Privacy Policy
Effective date: December 2015, 12
We attach great importance to the privacy of our members and comply with the provisions of the "Personal Data Protection Act", so we have formulated a privacy protection policy. You can refer to the content of the following privacy protection policy.
- Security of personal data
Protecting members' personal privacy is our important business philosophy. We will never provide members' personal information to any third party unrelated to the services of this shopping website without the member's consent. Members should keep their Internet passwords and personal information properly confidential and do not provide any personal information, especially Internet passwords, to anyone. After using the various service functions provided by our website, be sure to log out of your account. If you share your computer with others or use a public computer, remember to close the browser window.
- Collection, processing and use of personal information
The personal information obtained from our relevant websites is only used internally by us in accordance with the purpose and scope of the original description. Unless stated in advance or in accordance with relevant legal provisions, we will not provide the information to third parties, or Use for other purposes.
-
Purpose of collection:
The purpose of collection is to carry out marketing business, consumer, customer management and services, online shopping and other e-commerce services and surveys, statistics and research analysis (statutory specific purpose project numbers are O4O, O9O, 148 , 157). We will collect personal information through the process of joining the membership or conducting transactions. -
Categories of personal information collected:
The personal information we collect on our website includes:
(1) C001 Personal identification: Such as member’s name, address, phone number, email and other information.
(2) C002 identifies financial persons: such as credit card or financial institution account information.
(3) C011 Personal description: For example: gender, date of birth, etc. -
Usage period, region, objects and methods:
(1) Period: until the date the member party requests to stop using or we stop providing services.
(2) Region: Members' personal information will be used in Taiwan.
(3) Usage objects and methods: In addition to the search and query functions of our member management and customer management, members' personal information collection will also be used for identity identification, cash flow services, logistics services, marketing and publicity, etc. Examples are as follows:
When you use the various services we provide as a member, member information is automatically displayed on the page.
b. To carry out transactions: When members reserve, place bids, purchase, participate in prize giving or other activities for goods or services, or engage in other transactions, we will Members' inquiries, related after-sales services and other necessary business for conducting transactions.
c. Advertising or marketing, etc.: Provide members with various electronic magazines and other information, and provide service-related information through email, mail, phone, etc. Personalize the content or advertisements viewed by members based on the customer's personal attributes or purchase records, browsing records on our website, etc., conduct analysis of members' use of services, develop new services, or improve existing services, etc. Contact members regarding opinions on polls, activities, message boards, etc., or other service-related matters.
d. Respond to customer inquiries: Respond to inquiries raised by members to us via email, mail, fax, telephone or any other direct or indirect contact method.
e. Other matters incidental to business: Use necessary for us to provide services incidental to the purposes of use a to d. above.
f. Information provision for respective service providers: When members reserve, place bids, purchase, participate in prize giving activities or apply for other transactions with respect to the service provider’s goods or services, we may, to the extent necessary for the transaction, The member's personal data file is provided to the service provider, and the service provider is responsible for managing the personal data file. We will impose regulations on service providers to handle personal data in accordance with the principle of protecting members' privacy rights, but there is no guarantee that service providers will comply. For details, please contact the respective service provider.
g. Others: When providing individual services, personal data may also be used for purposes other than those specified above. At this time, the gist will be stated on the web page of the individual service. -
Members’ rights regarding personal data:
The parties to whom we collect personal data may exercise the following rights against us in accordance with the Personal Data Protection Act:
(1) Inquiry or request for viewing.
(2) Request a copy.
(3) Request for additions or corrections.
(4) Request to stop collection, processing or use.
(5) Request for deletion.
If members want to exercise the above rights, they can contact our customer service to apply. - Please pay attention! If you refuse to provide the necessary information to join the membership, you may not be able to enjoy the full service or be unable to use the service at all.
- Data security
To protect members' privacy and security, our member account information will be password protected. We also strive to use reasonable technology and procedures to protect the security of all personal data.
- How to inquire or correct personal data
When members have needs to inquire and read their personal information, make copies, supplement or correct it, stop computer processing and use, delete it, etc., they can contact the customer service center and we will handle it quickly.
- Cookie
In order to facilitate members' use, our website will use cookie technology to provide the services members need; cookie is a technology used by the website server to communicate with members' browsers. It may randomly store strings of words in members' computers. , used to identify users. If members turn off cookies, they may be unable to successfully log in to the website or use the shopping cart.
- Privacy Policy Revision
As the market environment changes, our company will revise its website policies from time to time. If members have any questions about the privacy statement of our website or related matters related to personal data, they can contact our customer service center by email.
Internet Marketing Super Computer Processing Personal Data File Security Maintenance Plan
1. In order to ensure the security of personal data files held by this enterprise, designated personnel shall be designated in accordance with the law to handle maintenance matters in accordance with the following personal data file security maintenance plan.
2. Security maintenance plan for personal data files:
1. Data security
(1) If the personal data file is built on the database, the scope of use and permissions "user code" and "identification password" should be determined. The identification password should be kept confidential and must not be shared with others.
(2) If personal data files are stored on a personal computer's hard drive, the data retention unit should set a power-on password, screen saver password and related security measures on the personal computer.
(3) Personal data files may not be used without permission.
(4) Personal data files should be exited immediately after use and shall not be left on the computer display screen.
(5) The identification password used by an individual should be kept confidential and the password must be changed after a fixed period of time to prevent others from stealing it and using it for a long time.
(6) IfcustomerWhen inquiring about their personal information by phone, they must be authenticated before they can reply to the relevant information to protect the rights of customers.
(7) When collecting, processing, internationally transmitting and using personal information over the Internet, necessary precautionary and protective measures should be taken to detect and prevent computer viruses and other malicious software to ensure the normal operation of the system.
(8) When processing transactions over the Internet, possible security risks should be assessed and appropriate security control measures should be developed.
2. Data auditing
(1) When using computers to process personal data, you should check whether the input, output, editing or correction of personal data is consistent with the original file.
(2) When personal data is provided for use, it should be checked whether it is consistent with the file information. If there is any doubt, the original file should be accessed for verification.
(3) A regular audit system should be established and audit data should be saved.
3. Equipment management
(1) For computer equipment used to store personal data, the data holder should maintain it regularly.
(2) Computer equipment shall not be moved unless necessary.
(3) Personal computers used to build personal data shall not be used directly as front-end tools for public inquiries.
(4) Establish a remote backup system.
(5) Definitely delete personal data stored in discarded or resold relevant computer hardware.
4. Other safety maintenance matters
(1) Personnel who use computers to process personal data files should hand over the storage media and related data in a register when their duties change. The person taking over should set a new password to facilitate management.
(2) After an employee resigns, all passwords that have been touched by the resigned employee must be canceled and appropriately adjusted.
(3) Comply with relevant regulations on general computer security maintenance.