privacy policy

Bestmate attaches great importance to the privacy of its members and complies with the provisions of the "Personal Data Protection Act", so it has formulated a privacy protection policy. You can refer to the following privacy protection policy.


1. Security of personal data

Protecting members' personal privacy is an important business philosophy of " Bestmate ". We will never provide members' personal information to any third party unrelated to the services of this shopping website without the member's consent. Members should keep their Internet passwords and personal information properly confidential and do not provide any personal information, especially Internet passwords, to anyone. After using the various service functions provided by the " Bestmate " website, be sure to log out of your account. If you share your computer with others or use a public computer, remember to close the browser window.  

2. Collection, processing and use of personal information

The personal information obtained from the related websites of " Bestmate " will only be used internally by " Bestmate " in accordance with the purpose and scope of use originally stated. Unless stated in advance or in accordance with relevant legal provisions, "Bestmate" will Bestmate will not provide information to third parties or use it for other purposes.

  • Purpose of collection:
The purpose of collection is for marketing business, consumer, customer management and services, online shopping and other e-commerce services and surveys, statistics and research analysis. " Bestmate " will collect personal information through the process of joining the membership or conducting transactions.

  • Categories of personal information collected:
The personal information collected by " Bestmate " on the website includes: (1) C001 Personal identification: Such as member’s name, address, phone number, email and other information. (2) C002 identifies financial persons: such as credit card or financial institution account information. (3) C011 Personal description: For example: gender, date of birth, etc.

  • Usage period, region, objects and methods

(1) Period: Until the date when the member requests to stop using or " Bestmate " stops providing services.

(2) Region: Members’ personal information will be used in Taiwan.

(3) Usage objects and methods: In addition to the member management and customer management search and query functions of " Bestmate ", members' personal information collection will also be used for identity identification, cash flow services, logistics services, and marketing. Guangxuan et al. Examples are as follows:

a. When using various services provided by " Bestmate " as a member, member information will be automatically displayed on the page.

b. To carry out transactions: When members make reservations for goods or services, place bids, purchase, participate in prize giving or other activities, or engage in other transactions, the members will be responsible for the delivery of goods, provision of services, payment of prices, responses to customer inquiries, and " hand control " of goods or services. Bestmate 's inquiries to members, related after-sales services and other necessary business for conducting transactions.

 

c. Advertising or marketing, etc.: Provide members with various electronic magazines and other information, and provide service-related information through email, mail, phone, etc. Personalize the content or advertisements viewed by members based on the customer's personal attributes or purchase records, the browsing history of the " Bestmate " website, etc., conduct analysis of members' use of services, and develop new services or existing services improvement, etc. Contact members regarding opinions on polls, activities, message boards, etc., or other service-related matters.

d. Respond to customer inquiries: Respond to inquiries raised by members to " Bestmate " via email, mail, fax, telephone or any other direct or indirect contact method .

e. Other matters incidental to the business: Use necessary to provide services to " Bestmate " incidental to the purposes of use a to d. above .

f. Information provision for each service provider: When a member makes a reservation, bids, purchases, participates in prize giving activities or applies for other transactions with the service provider's goods or services, " Bestmate " is required for the transaction . Within the scope, the member's personal data files may be provided to the service provider, and the service provider shall be responsible for managing the personal data files. " Bestmate " will impose regulations on service providers to handle personal information in accordance with the principle of protecting members' privacy, but there is no guarantee that service providers will comply. For details, please contact the respective service provider.

g. Others: When providing individual services, personal data may also be used for purposes other than those specified above. At this time, the gist will be stated on the web page of the individual service.

 

  • Members’ rights regarding personal data:

The parties to the personal data collected by " Bestmate " may exercise the following rights against " Bestmate " in accordance with the Personal Data Protection Act :

(1) Inquiry or request for reading.

(2) Request a copy.

(3) Request for supplement or correction.

(4) Request to stop collection, processing or use.

(5) Request deletion.

If members want to exercise the above rights, they can contact " Bestmate " customer service to apply.

o   Please pay attention! If you refuse to provide the necessary information to join the membership, you may not be able to enjoy the full service or be unable to use the service at all.  

3. Data security  

In order to protect the privacy and security of members, " Bestmate " member account information will be password protected. " Bestmate " strives to use reasonable technology and procedures to protect the security of all personal information.  

 

 

4. How to inquire or correct personal information When members have needs to inquire and read their personal information, make copies, supplement or correct it, stop computer processing and use, delete it, etc., they can contact the customer service center and " Bestmate " will handle it quickly.  

 

 

5.Cookies In order to facilitate members' use, the " Bestmate " website will use cookie technology to provide the services members need; cookie is a technology used by the website server to communicate with the member's browser. It may be stored on the member's computer. Strings are randomly stored in the cookie to identify users. If members turn off cookies , they may be unable to successfully log in to the website or use the shopping cart.  

 

 

 

6. Revision of privacy protection policy As the market environment changes, the company will revise the website policy from time to time. If members have any questions about the privacy statement of the " Bestmate " website or related matters related to personal data, they can use the customer service hotline: 02-25991079 .

 

 

 

" Bestmate " computer processing personal data file security maintenance plan

1. In order to ensure the security of personal data files held by this enterprise, designated personnel are designated by law to handle maintenance matters in accordance with the following personal data file security maintenance plan.

2. Security maintenance plan for personal data files:  

1. Data security

( 1 ) If personal data files are built on a database, the scope of use and permissions for use, "user code" and "identification password" should be determined. The identification password should be kept confidential and must not be shared with others. 

( 2 ) If personal data files are stored on a personal computer's hard drive, the data holding unit should set a power-on password, screen saver password and related security measures on the personal computer.

( 3 ) Personal data files may not be used without permission.

( 4 ) Personal data files should be exited immediately after use and shall not be left on the computer display screen.

( 5 ) The identification password used by an individual should be kept confidential and the password must be changed after a fixed period of time to prevent others from stealing it and using it for a long time.

( 6 ) If a customer inquires about his or her personal information over the phone, the customer must be authenticated before replying to the relevant information to protect the customer's rights.

( 7 ) When collecting, processing, internationally transmitting and using personal information through the Internet, necessary preventive and protective measures should be taken to detect and prevent computer viruses and other malicious software to ensure the normal operation of the system.

( 8 ) When processing transactions over the Internet, possible security risks should be assessed and appropriate security control measures should be developed.        

2. Data auditing

( 1 ) When using computers to process personal data, you should check whether the input, output, editing or correction of personal data is consistent with the original file.

( 2 ) When personal data is provided for use, it should be checked whether it is consistent with the file information. If there is any doubt, the original file should be accessed for verification.

( 3 ) A regular audit system should be established and audit data should be kept.  

3. Equipment management

( 1 ) For computer equipment used to store personal data, the data holder should maintain it regularly.

( 2 ) Computer equipment shall not be moved unless necessary.

( 3 ) Personal computers used to build personal data shall not be used directly as front-end tools for public inquiries.

( 4 ) Establish a remote backup system.

( 5 ) Definitely delete the personal data stored in the discarded or resold relevant computer hardware.

 4. Other safety maintenance matters

( 1 ) Personnel who use computers to process personal data files should hand over the storage media and related data they keep in a register when their duties change. The person taking over should set a new password to facilitate management.

( 2 ) After an employee resigns, all passwords that have been touched by the departing employee must be canceled and appropriately adjusted.

( 3 ) Comply with relevant regulations on general computer security maintenance. 

Liquid error (layout/theme line 355): Could not find asset snippets/quantity-breaks-now.liquid