privacy-policy

Data Sovereignty & Privacy Framework

Yuan-Jhen Information Co., Ltd. (hereinafter "the Company") operates with a commitment to transparency and infrastructure integrity. This policy outlines our technical and legal protocols regarding data lifecycle management.

01. Protocol Scope

This policy governs all personally identifiable information (PII) processed via our infrastructure. It aligns with Taiwan’s Personal Data Protection Act (PDPA) and international security benchmarks, ensuring that your data remains under professional stewardship while utilizing our APAC gateway services.

02. Technical Data Acquisition

Infrastructure Logs Automatic recording of IP addresses, browser headers, and session latency to optimize server routing across our APAC network.
Service Provisioning Collection of verified contact data essential for Domain registration and Business Email authentication.
Analytical Insights Aggregated usage data to improve UI/UX, processed locally within our secure Taiwan data centers.
Interaction Compliance Archiving of support tickets and communication for quality assurance and technical troubleshooting.

03. Infrastructure-Level Mitigation

Security is not an add-on; it is our foundation. Our defense architecture includes:

  • L3-L7 Defense: Implementation of PentaSecurity WAF for real-time traffic filtering and threat mitigation.
  • Access Control: Zero-trust internal policies requiring NDAs for all technical personnel with physical or logical access to hardware.
  • Audit Trails: Comprehensive logging of administrative actions to prevent unauthorized data manipulation.

04. Data Sovereignty & Rights

Users maintain full autonomy over their information. You may at any time exercise your rights to access, rectify, or request the erasure of your data via our secure client portal. We do not engage in the commercial sale or unauthorized exchange of client data with third-party entities.

05. Resource Management (Cookies)

We utilize functional cookies to maintain session persistence and enhance security protocols. Advanced users may manage cookie permissions through browser-level settings, though certain enterprise dashboard features may be restricted without active sessions.