Subscribe Now
Trending News
SYNCTobe Technology Ltd. - Privacy Policy

SYNCTobe Technology Co., Ltd. (Hereinafter Referred to as “SYNCTobe Technology”, “we”,  “our company”) attaches great importance to your privacy rights and complies with the provisions of the Personal Data Protection Act. Therefore, we have developed a privacy policy to protect your privacy. You can refer to the following content of the privacy policy.

1. Security of Personal Data
Protecting your personal privacy is an important principle for us. We will never disclose your personal information to any unrelated third parties without your agreement.

2. Collection, processing, and utilization of personal data
The personal data obtained from our website and related services provided by our company is solely for internal use in accordance with the original statement of purpose and scope. We will not provide the data to third parties or use it for any other purposes unless expressly stated otherwise or required by relevant laws and regulations.

• Purpose of collection:
The purpose of the collection is for marketing activities, customer management, service provision, surveys, statistics, and research analysis (specific purposes under legal item numbers O40, O90, 148, 157). Our company collects personal data through your participation process or application for free software testing process.

• Categories of personal data collected:
The personal data collected on our company’s website includes:
(1) C001: Personal Identifiers – such as your name, address, phone number, email address, and other related information.

• Period, region, target, and method of Use:
(1) Duration: Until the date you, as the data subject, request to stop using it or until our company ceases to provide the service.
(2) Region: Your personal data will be used for the Taiwan region.
(3) Purpose and Method of Use: Your personal data collection will be used by us for customer management, retrieval and querying, and various related service functionalities. It will also be used for identity verification, marketing, and promotional purposes. Examples include.
a. Verify your identity when using various services provided by our company, or automatically display your information on the page.
b. Promotion, advertising, or marketing: Provide you with various information such as electronic magazines, and send information related to services through email, mail, phone, etc. Personalize operations based on the content or advertisements you browse, customer attributes, and browsing history on our company’s website. Analyze your usage of services, develop new services, or improve existing services. Contact you regarding surveys, events, message boards, or other service-related matters, including feedback and other service-related matters.
c. Response to customer inquiry: We will respond to your inquiry submitted through https://www.synctobe.com/contact/ via email, mail, fax, telephone, or any other direct or indirect means of communication.
d. Other related business matters: The utilization purposes mentioned from a to d above are necessary for our company to provide its services.

• Rights regarding your personal data:
As the data subject of the personal information we collect, you have the right to exercise the following rights under the Personal Data Protection Act with regard to us:
(1) Inquire or request to read.
(2) Request for provid a copy.
(3) Request for supplementation or correction.
(4) Request to cease collecting, processing, or utilizing.
(5) Request for deletion.
If you wish to exercise the aforementioned rights, you can contact our customer service to submit your application.
• Note: that refusing to provide the necessary information may result in being unable to enjoy the complete service or being unable to use the service at all.

3. Data security
To ensure your privacy and security, your data or account will be protected with a password. We will make every effort, using reasonable technical and procedural measures, to safeguard the security of all personal data.

4. The methods for personal data inquiry or correction
If you have any inquiries or requests regarding your personal data, such as accessing and reviewing, obtaining copies, supplementing or correcting, ceasing computer processing and utilization, or deleting, you can contact our customer service center. We will promptly handle your request.

5. Cookie
To enhance your experience, our official website utilizes cookie technology to provide the services you need. A cookie is a technology used by the website server to communicate with your browser. It may randomly store strings of data on your computer to identify and differentiate users. Disabling cookies may potentially result in difficulties logging into the website or using features.

6. Privacy Policy Revision
We may revise our website policies in response to changes in the market environment. If you have any questions regarding our website’s privacy statement or any matters related to personal data, please feel free to contact our customer service center via email.

Personal Data File Security Maintenance Plan

1. To ensure the security of personal data files in this business, a designated person is appointed by law to carry out maintenance tasks in accordance with the following personal data file security maintenance plan.
2. Personal Data File Security Maintenance Plan:
I. Data Security Aspect
(1)  For personal data files stored in databases, the scope of use and user permissions should be defined. This includes “user codes” and “identification passwords.” The identification passwords must be kept confidential and should not be shared with others.
(2)  For personal data files stored on personal computer hard disk drives, the data holding entity should set up a boot password, screen lock password, and implement relevant security measures on the personal computer.
(3)  Personal data files shall not be used without authorization.
(4)  Personal data files should be promptly closed and not left on the computer display screen after use.
(5)  The identification passwords used by individuals should be kept confidential and must be changed by themselves after a fixed period of time to prevent unauthorized access and prolonged use by others.
(6)  If you inquire about your personal data over the phone, we will require authentication before providing any relevant information in order to protect your rights and interests.
(7)  When collecting, processing, transmitting, and utilizing personal data over the Internet, necessary preventive and protective measures should be implemented. This includes detecting and preventing computer viruses and other malicious software to ensure the proper functioning of the system.
(8)  When conducting transaction processing over the Internet, it is necessary to assess potential security risks and develop appropriate security control measures.

II. Data auditing aspect
(1)  When processing personal data using a computer, it is important to verify whether the input, output, editing, or correction of personal data corresponds to the original file.
(2)  When providing personal data for use, it is important to verify whether it matches the information in the file. If there are any doubts, the original file should be referred to for verification.
(3)  A regular auditing system should be established, and audit records should be retained.

III. Equipment management aspect
(1)  For computer equipment related to the storage of personal data, the data holding entity should conduct regular maintenance and upkeep.
(2)  Computer equipment should not be moved arbitrarily unless it is necessary.
(3)  Personal computers used for the storage of personal data should not be directly used as front-end tools for public inquiries.
(4)  Establish an off-site backup system.
(5)  Ensure the proper deletion of personal data stored in discarded or resold computer hardware.

IV. Other security maintenance measures
(1)  When personnel responsible for processing personal data files on computers experience job changes, they should transfer the stored media and related data by listing them. The successor personnel should set up a new password for the purpose of management.
(2)  After an employee leaves the company, all passwords they have used or had access to must be deactivated and appropriately adjusted.
(3)  Comply with the relevant regulations regarding general computer security maintenance.