Privacy Policy
Your privacy matters to us. Here's how we protect and handle your personal information when you use our security and firewall management services.
Effective Date: January 15, 2025
Information We Collect
When you interact with DriveCloudSystem, we collect information that helps us provide better security solutions and support. This happens through various touchpoints in our service delivery.
Account Information
Your name, email address, company details, and contact preferences when you register for our services or request consultations.
Technical Data
System configurations, network topology information, and security audit results necessary for implementing firewall solutions.
Usage Analytics
How you interact with our platform, feature usage patterns, and performance metrics to improve our security tools.
How We Use Your Information
We use collected information primarily to deliver effective security solutions tailored to your business needs. Our approach focuses on practical implementation rather than data mining.
- Designing and implementing customized firewall configurations for your infrastructure
- Providing technical support and troubleshooting assistance for security issues
- Sending security alerts, system updates, and maintenance notifications
- Conducting security assessments and vulnerability analysis
- Improving our security tools based on real-world usage patterns
- Communicating about service changes, new features, and security best practices
We never sell your data to third parties or use it for advertising purposes.
Your technical information stays within our security team and authorized partners who directly support your implementation.
Data Sharing and Third Parties
Limited sharing occurs only when necessary to provide you with comprehensive security solutions. We work with trusted partners who meet our strict security standards.
We may share information with:
- Certified security vendors who provide specialized components for your firewall setup
- Cloud infrastructure providers where your security systems are deployed
- Compliance auditors when required by Taiwan regulatory authorities
- Legal authorities if compelled by valid legal process
All third-party arrangements include strict confidentiality agreements and data protection requirements that match or exceed our own standards.
Your Privacy Rights
Under Taiwan's Personal Data Protection Act and international privacy standards, you have significant control over your personal information.
Access Rights
Request copies of personal data we hold about you and understand how it's being used in your security setup.
Update Information
Correct inaccurate information or update your contact details and system configurations.
Data Deletion
Request removal of your data when no longer needed for active security services.
Processing Limits
Restrict how we process your information or object to certain uses while maintaining essential security functions.
To exercise these rights, contact our privacy team using the information below. We typically respond within 10 business days and will verify your identity to protect your information.
Data Security Measures
As a security company, we apply enterprise-grade protection to all personal data we handle. Our measures include both technical and administrative safeguards.
Technical Protections
End-to-end encryption for data transmission, encrypted storage systems, multi-factor authentication for all team access, regular security audits by independent firms, and isolated network segments for sensitive client data.
Our team receives ongoing privacy training, and we maintain strict access controls where staff can only view information necessary for their specific role in your project.
Data Retention
We keep your information only as long as needed to provide services or meet legal requirements. Different types of data have different retention periods based on their purpose.
- Active account information: Maintained while you're an active client
- System configuration data: Kept for 3 years after service termination for potential support needs
- Security logs: Retained for 1 year as required by Taiwan cybersecurity regulations
- Communication records: Stored for 2 years for service quality and dispute resolution
When retention periods expire, we securely delete data using industry-standard methods that make recovery impossible.
International Data Transfers
While our primary operations are based in Taiwan, some data may be processed by security vendors or cloud providers in other countries with strong data protection laws.
When international transfers occur, we ensure adequate protection through approved mechanisms like standard contractual clauses, adequacy decisions, or vendor certifications that meet Taiwan's data protection requirements.
Changes to This Policy
We update this privacy policy when our practices change or new regulations require modifications. Significant changes will be communicated directly to active clients via email at least 30 days before taking effect.
Minor updates that don't affect how we handle your data will be posted here with an updated effective date. We encourage reviewing this page periodically to stay informed about our privacy practices.