Privacy Policy
Last Updated: March 15, 2025
At Synapse Awareness, we understand that your trust is earned through transparency. This privacy policy explains how we collect, use, and protect your information when you interact with our monitoring and performance optimization services.
Information We Collect
When you engage with our services, we collect several types of information to provide effective IT monitoring and performance optimization solutions. This collection happens through various touchpoints during our business relationship.
Personal Information
- Contact details including name, email address, and phone number
 - Company information such as business name, industry, and organizational structure
 - Technical contact information for system administrators and IT personnel
 - Professional titles and roles within your organization
 - Communication preferences and service requirements
 
Technical Data
- System performance metrics and monitoring data from your IT infrastructure
 - Network configuration details necessary for optimization services
 - Server logs, application performance data, and diagnostic information
 - Security event logs and incident response data when relevant
 - Usage patterns and system behavior analytics for performance improvement
 
How We Use Your Information
Your information serves specific purposes related to delivering and improving our monitoring and optimization services. We believe in using data purposefully rather than collecting it indiscriminately.
| Data Type | Primary Use | Retention Period | 
|---|---|---|
| Contact Information | Service delivery and client communication | Duration of service + 2 years | 
| Technical Monitoring Data | Performance optimization and issue resolution | 12 months for active analysis | 
| System Configuration | Customized monitoring and alerts setup | Duration of service agreement | 
| Performance Metrics | Trend analysis and proactive optimization | 18 months for historical comparison | 
Data Protection Measures
Protecting your information isn't just a legal requirement for us – it's fundamental to maintaining the trust our clients place in us. We've implemented multiple layers of security that reflect both international standards and Taiwan's Personal Data Protection Act requirements.
Security Infrastructure
Our data protection approach combines technical safeguards with operational procedures. All client data is encrypted both in transit and at rest using industry-standard encryption protocols. Access to your information is limited to authorized personnel who require it for service delivery, and all access is logged and monitored.
Physical Security
- Secure data centers with controlled access and environmental monitoring
 - Backup systems with geographic separation for disaster recovery
 - Regular security audits and vulnerability assessments
 - Incident response procedures for potential security events
 
Operational Security
- Role-based access controls ensuring minimum necessary permissions
 - Regular security training for all personnel handling client data
 - Secure disposal procedures for decommissioned equipment
 - Third-party vendor security assessments and contractual obligations
 
Your Rights and Choices
Under Taiwan's Personal Data Protection Act and international privacy standards, you have specific rights regarding your personal information. We've designed our processes to make exercising these rights straightforward and responsive.
Access and Review
You can request a copy of the personal information we hold about you. We'll provide this information in a readable format within 30 days of your request, along with details about how we've been using it.
Correction and Updates
If you notice inaccuracies in your personal information, you can request corrections. We'll update our records promptly and notify any third parties we've shared the information with when legally required.
Data Portability
When technically feasible, we can provide your data in a structured, commonly used format. This allows you to transfer your information to another service provider if you choose.
Deletion Requests
You can request deletion of your personal information, subject to our legitimate business needs and legal obligations. We'll explain any limitations and provide timelines for data removal.
Data Sharing and Third Parties
We limit data sharing to situations that directly support our service delivery or fulfill legal obligations. When we do share information, it's always with appropriate safeguards and clear limitations on use.
Service Providers
Some of our monitoring and optimization services rely on specialized third-party tools and platforms. These providers operate under strict contractual agreements that limit their use of your data to the specific services they provide to us. We regularly review these relationships to ensure they meet our privacy standards.
Legal Requirements
We may disclose information when required by law, such as in response to court orders or regulatory investigations. In such cases, we'll notify you unless legally prohibited from doing so, and we'll challenge overly broad requests when appropriate.
International Data Transfers
While our primary operations are based in Taiwan, some of our monitoring tools and backup systems may involve international data transfers. When this occurs, we ensure appropriate safeguards are in place through contractual protections and compliance with applicable data transfer frameworks.
Cross-Border Protections
Any international transfers include contractual clauses that require the receiving party to maintain equivalent privacy protections. We also conduct due diligence on the privacy laws and practices in destination countries to ensure adequate protection levels.
Data Retention and Deletion
We retain information only as long as necessary for service delivery, legal compliance, or legitimate business purposes. Our retention periods vary based on the type of information and how we use it.
Retention Schedule
- Active monitoring data: Retained during service period plus 12 months for trend analysis
 - Historical performance data: Up to 24 months for comparative analysis and reporting
 - Contract and billing information: 7 years as required by Taiwan business record laws
 - Communication records: 3 years for service continuity and dispute resolution
 - Security logs: 12 months unless involved in active security investigations
 
Secure Deletion Process
When retention periods expire or you request deletion, we use secure deletion methods that make recovery impractical. For encrypted data, we destroy encryption keys, making the data unreadable. Physical storage devices are wiped using industry-standard methods before disposal or reuse.
Changes to This Policy
Privacy practices evolve with technology and regulatory changes. When we update this policy, we'll notify existing clients via email at least 30 days before changes take effect. Significant changes that affect how we use your information will require your consent.
We maintain previous versions of our privacy policy for reference, and you can request copies of earlier versions if needed for your records or compliance purposes.
Children's Privacy
Our services are designed for business use and are not directed toward individuals under 18 years of age. We do not knowingly collect personal information from minors. If we become aware that we've collected information from someone under 18, we'll delete it promptly.
Privacy Questions and Requests
We respond to privacy inquiries within 15 business days and provide status updates for complex requests that require additional time to fulfill.