Privacy Policy
Last Updated: March 15, 2025
Introduction and Overview
At TurboEliteAscent, we understand that your privacy matters. This comprehensive policy
explains how we collect, use, and protect your personal information when you interact
with our backup and disaster recovery services. We're committed to transparency about
our data practices because building trust starts with being honest about what we do
with your information.
Our privacy practices comply with Taiwan's Personal Data Protection Act and
international standards. We believe in giving you control over your data while ensuring
we can provide the reliable backup and disaster recovery services you need for your
business operations.
Information We Collect
Personal Information You Provide
- Contact details including name, email address, phone number, and business address
- Company information such as business name, industry type, and organizational size
- Technical contact information for system administrators and IT personnel
- Payment and billing information processed through secure third-party providers
- Communications you send to us including support requests and feedback
Technical Information We Collect
System Data
We collect information about your IT infrastructure to provide effective backup
services. This includes server configurations, storage capacity, network topology,
and existing backup systems. We only collect what's necessary to design and
implement your disaster recovery solution.
Usage Analytics
Our systems track backup performance, recovery times, and service usage patterns.
This data helps us maintain service quality and identify potential issues before
they affect your operations. All analytics are aggregated and used to improve our
service delivery.
Automatically Collected Information
When you visit our website or use our services, we automatically collect certain
technical information including IP addresses, browser types, device information, and
access logs. This information helps us maintain security, troubleshoot issues, and
understand how our services are being used.
How We Use Your Information
Primary Service Purposes
Your information is primarily used to deliver backup and disaster recovery services.
This includes system monitoring, backup scheduling, data recovery operations, and
technical support. We also use your information to communicate about service updates,
maintenance windows, and security alerts that may affect your systems.
Service Delivery and Support
We use your contact and technical information to configure backup systems, monitor
service performance, and provide technical support when needed. Our team may access
system logs and performance data to troubleshoot issues or optimize your backup
configurations.
Business Operations
Your information helps us manage our business relationship, including billing, contract
administration, and account management. We also use aggregated data to improve our
services and develop new features that better serve our clients' needs.
Security and Compliance
We analyze usage patterns and system logs to detect potential security threats, prevent
unauthorized access, and maintain compliance with industry standards. This includes
monitoring for unusual activity that might indicate a security incident.
Information Sharing and Disclosure
Third-Party Service Providers
We work with carefully selected partners to deliver our services effectively. These
include cloud infrastructure providers, payment processors, and specialized technology
vendors. All third parties are bound by strict confidentiality agreements and can only
use your information for the specific services they provide to us.
- Cloud storage providers for secure data backup storage
- Payment processors for billing and subscription management
- Technical support tools for customer service delivery
- Security monitoring services for threat detection
- Communication platforms for service notifications
Legal Requirements
We may disclose information when required by law, court order, or government
regulation. In Taiwan, this includes compliance with data protection authorities and
law enforcement requests made through proper legal channels. We will notify you of such
requests when legally permitted to do so.
Business Transfers
If TurboEliteAscent is involved in a merger, acquisition, or sale of assets, your
information may be transferred as part of that transaction. We will provide notice and
ensure the receiving party maintains the same privacy protections outlined in this
policy.
Data Security and Protection
Encryption
Access Controls
Regular Audits
Secure Infrastructure
Technical Security Measures
We implement multiple layers of security to protect your information. All data is
encrypted both in transit and at rest using industry-standard encryption protocols. Our
systems are protected by firewalls, intrusion detection systems, and regular security
monitoring.
Access Controls and Authentication
Access to your information is strictly limited to authorized personnel who need it to
perform their job functions. We use multi-factor authentication, regular access
reviews, and role-based permissions to ensure only appropriate individuals can access
your data.
Physical Security
Our data centers and offices maintain strict physical security controls including 24/7
monitoring, biometric access controls, and environmental protections. All equipment is
secured in locked facilities with restricted access and comprehensive surveillance
systems.
Incident Response
We maintain a comprehensive incident response plan that includes immediate containment
procedures, forensic analysis capabilities, and customer notification protocols. In the
unlikely event of a security incident affecting your data, we will notify you promptly
and take all necessary steps to minimize any impact.
Your Privacy Rights
Rights Under Taiwan's Personal Data Protection Act
Right to Access: You can request copies of personal information we
hold about you, including details about how we process it.
Right to Rectification: You can ask us to correct inaccurate or
incomplete personal information.
Right to Deletion: You can request deletion of your personal
information when it's no longer necessary for our services.
Right to Restrict Processing: You can ask us to limit how we use
your information in certain circumstances.
Right to Data Portability: You can request your data in a
structured, machine-readable format.
Right to Object: You can object to certain types of processing,
particularly for marketing purposes.
How to Exercise Your Rights
To exercise any of these rights, contact us using the information provided in this
policy. We will respond to your request within 30 days and may need to verify your
identity before processing certain requests. There is no charge for most requests,
though we may charge a reasonable fee for excessive or repetitive requests.
Limitations on Rights
Some rights may be limited when exercising them would compromise security, interfere
with legal obligations, or affect the rights of others. For example, we may not be able
to delete information that is required for ongoing backup services or legal compliance.
Data Retention and Deletion
Retention Periods
Standard Retention Schedule
We retain personal information only as long as necessary to provide services and
comply with legal requirements. Account information is typically retained for the
duration of our business relationship plus seven years for financial and legal
compliance. Technical logs are usually retained for two years unless needed for
ongoing security investigations.
Secure Deletion Procedures
When information reaches the end of its retention period, we use secure deletion
procedures that make the data unrecoverable. This includes overwriting storage media,
degaussing magnetic media, and physical destruction when necessary. We maintain
certificates of destruction for sensitive data disposal.
Backup Data Considerations
As a backup service provider, we understand the unique challenges of data retention.
Backup copies may be retained longer than primary data for disaster recovery purposes.
We work with clients to establish appropriate retention schedules that balance business
needs with privacy requirements.
International Data Transfers
Cross-Border Data Processing
Some of our service providers and backup storage locations may be outside Taiwan. When
we transfer data internationally, we ensure appropriate safeguards are in place,
including contractual protections, adequacy decisions, or certification schemes that
provide equivalent protection to Taiwan's standards.
Safeguards for International Transfers
- Standard contractual clauses approved by Taiwan authorities
- Binding corporate rules for transfers within multinational organizations
- Adequacy determinations for countries with equivalent protection
- Specific consent for transfers when other safeguards aren't available
- Certification under recognized international privacy frameworks
Updates to This Privacy Policy
We review and update this privacy policy regularly to reflect changes in our practices,
technology, and legal requirements. When we make significant changes, we will notify
you through email or prominent notices on our website at least 30 days before the
changes take effect.
Minor updates, such as clarifications or contact information changes, may be made
without advance notice. We encourage you to review this policy periodically to stay
informed about how we protect your information.
Continued use of our services after policy changes indicates your acceptance of the
updated terms. If you disagree with changes, you may terminate your services and
request deletion of your information, subject to our legitimate business and legal
obligations.
Contact Information for Privacy Inquiries
If you have questions about this privacy policy or want to exercise your privacy
rights, please contact us using the information below. We're here to help and will
respond to your inquiries promptly.
TurboEliteAscent Privacy Team
No. 186號, Fuguo 1st Road, Yongkang District
Tainan City, Taiwan 710
Phone: +88689350735
Email: contact@turboeliteascent.org
For urgent privacy matters or data breach notifications, please call our main number
and ask for the privacy team. We maintain 24/7 availability for critical privacy and
security issues.