EN
close
0
0 product
totalNT$ 0
Checkout
Member Login
Verify Code
Forget?
Register account

Website Terms of Use

1. External Links of Website

This Website provides hyperlinks (Links) to other websites. You can also click on these Links to visit the corresponding websites. However, the Privacy Policy of this Website do not apply to these websites. You must refer to the privacy protection policies of respective websites.

2. Use of Cookies

To provide you with the best service, this Website will place cookies on and use cookies in your browsers. If you do not wish to receive cookies, you can set your browser’s privacy level to high to block cookies. However, blocking cookies may affect the normal operations of some Website functions.

Privacy Policy

I. Scope of Application

1. This “Privacy Policy” (hereinafter referred to as the “Policy) applies to all websites, domains, and applications of the Company.
2. Policy contents:
(1) These contents include how the Company’s collection, processing, and use of the personal data provided by users when using the Website.
(2) The Policy applies to the Company’s partners (including, but not limited to, government agencies, business organizations, and others) or affiliates involving the collection, processing, and use of the personal data on commission by or through cooperation with the Company.
3. Except the aforementioned situations, the Policy does not apply to organizations outside of the Company, nor does it apply to personnel not employed or managed by the Company. The Policy does not apply to the following situations:
(1) When users visit the corresponding websites through the links to these websites provided on the Company’s website (hereinafter referred to as the “Site”) or applications (hereinafter referred to as the “Application”), the Site makes no representation or warranty for the protection of their privacy rights on these websites. Additionally, the Policy does not apply to these websites. Users should refer to the privacy protection policies of the respective websites.
(2) Advertisers advertising on the Site or Application may also collect the data of users. Each of these advertisers has its own privacy protection policy. The Policy does not apply to the data processing of these advertisers, and the Company will assume no responsibility for anything.


II. Data Collected by the Company

1. Personal data voluntarily provided by users
When visiting the Site and/or using the Site’s services (hereinafter referred to as the “Service”) or other services, users will be asked to provide their personal data, including, but not limited to, their names, phone numbers, emails, and contact information, as requested by different webpages according to the actual situations. 
2. Data recorded by the Site or Application
(1) When users browse the Site or Application, the Company may collect and retain the relevant records generated spontaneously by the sever. These records include the browsers used by users, the data they have browsed and selected (clicked), the duration of browsing, the IP of the networking equipment, and other data that can be used for analysis and personalizing Service. The Company will collect such information with cookies or other technology.
(2) Definitions and use of cookies
Use of cookies
1. Cookies are small blocks of data placed in the user’s hard drive via a browser for differentiating the user’s different preferences. They are created during user registration or login and modified after user logout.
2. Users can set the level of cookie acceptance from the browser. There are three options: “accept all cookies,” “alert for cookies” and “reject all cookies.”
By rejecting all cookies, users may be unable to use some personalized services or join some events.
3. The Company will write and read cookies in the user’s browsers under the Policy. Data collected from cookies will be consolidated and edited anonymously without directly linking to the user’s personal data.
Coolies are used to produce statistics on visitors and analyze browsing patterns to understand the status of webpage browsing for the reference of improving services and providing quality solutions of the Site or Application.
4. When users browse the Site, it will also use cookies via the third-party analysis tool, Google Analytics, to understand the methods of interaction (including the number of visits and stay) between users and the Site. We will understand the content and direction of event execution through such data.
5. Users can directly visit the privacy policy and security website of Google Analytics (https://support.google.com/analytics/answer/6004245?hl=zh-Hant) to understand its privacy policy and the methods to reject information disclosure to Google Analytics.

III. Personal Information Notification 

1. Regarding the purpose of collection and the time period, territory, recipients, and methods of use of the personal data, the Company also informs users of the purpose of collection and the time period, territory, recipients and methods of use of their personal data in various services over the Site, via the Application, or by customer service call.
2. Users are free to select the provision of their personal data (except for personal data requested by law). However, rejection of personal data provision may affect service application and integrity.

IV.  Rights of Data Subjects 

1. With respect to the Personal Data Protection Act, users may exercise the following rights over the Company:
(1) the right to inquire, review, and request for a copy of their personal data, provided, the Company may charge a service fee;
(2) the right to supplement, correct, and demand the cessation of the collection, processing, or use their personal data; and
(3)the right to erase restrict the processing and use of their personal data (suspension of the processing and use of their personal data before the clarification of the accuracy and dispute over such data).
2. However, the Company may reject such rights for performance of statutory duties or business needs.
Additionally, the exercise of the above rights may affect the relevant rights (e.g., if users request for cessation of marketing to the Company, they may not receive the relevant service and discount information) of users.
3. When a dispute remains unsettled, users may file a grievance to the judiciary and/or police.

V. Emails and commercial information

After obtaining users’ consent when they apply for membership or event participation, the Company will send to users the Company’s service-related emails or commercial data.
In such emails or commercial data, apart from indicating the Company is the sender, the Company will also provide instructions and methods for users to unsubscribe such emails or commercial data.

VI. Data Sharing Between the Company and Third Parties

1. The Company will provide users’ personal data to third parties such as government agencies and its partners under the following circumstances:
(1) Obtaining users’ consent before sharing their data with third parties.
(2) When it is necessary to share data with a third party to provide users with services, the Company will provide full description in the relevant events and notify users before collecting their personal data. Users are free to accept or reject the Company’s data sharing with third parties. In the absence of the user’s prior consent, no third party is allowed to use the users’ personal data provided by the Company for the purposes not stated in the service.
(3) Compliance with the law or requirements of government agencies: When the judiciary or police request for provision of the personal data of specific individuals for the reason of social and public safety, the Company will make necessary cooperation in consideration of the due process of the judiciary or police and the protection of user safety.
However, to protect the personal privacy of data subjects, the Company will not provide users with the data of other users. Users in need of retrieving the personal data of other users for legal matters must file an action to the police. The Company will make full cooperation with the police investigation and provide all the relevant data.

VII. Information Security

1. The Company adopts appropriate security measures to prevent unauthorized access, alteration, disclosure, or destruction of data. This will include the internal audit of the collection, storage, and processing practices of data and security measures, as well as the physical security measures, to prevent the unauthorized access to Company’s systems for storing personal data.
2. As there is no guarantee for absolute information security during data transmission over the Internet, despite the Company’s hard endeavors to protect the security of users’ personal data, the Company makes no representation or warranty for the absolute security of data that users send to or receive from the Site or Application when data transmission involves the security level of users’ networking environments. Hence, users still need to pay attention to and take the risk of data transmission over the Internet.

VIII. Self-Protection Measures

Users are advised to properly keep their network certificate, password, or any personal data and not to provide personal data, particularly the passwords, to any person or other organizations at will.
After users complete membership registration for Service, please make sure to log out from the Site after use. When sharing a computer with others, users are advised to close the browser after use to prevent others from reading their personal data.

IX. Amendment to Privacy Protection Statement

The Company reserves the right to amend the Policy from time to time. Users can inquire the latest version of the Policy on the Site at any time.
In the event of significant policy change, the Company will publish the change over the Site or notify users by email of the relevant matters.

X. Contact Information
Users having doubts about the Policy are welcome to leave their questions in the Site’s guestbook.

Disclaimers

1. Methods of collection, processing, and use of personal data
When you visit the Site or use the Service, the Company will ask you to provide necessary personal data based on the nature of Service and process and use your personal data for the said purposes. The Site will not use your personal data for other purposes without your written consent.
When you use interactive functions, such as email and questionnaire, the Site will retain the name, email, and contact information provided by you and the time of use.
When you browse the Site, the server will automatically record the relevant behavior, including the IP of your networking equipment, the time of use, the browsers you use, and the data you browse and select, for the reference of Service improvement. This information is for internal use only and will not be announced to the public.
To provide you with the precise service, we will perform statistical analysis of the collected responses to our questionnaires. In addition to use for internal research, we will announce the statistics or text description produced from the analysis results without involving the data of any specific individual.

2. Protection of Data 
All Site servers are equipped with various information security equipment, such as firewalls and antivirus systems, and necessary security protection measures. Stringent protective measures for protecting the Site and your personal data are also adopted to ensure only authorized personnel can access your personal data. All relevant data processing personnel are requested to sign the non-disclosure agreement and will be sanctioned by law for breaching the non-disclosure obligations.
When it is necessary to outsource services to other units due to business needs, the Site will also request them to strictly abide by the non-disclosure obligations and adopt necessary inspection procedures to ensure their compliance with the non-disclosure obligations.

(Cloud) Information Security and Privacy Statement

RapixEngine System (Cloud) Information Security and Privacy Statement
 
2024.11 First Edition
 
When you use the “RapixEngine System (Cloud)” (hereinafter referred to as “the System”) provided by Rapixus Co., Ltd. (hereinafter referred to as “the Company”), you entrust your valuable data to the Company for safekeeping. The Company greatly values the security and privacy of your data. Therefore, when you use this service, the Company complies with applicable laws and regulations (such as the Personal Data Protection Act) and uses your data in a lawful manner. In accordance with internal procedures and information security policies, the Company is committed to safeguarding the privacy and security of your data as its primary goal.
 
I. INFORMATION SECURITY POLICY:
 
This service provides you with real-time information security monitoring services to ensure the security of cloud networks. The Company will continuously monitor the System availability 5x8 hours to minimize the impact of system interruptions on you. In the unfortunate event of an information security incident (including but not limited to the System downtime, data breaches, or unauthorized access to accounts, etc.), the Company will make every effort to preserve relevant evidence and records and make them available for your review. 
 
(1) Definition of Customer Data:
 
The term “Customer Data” refers to the data you provide while using this service, excluding the “Account Information” required for the service. Account information is defined as the information you provide to the Company for account management purposes, such as account names, email addresses, etc. Account information is subject to the “Privacy Protection Statement” separately. To exercise your rights related to personal data, please refer to the “Exercise of Data Subject Rights” section in the “Privacy Protection Statement.”
 
(2) Roles and Responsibilities of Both Parties in Information Security and Privacy:
 
This service is developed, deployed, and maintained by the Company, utilizing infrastructure provided by internationally renowned cloud service providers. This includes virtualization environments, physical host equipment supporting virtualization, related network infrastructure, storage devices, user operation platforms, physical security of cloud data centers, etc.
 
The company is responsible for system development, deployment, and maintenance, as well as the information security requirements, and service monitoring/controlling of cloud service providers. Any significant changes to services or control measures will be announced through public channels; However, the information security of devices and systems deployed on the customer’s premises to collect information security data, as well as the terminal devices used to access the service (including but not limited to personal computers and handheld devices), are under the responsibility of the customer.
 
You are the controller and processor of your data. When the Company acts as the processor of your data, it will only process data based on your operations or instructions and will never process customer data without proper authorization. 
 
(3) Information Security Act:
 
1. The information security of the services provided by the Company complies with the standards of ISO 27001, ISO 27701, ISO 27017, and ISO 27018, and is regularly audited by an impartial third-party.
 
2. The development process of this service takes into consideration the possibility of information security issues and the specifications and countermeasures that may be required, and implement them in the management cycle of analysis, development, testing, deployment, and maintenance. Additionally, continuous monitoring is conducted to identify potential technical vulnerabilities in the components, service platforms, and infrastructure used, with ongoing efforts to address and strengthen them. 
 
3. The management of the infrastructure and user operation platforms is conducted in accordance with the Company’s Information Security Management System (ISMS), with regular backup and restoration drills performed regularly. 
 
4. The system components and data required by the Company to provide this service are regularly backed up, and appropriate backup environments are planned to ensure minimal service interruption (the actual service availability level is 97%, meaning service interruptions do not exceed 7 hours and 25 minutes per year, excluding service interruptions caused by officially announced planned maintenance) ; If you need to keep your data in a location or storage media outside of this service, you should use the download function to export your data. 
 
(1) The System reserves the right to modify the website’s terms and conditions of use at any time without prior notice. By using this website, you agree to be bound by the terms and conditions of use in their current version.
 
(2) The Company may suspend or terminate the operation of all or part of the Service due to changes in circumstances or business needs. Except for proportional refunds of unused fees collected for paid services (with remittance fees deducted), and unless users submit applications for special reasons, users may not raise objections or request any compensation. The Company will announce and notify users at least one month before the scheduled suspension or termination date and will refund service rental fees based on the proportion of unused days.
 
(3) The System reserves the right to interrupt or suspend the service under the following circumstances:
 
i. The user violates any government regulations or the terms of use of this service.
 
ii. When the System’s equipment needs necessary maintenance and repair.
 
iii. When unexpected failure occurs in the system equipment.
 
iv. When services cannot be provided due to force majeure factors such as natural disaster or other causes not attributable to the System.
 
(4) The Company shall not be liable for any damages caused by your use (or inability to use) the System.
 
(5) If there are any major changes to the System that may affect the operation of your system, the Company will notify you via email before the changes take effect.
 
5. In terms of access management, the administration backend of this service operates through highly secure channels, such as restricting connection sources for privileged administrators, identity authentication, and the segregation of system/development/maintenance/test environment and real environment.
 
6. All users of this service access the service with their own unique user ID to ensure that the risk of data misuse and infringement is minimized.
 
7. You can independently manage access permissions of the System.
 
8. The System performs daily backups and can restore data from the previous day.
 
9. You can use log records to inquire your operational activities on the System, such as login, logout, modifications, etc. Logs are retained for at least 6 months and are securely protected and preserved.
 
10. The Company enforces strict security controls measures to manage cloud service providers, to ensure the integrity, security, and confidentiality of your data.
 
11. The Company’s infrastructure adheres to the NTP calibration standards of internationally recognized time servers. However, due to potential Internet transmission delays, the displayed time may differ from the national standard time.
 
(4) Suppliers
 
By using the System, you agree to authorize the suppliers entrusted by the Company to process the system’s data and perform any actions based on your requirements. If you do not make any request, the suppliers will not make any changes to your data. If you disagree with this supplier, you may terminate the service.
 
The 24-hour cloud data center, user service operations, system operations, instructions, and related services are managed by suppliers under a contractual agreement with the Company, which includes information security requirements. If you have any issues related to the suppliers, please contact us.
 
(5) Data Protection Measures
 
1. We are obligated to keep your information confidential. Please properly safeguard your account, password, and any information. Do not provide any important information to anyone. When you are no longer using the System, please remember to log out of your account.
 
2. When using a public computer or someone else’s computer, please ensure that you close the browser or clear the cookie records to prevent others from accessing your information.
 
(6) Laws
 
1. The Company strictly abides by the laws and regulations of the Republic of China, including the Personal Data Protection Act. If the Company becomes aware that your instructions or operation methods (including the use of personal data) may violate any laws or regulations, the Company will notify you through appropriate means.
 
2. When using the System, you must comply with all relevant laws and regulations, including the Personal Data Protection Act and any administrative orders issued by the competent authorities applicable to you.
 
II. PRIVACY RIGHTS ACT
 
(1) Storage Location
 
All customer system data and customer information for this service are stored within the territory of the Republic of China and strictly abides with its laws. Without your consent, we will not move or replicate your data outside of the country. Any changes will be announced on the official website. If you disagree with the changes, you may terminate the service. 
 
(2) Encryption or Hashing Protection Mechanism
 
The data transmission generated from your access to the System over public networks is encrypted to protect the integrity and confidentiality of the data during transmission ; Additionally, the password that you use for the System is stored after being hashed, and the Company’s backend administrators have no way of knowing your password, reducing the risk of misuse or malicious infringement/access by internal or external parties.
 
(3) Deletion of Data on Physical Storage Devices
 
The cloud storage service provided by the Company ensures that in the event of a storage equipment of its infrastructure fails or replaced, the data on the equipment and temporary electronic information generated by the Company in collecting, processing, or using your personal data, will be securely erased or destroyed within 180 days to ensure that the data cannot be recovered by any means. 
 
(4) Information Security Incident Reporting
 
1. If you find any suspicious activity while using the System, please notify the Company using the contact information displayed on the website. The Company will follow procedures to understand and analyze the possible situation, and will do its best to reduce the impact on you. During this process, you may be asked to provide information and will notify you of the results. If the Company confirms that the suspicious activity mentioned previously exists and likely to affect other customers of the Company, the Company will notify them individually via announcement or email.
 
2. According to the aforementioned information security policy, the Company will do its best to protect your data. However, if the Company finds any suspicious activities related to your data (such as loss, leakage, or tampering), and the issue is attributable to the Company, we will notify you within one hour upon becoming aware of the incident, as required by the agreement. This notification timeline excludes situations caused by uncontrollable natural disasters.
 
(5) Violation of Intellectual Property Rights
 
1. The Company is committed to assisting users and organizations in protecting their intellectual property rights. The Company also strictly prohibits anyone from illegally downloading or installing content that violates the intellectual property of others (including but not limited to audio-visual materials, software, information, images, websites, etc.) including copyrights and trademarks.
 
2. If you discover any violations of intellectual property rights or other illegal activities, you may use the "Contact Us" feature on the Company’s official website to report the issue. The Company will make every effort to assist you in handling the relevant matters. 
 
(6) Termination of Service
 
When you no longer wish to use the System, you should apply to the Company to terminate the service. The Company will no longer retain any of your information, or, upon your request, will return or transfer the data to you, while keeping execution records of the execution.

(Cloud) Privacy Policy

RapixEngine System (Cloud) Privacy Policy
 
2024.11 First Edition
 
Rapixus Co., Ltd. (hereinafter referred to as “the Company”) places great emphasis on your privacy rights. Therefore, this privacy policy has been established to protect the information obtained when you use the Company’s website, system, services, or engage in business cooperation with the Company. The following describes how the Company collects, processes, utilizes, and, in certain situations, discloses, shares, or transfers your personal and non-personal information.
 
By using this system/service, you agree and understand when using the Company’s website, system, services and/or have a business relationship with the Company for any reason, it shall be deemed that you have not refused and have agreed to accept the Company’s privacy policy, and agree to authorize the Company to collect, process, and use your personal information in accordance with this privacy policy.
 
If the entity using the Company’s website, system, service and/or establishing a business relationship with the Company for any reason is a legal entity, the personal and non-personal information of natural persons involved in the process of use (including but not limited to employees' activity records and computer usage logs) shall be deemed to have been agreed by the rights holder. The obligation to inform the rights holders shall be fulfilled by the legal entity who uses the Company's website, system, services, and/or engages in business relationship with the Company for any reason. 
 
I. NOTICE OF COLLECTION, PROCESSING, AND UTILIZATION OF PERSONAL INFORMATION
In accordance with Article 8 of the Personal Data Protection Act, the Company hereby informs you of the following:
 
1. Specific Purposes for Collecting Personal Data:
The specific purposes for which the Company collects personal information included: opening your account, identifying information (communication) equipment, identifying users of information (communication) equipment, and providing you with information (communication) equipment based on your needs.
Other specific purposes that comply with the “Specific Purposes and Categories of Personal Data under the Personal Data Protection Act” issued by the Ministry of Justice are as follows:
 
  1. 135 “Information and Communication Services”
 
  2. 136 “Information (Communication) and Database Management”
 
  3. 137 “Information and Communication Security and Management” 
 
2. Categories of Personal Data Collected:
The categories of personal data collected by  the Company are explained below in accordance with the “Specific Purposes and Categories of Personal Data under the Personal Data Protection Act” issued by the Ministry of Justice. However, the categories of personal data collected by the Company may not be limited to those listed below (e.g., geographic location, real-time positioning data) and shall be subject to the actual personal data collected through the various business activities or services exchanged between you and the Company.
 
   1. Identification type C001 (e.g., name, telephone number, email address, organization, personal account, IP address, etc.)
 
   2. Unclassified data C132 (e.g., computer information, etc.)
 
3. The Duration, Region, Parties, and Methods of Personal Data Processing and Utilization:
 
    1. Duration: The duration of use of the system/service or the period specified by relevant laws, regulations, or contractual agreements .
 
     2. Region: Within the territory of the Republic of China and the countries or regions where the parties in Item 3 are located.
 
3. Parties: The Company, the Company’s affiliated companies, and vendors with whom the Company has a cooperative relationship, such as providers of information security-related products and cloud services.
 
4. Methods: In writing (physical paper or electronic format), by phone, SMS, email, fax, other appropriate methods according to current technology, or any method that complies with relevant laws and regulations or contractual agreements.
 
II. RIGHTS AND HOW TO EXERCISE THEM:
 
Under Article 3 of the Personal Data Protection Act, you have the right to exercise the following rights regarding your personal data:
 
1. You have the right to request, in writing or via email, to inquire, review, or obtain a copy of the personal data collected by the Company that is relevant to you.
 
2. You may request the Company to supplement, cease the collection, processing, or utilization of your personal data, or collect or delete inaccurate data. 
 
3. If you wish to exercise any of the above rights, please contact our staff through our customer service hotline (04-22025688) or email (service@rapixus.com). The Company will provide the relevant application forms, verify your identity, and, upon receipt of your completed application forms, will promptly process your request.
 
4. For requests to inquire about, review, or obtain a copy of personal data, the Company will notify you of its decision in writing or via email address you used to submit your request within 15 days of receiving your request. If necessary, this 15-day period may be extended by an additional 15 days, and the Company will inform you of this extension decision using the same method.
 
5. For requests to supplement or correct, cease the collection, processing, using or deleting data, the Company will notify you of its decision in writing or via the email address used to submit your request within 30 days of receiving your written or email request. If necessary, this 30-days period may be extended by an additional 30 days, and the Company will inform you of this extension decision using the same method.
 
6. If you request to inquire or review your personal data, please visit the location specified in the Company’s notification within the designated period stated in the notification. When you request to inquire about or review your personal data or obtain a copy, the Company may charge necessary fees. 
 
III. You may also choose not to provide the aforementioned personal data; however, you fully understand that failure to provide it may affect the timeliness of the Company's provision of various businesses or services, as well as the ability to provide various business or services.
 
IV. NON-PERSONAL INFORMATION THE COMPANY NEEDS TO COLLECT, PROCESS, AND USE
When you use this system/service, the Company collects your “non-personal information” to track your usage and activity within the system/service. Non-personal information refers to data that cannot, on its own, identify or directly associate with a specific individual. This includes, but is not limited to, information collected through or via this system/service
The Company’s privacy policy does not restrict the use or disclosure of any non-personal information. The Company may decide at its sole discretion to use or disclose non-personal information. For instance, non-personal information may be used to enhance the understanding of your operational or access behaviours related to information systems. 
You fully understand that in the process of providing services, the Company will inevitably receive non-personally identifiable information, including but not limited to computer MAC information, network communication ports, hardware information, etc. You agree and authorize the Company to collect and use the above non-personally identifiable information, or to link it with identifiable personal data for combined collection and use. This information may also be processed or utilized by the Company within the country or region where it operates.
 
V. PROTECTING YOUR PERSONAL INFORMATION
The Company will implement reasonable and appropriate mechanisms to prevent unauthorized or unlawful access, use, processing, or modification of the personal information you provide and safeguard against the infringement or loss of personal information. The Company may use third-party services to implement the reasonable and appropriate mechanisms mentioned above.
While the Company takes reasonable steps to ensure security and continuously improve its measures, you understand and agree that no system or technology in the world is absolutely flawless or secure. If you discover any vulnerabilities in the Company’s website/application, please send an email to service@rapixus.com, or use the Company’s website/application to report the identified vulnerabilities.
 
VI. CHANGES TO THE COMPANY’S PRIVACY POLICY
The Company reserves the right to modify any terms of this privacy policy at any time. In the event of changes or updates to this privacy policy, the Company will indicate the effective date of the updated version to inform you of the changes made. The Company encourages you to review this privacy policy periodically to stay informed about how your personal information is being utilized.