Privacy Policy

Last Updated: March 15, 2025

At Synapse Awareness, we understand that your trust is earned through transparency. This privacy policy explains how we collect, use, and protect your information when you interact with our monitoring and performance optimization services.

Information We Collect

When you engage with our services, we collect several types of information to provide effective IT monitoring and performance optimization solutions. This collection happens through various touchpoints during our business relationship.

Personal Information

  • Contact details including name, email address, and phone number
  • Company information such as business name, industry, and organizational structure
  • Technical contact information for system administrators and IT personnel
  • Professional titles and roles within your organization
  • Communication preferences and service requirements

Technical Data

  • System performance metrics and monitoring data from your IT infrastructure
  • Network configuration details necessary for optimization services
  • Server logs, application performance data, and diagnostic information
  • Security event logs and incident response data when relevant
  • Usage patterns and system behavior analytics for performance improvement

How We Use Your Information

Your information serves specific purposes related to delivering and improving our monitoring and optimization services. We believe in using data purposefully rather than collecting it indiscriminately.

Data Type Primary Use Retention Period
Contact Information Service delivery and client communication Duration of service + 2 years
Technical Monitoring Data Performance optimization and issue resolution 12 months for active analysis
System Configuration Customized monitoring and alerts setup Duration of service agreement
Performance Metrics Trend analysis and proactive optimization 18 months for historical comparison

Data Protection Measures

Protecting your information isn't just a legal requirement for us – it's fundamental to maintaining the trust our clients place in us. We've implemented multiple layers of security that reflect both international standards and Taiwan's Personal Data Protection Act requirements.

Security Infrastructure

Our data protection approach combines technical safeguards with operational procedures. All client data is encrypted both in transit and at rest using industry-standard encryption protocols. Access to your information is limited to authorized personnel who require it for service delivery, and all access is logged and monitored.

Physical Security

  • Secure data centers with controlled access and environmental monitoring
  • Backup systems with geographic separation for disaster recovery
  • Regular security audits and vulnerability assessments
  • Incident response procedures for potential security events

Operational Security

  • Role-based access controls ensuring minimum necessary permissions
  • Regular security training for all personnel handling client data
  • Secure disposal procedures for decommissioned equipment
  • Third-party vendor security assessments and contractual obligations

Your Rights and Choices

Under Taiwan's Personal Data Protection Act and international privacy standards, you have specific rights regarding your personal information. We've designed our processes to make exercising these rights straightforward and responsive.

Access and Review

You can request a copy of the personal information we hold about you. We'll provide this information in a readable format within 30 days of your request, along with details about how we've been using it.

Correction and Updates

If you notice inaccuracies in your personal information, you can request corrections. We'll update our records promptly and notify any third parties we've shared the information with when legally required.

Data Portability

When technically feasible, we can provide your data in a structured, commonly used format. This allows you to transfer your information to another service provider if you choose.

Deletion Requests

You can request deletion of your personal information, subject to our legitimate business needs and legal obligations. We'll explain any limitations and provide timelines for data removal.

Data Sharing and Third Parties

We limit data sharing to situations that directly support our service delivery or fulfill legal obligations. When we do share information, it's always with appropriate safeguards and clear limitations on use.

Service Providers

Some of our monitoring and optimization services rely on specialized third-party tools and platforms. These providers operate under strict contractual agreements that limit their use of your data to the specific services they provide to us. We regularly review these relationships to ensure they meet our privacy standards.

Legal Requirements

We may disclose information when required by law, such as in response to court orders or regulatory investigations. In such cases, we'll notify you unless legally prohibited from doing so, and we'll challenge overly broad requests when appropriate.

International Data Transfers

While our primary operations are based in Taiwan, some of our monitoring tools and backup systems may involve international data transfers. When this occurs, we ensure appropriate safeguards are in place through contractual protections and compliance with applicable data transfer frameworks.

Cross-Border Protections

Any international transfers include contractual clauses that require the receiving party to maintain equivalent privacy protections. We also conduct due diligence on the privacy laws and practices in destination countries to ensure adequate protection levels.

Data Retention and Deletion

We retain information only as long as necessary for service delivery, legal compliance, or legitimate business purposes. Our retention periods vary based on the type of information and how we use it.

Retention Schedule

  • Active monitoring data: Retained during service period plus 12 months for trend analysis
  • Historical performance data: Up to 24 months for comparative analysis and reporting
  • Contract and billing information: 7 years as required by Taiwan business record laws
  • Communication records: 3 years for service continuity and dispute resolution
  • Security logs: 12 months unless involved in active security investigations

Secure Deletion Process

When retention periods expire or you request deletion, we use secure deletion methods that make recovery impractical. For encrypted data, we destroy encryption keys, making the data unreadable. Physical storage devices are wiped using industry-standard methods before disposal or reuse.

Changes to This Policy

Privacy practices evolve with technology and regulatory changes. When we update this policy, we'll notify existing clients via email at least 30 days before changes take effect. Significant changes that affect how we use your information will require your consent.

We maintain previous versions of our privacy policy for reference, and you can request copies of earlier versions if needed for your records or compliance purposes.

Children's Privacy

Our services are designed for business use and are not directed toward individuals under 18 years of age. We do not knowingly collect personal information from minors. If we become aware that we've collected information from someone under 18, we'll delete it promptly.

Privacy Questions and Requests

Privacy Officer Synapse Awareness Address: 106, Taiwan, Taipei City, Da'an District, Shida Rd, 60號2樓 Phone: +88633026611 Email: info@synapse-awareness.com

We respond to privacy inquiries within 15 business days and provide status updates for complex requests that require additional time to fulfill.