Presenation of Thesis
7. Occlusal Plane Change Accoding to the Appliances (Part 1)
8. Management of Occlusal Plane (Part 2)
9. Management of Occlusal Plane (Part 3): Dr. Schudy, Dr. Young H. Kim, and Dr. Sadao Sato
10. Classification According to Occlusal Plane
11. Management of Occlusal Plane (Part 4): Treatment Direction
12. Occlusal Fence Theory
13. Individualized Orthodontic Treatment (Part 1)
4. Orthodontic Differential Diagnosis
1. Orthodontic Differential Diagnosis (Part 1)
2. Orthodontic Treatment Goals
3. Six keys to Normal Occlusion
4. Orthodontic Differential Diagnosis (Part 2)
5. Orthodontic Differential Diagnosis (Part 3): Space Gaining Methods
6. Space Gaining Methods
7. Diagnostic Thinking Process for Non-extraction Treatment
8. Extraction Index
9. Orthodontic Differential Diagnosis (Part 4): Extraction Treatment
10. PEG (Premolar Extraction Guideline) Index
11. Malocclusion Treatment According to POP
12. Problem List (Part 1)
13. Problem List (Part 2)
14. Differential Diagnosis for Class II
15. Differential Diagnosis for Class III
5. Non-extraction Treatment (Part 1)
1. Strategic Leveling and Alignment (Part 1): Utilization of Open Coil Springs
2. Strategic Leveling and Lignment (Part 2): Strategic Bonding
3. Strategic Leveling and Alignment (Part 3): Diagrams
4. Decrowding in Non-extraction Treatment (Part 1): Space Openinig
5. Decrowding in Non-extraction Treatment (Part 2): Tooth Alignment
6. Palatal Displacement of Upper Lateral Incisors (Part 1)
7. Palatal Displacement of Upper Lateral Incisors (Part 2)
8. Torque Control Archwire: Fabrication
9. Rotation Control (Part 1): Anterior teeth
10. Rotation Control (Part 2): Posterior teeth
11. Retrusive Control (Part 1): Introduction
12. Retrusive Control (Part 2): Non-extraction Treatment
13. Second and Third Molars: Neglected Aspects in Orthodontics
14. Third Molars and Orthodontic Diagnosis
15. Third Molar Extraction: Case 1
16. Reproximation
17. Reproximation: Case 1
18. Second Molar Extraction (Part 1)
19. Second Molar Extraction (Part 2)
20. Second Molar Extraction: Case 1
6. Non-extraction Treatment (Part 2)
1. Arch Length Preservation: TPA (Part 1)
2. Transpalatal Arch (Part 2)
3. Arch Length Preservation: Lingual Arch (Part 1)
4. Lingual Arch (Part 2)
5. Elimination of Occlusal Force (Part 1): Non-extraction
6. Expansion Appliances (Part 1): Introduction
7. Expansion Appliances (Part 2): Expansion Appliances
8. Expansion Appliances (Part 3): Advantages and Disadvantages
9. Expansion Appliances (Part 4): Case 1
10. Twin Block Appliances (Part 1): Introduction
11. Twin Block Appliances (Part 2): Fixed Appliance after Twin Block Appliance
12. Twin Block Appliances (Part 3): Case 1
13. Headgear (Part 1): Introduction
14. Headgear (Part 2): Fabrication and Adjustment
15. Double Archwires (DAW) (Part 1): Introduction
16. Double Archwires (DAW) (Part 2): Fabrication and Adjustment
17. Double Archwires (DAW) (Part 3): Case 1
18. Mini Screws: Case 1
7. Premolar Extraction Treatment
1. Space Closing Methods in MEAW (Part 1)
2. Space Closing Methods in MEAW (Part 2)
3. Anchorage (Part 1)
4. Anchorage (Part 2)
5. Elimination of Occlusal Force (Part 2): Extraction
6. Retrusive Control (Part 3): Extraction Treatment
7. PEG (Premolar Extraction Guideline) Index
8. Guidelines for Premolar Extraction
9. Strategic Bonding for Extraction Treatment
10. U44, L44 Extraction Treatment: Case 1
11. U44, L55 Extraction Treatment: Case 1
12. Bracket Positioning for U44, L55 Extraction Treatment
13. U55, L55 Extraction Treatment: Case 1
14. Only U44 Extraction Treatment: Case 1
15. Only U55 Extraction Treatment: Case 1
16. Malocclusion Treatment According to POP
17. Noraml UOP and Normal POP: Extraction Treatment
18. Noraml UOP and Steep POP: Extraction Treatment
19. Steep UOP and Steep POP: Extraction Treatment
20. Asymmetric Premolar Extraction Treatment
8. Unusual Extraction Treatment
1. Unusual Extraction Treatment (Part 1)
2. Unusual Extraction Treatment (Part 2
3. Lower Incisor Extraction Treatment: Case 1
4. U2 Extraction Treatment: Case 1
5. U1 Extraction Treatment: Case 1
6. U3 Extraction Treatment: Case 1
7. First Molar Extraction Treatment: Case 1
9. Finishing Procedures (Part 1)
1. How to Finish the Malocclusion
2. The Vertical and the Horizontal Components of the Loops
3. Load-Deflection Rate (LDR) in MEAW
4. Orthodontic Normal Occlusion
5. 1st-. 2nd-, and 3rd- Order Bends in MEAW
6. Three Dimensional Control in MEAW
7. MEAW Prescription
8. MEAW vs. NiTi
9. MEAW Fabrication (Part 1): Lower MEAW
10. MEAW Fabrication (Part 2): Upper MEAW
11. MEAW Fabrication (Part 3): MEAW for the Extraction Cases
12. MEAW Fabrication (Part 3): MEAW Adjustment after MEAW Fabrication/a>
13. Torque in MEAW
14. MEAW in SWA
15. Reverse MEAW
10. Finishing Procedures (Part 2)
1. Tooth Movement in MEAW (Part 1): Anterior Vertical Elastics (AVE)
2. Orthodontic Elastics
3. Tooth Movement in MEAW (Part 2): Class II Elastics
4. Tooth Movement in MEAW (Part 3): Class III Elastics
5. Tooth Movement in MEAW (Part 4): Midline Elastics
6. Tooth Movement in MEAW (Part 5): After Extraction Treatment
7. Practical Tooth Movement in MEAW (Part 1): Non-extraction Teatment, Open bite
8. Practical Tooth Movement in MEAW (Part 2): Non-extraction Teatment, Class III
9. Practical Tooth Movement in MEAW (Part 3): Non-extraction Teatment, Class II
10. Practical Tooth Movement in MEAW (Part 4): U44, L44 Extraction Treatment
11. Practical Tooth Movement in MEAW (Part 5): U44, L55 Extraction Treatment
12. Practical Tooth Movement in MEAW (Part 6): U55, L55 Extraction Treatment
13. Practical Tooth Movement in MEAW (Part 7): Only U44 or U55 Extraction Treatment
14. Retrusive Control (Part 5): Finishing
15. Finishing: Sequence of Elastic Use
16. Expansion Archwires
11. Retrusive Control
1. Retrusive Control (Part 1): Introduction
2. Retrusive Control (Part 2): Non-extraction Treatment
3. Retrusive Control (Part 3): Extraction Treatment
4. Retrusive Control (Part 4): Composite Resin Bonding
5. Retrusive Control (Part 5): Finishing
12. Retention Phase Treatment
1. Retention Phase Treatment
2. When to Debond!
3. ABO Objective Grading System
4. Retention after Crowding Treatment
5. Retention after Space Treatment
6. Retention after Class II Treatment
7. Retention after Class III Treatment
8. Retention after deep bite Treatment
9. Retention after open bite Treatment
10. Retention after Posterior Cross-bite Treatment
11. Root Resorption (Part 1)
12. Root Resorption (Part 2)
13. Decalcification
MASTER COURSE
1. Open Bite Malocclusion
2. Class III Malocclusion
3. Midline Deviation Malocclusion
4. Class II Malocclusion
5. Deep Bite Malocclusion
6. Class I Malocclusion
INTENSIVE COURSE
1. Adult Malocclusion
2. Impacted Teeth
3. Congenital Missing Teeth
4. Orthodontic Treatment with TMD
5. Bruxism, TMJ and Occlusion
6. Clinical Application of Mini Screws
7. Surgically-combined Orthodontic Treatment
HANDS-ON PRACTICE COURSE
HANDS-ON PRACTICE COURSE PACKAGES
HANDS-ON PRACTICE COURSE
1. Basic L-loop Wire Bending
1. L-loop Wire Bending Exercise
2. MEAW Wire Bending
1. MEAW Adjustment: Tip-back Bend
2. Lower MEAW
3. Upper MEAW
3. Reverse MEAW Wire Bending
1. Reverse MEAW
4. Double Arch Wires (DAW) Bending
1. DAW (Double Arch Wires)
5. Space Closing Arch Wire
1. Contraction Loop
2. Ideal Arch with Hook
3. Combination Loop
BOOKS
ALL BOOKS
Vol.1 Orthodontic Treatement with MEAW
Vol.2 MEAW Orthodontics In-Depth
MEAW Vol.1 + Vol.2
SEMINAR
ALL SEMINAR
Last Seminar
Upcoming Seminar
3-day MEAW Course
5-day MEAW Course
2024 International MEAW Course
Online MEAW Wire Bending Course
COMMUNITY
Notice
News & Event
Q&A
FAQ
1:1 Inquiry
ABOUT US
About US
Terms & Conditions
Privacy Policy
Refund Policy
Rejecting Collection of Email Address
Tag Box
LOGIN
SIGN UP
INFORMATION
CART
1
KOR
ENG
CN
BASIC DIAGNOSIS COURSE
ADVANCED DIAGNOSIS COURSE
HANDS-ON PRACTICE COURSE
SEMINARS
BOOKS
ABOUT US
Privacy Policy
Home > COMMUNITY
'RADIX. Inc' (here in after "company") conforms to Privacy Protection Act, Protection of Communications Secrets Act, Telecommunications Business Act and Information Infrastructure Promotion Act and Information Protection Act.
With our privacy policy, company lets you know how and for what purposes one's private information are used, and what measures are taken for the protection of privacy.
The main policies in the privacy policy of 'RADIX' are as follows.
1. Usage purposes of private information
2. List of private information being handled
3. Handling and storage period of private information
4. Providing private information to a third party
5. Referral of private information
6. Authority and implementing methods of user and statutory representative
7. Destruction of private information
8. Details on installing/ operating of automatic private information collecting device and its rejection
9. Private information security manager
10. Securing safety of private information
11. Changes on Privacy Policy
12. Civil service on private information
This policy will be in effect from 1st Apr, 2021.
1. Usage Purposes of Private information
The company handles private information of users for the following purposes.
Implementation if contract on service provision and Settlement of fees contents provision according to service provision,
purchasing and payment, personal verification, object delivery and sending.
Member management
Personal verification according to membership service usage, personal identification, prevention of member and unauthorized usage, confirming sign ups, age verification, handling of complaints, notification purposes
Marketing and Advertising
New service (product) development and specialization, event and advertorial information notification, educational product promotion, demographic-based service provision and advertisements, access frequency identification, and collecting statistics on service usage of members
Others
Limit sign up numbers, record conservation and other statistical data calculations
2. List of private information being handled
[General members]
Required items : email, password, name, country, address
private information collecting method: homepage (sign up, noticeboard, open noticeboard, etc.), documentation,
sign up with telephone, fax, event entry, delivery request
Collection and usage denial of personal entity and notifying disadvantages following denial.
Subjects may deny to agree in the items for collection and the collecting method by the company. Upon denial, part of membership service may be restricted for use.
3. Handling and storage period of private information
Handling and storage period of private information are as follows.
Storing items: Equivalent to processing items.
Grounds for storage: Access terms and privacy policy
Storage period: during the period of membership according to Contract for Use
However, when necessary to store private information according to related legislations, company will store information for a certain period as follows.
Record on indication/ advertisement: 6 months (Consumer Protection Act)
Record on contract or subscription withdrawal: 5 years (Consumer Protection Act)
Record on payment and supply of goods: 5 years (Consumer Protection Act)
Record on consumer complaint or conflict handling: 3 years (Consumer Protection Act)
Record on collection/processing of credit information and usage: 3 years (The Act on the Utilization and Protection of Credit Information)
Communications confirmation data according to Protection of Communications Secrets Act : 3 months
4. Providing private information to a third party
Company principally do not provide private information outside, except for:
When the users have agreed in advance
When according to the legal regulations provision is necessary, or when there is a request from investigating offices.
5. User and statutory representative authority and its implementation
A. User and statutory representative may request for the viewing/correction of private information whenever, on the following circumstances.
1) Private information of user stored by the company
2) Contents on the usage of private information of user or provision of private information of user to a third party by the company
3) Details on the agreement on private information collection, usage, provision to the company
Users may view, correct their information from [My Page] – [Edit member information], in the company’s website by themselves. Users may also request for the viewing and correction of private information through documentation, phone calls, e-mails, and other means.
B: User and statutory representative may request for the suspension of private information handling.
C. User and statutory representative may always withdraw (membership cancellation) their agreement on the collection, usage and provision of private information when signing up as member.
Consent cancellation (membership cancellation) can be done in the [My Page] – [Edit member information] menu after self-verification, or you can contact privacy protection manager through documentation, phone calls, or e-mails individually. We will take necessary measures such as destroying private information of users.
6. Destruction of private information
When private information storage period has been elapsed, company will destroy personal information within 5 days from the termination date of storage period.
When the concerned private information becomes unnecessary due to the accomplishment of private information processing objectives, cancellation of the concerned service, termination of business and other reasons, company will destroy personal information within 5 days from the day it has become unnecessary.
However, the private information that should be stored for a certain period of time due to related legislations, it will be destroyed after storing for a certain period of time. The destruction procedure and methods are as follows.
Destruction Procedure
Even the private information storage time elapses, if the private information should be stored for a certain period of time due to related legislations, it should be moved to an individual DB, stored for a certain amount of time and then destroyed.
(Documents should be stored in a storage box with separate lock).
Private information stored in the individual DB should only be used for storage purposes according to related legislations and not for other purposes.
Destruction method
Private information saved in an electronic file format should be deleted by using a technical method for it to be not restored again.
Private information printed in a documented form should be destroyed through shredders or burnt.
7. Details on installing/ operating of automatic private information collecting device and its rejection
The company operated cookie and ‘Kollus Player’ that stores and finds information. Cookie is a very small text file on the server used or running company’s website sent to your browser.
It is saved to your computer hard disk.
Also, ‘Kollus Player’ refers to Media Delivery system, principally blocking illegal recordings of media assets, external leakage, screen-capture attempts.
Recording attempt software, User ID, recording attempt time and date, contents names are all stored in the server. Company uses Cookie and ‘Kollus Player’ for the following purposes.
Usage purpose of Cookie and others
Analysis on access frequencies and visiting times of users. Identify user taste and interests and trace tracks. Identify participation levels in all events and number of visits. Provide personally-customized services and target marketing.
Users have an option on the installation of cookie. Therefore, users can set options in their web browsers to allow all cookies or confirm whenever cookie is stored, or deny all storage of cookies.
How to deny cookie setting
Ex) One method to deny cookie setting is for the user to choose web browser option. User can allow all cookies or confirm whenever cookie is stored, or deny all storage of cookies.
Example of setting methods (Internet Explorer)
Tools on the top of the web browser > Internet Option> private information
However, when the user denied cookie installation, he may find difficulty in service provision.
8. Private information protection manager
The Company has private information protection manager as follows in order to handle complaints related to private information and to protect private information.
E-mail: meawschool@naver.com
User may report to managing departments or the private information protection manager for civil complaints related to all privacy policy. The Company will promptly answer to the complaints of users.
9. Securing safety of private information
The Company has the following technical, managerial measures to secure safety so that the private information will not be lost, stole, leaked, changed or damaged.
1) Private information of users to encrypt their private information is protected by the password, and important data are protected through separate security functions such as encrypting file and sending data and using file locking functions.
2) Technical countermeasures to hacking and other attacks
The company is on a 24-hour watch to prevent leakage or damage of private information of users due to hacking or computer viruses. We are on a watch around the clock by installing system in authorized-only areas, and installing trespassing detection system, and using trespassing blocking devices. Also, we regularly update vaccine program to immediately use the vaccine when viruses show up, thus prevent private information infringement.
3) Access restriction of private information processing system
The company established standards on granting, changing, terminating access authority to private information handlers, and control password generation method, changing period and others, thus we take all necessary measures needed for access control.
4) Private Information handling employee training
Private information handling employee range is limited to the manager for minimizing authority, and regular trainings on the acquisition of new security technology and obligation on private information protection are implemented to manage access authority, thus we implement managerial countermeasures.
ID and password used by users will principally only be used by users.
The company will not take responsibility on the matters such as leakage of private information like ID and passwords, and basic dangers of the Internet.
Please have security consciousness to your passwords, change it often, and when logging in to a shared PC, please be cautious not to leak the private information.
10. Change on Privacy Policy
When revising the Privacy Policy, Company will notify of this through notification menu of the homepage, at least before 7 days.
11. Civil service on private information
In case of reports or consultation on other privacy infringements, please contact the below institutions.
Personal Dispute Mediation Committee (www.1336.or.kr/1336)
Information Protection Board Certification Committee (www.eprivacy.or.kr/02-580-0533~4)
Supreme Public Prosecutors ' Office (http://i-minwon.spo.go.kr/02-3480-2582)
National Police Agency Cyber Terror Response Center(www.ctrc.go.kr/02-392-0330)
Any details not regulated under this Privacy Policy will be applied with the Usage Terms in priority, within the range of related legislations.
Privacy Policy notification date: April 1, 2021
Privacy Policy Implementation date: April 1, 2021