Logo

Security Policy

Last updated on June 1, 2024

The security measures and policies of the website (or related organization) have been recognized for their importance in safeguarding the security of the website. These measures aim to prevent user data from being destroyed or accessed by unauthorized or unauthorized individuals. Therefore, security measures have been implemented using advanced data security standards such as Secure Socket Layer (SSL) technology, which encrypts data transmitted over the Internet network with 128-bit encryption to ensure that intercepted data cannot be used. Encryption is key to securing data. Users can identify this through protocols with "https://" in the name.

Additional Technologies Used for Security Besides the general security measures mentioned above, the (organization/website) also employs the following advanced technologies to protect your personal data:
– Firewall: Software systems that only allow authorized personnel or approved entities (organizations/websites) to access data pass through the firewall.
– Virus Scans: In addition to all computers providing services being equipped with highly effective virus protection software and regularly updated, (organization/website) also installs virus scanning software on servers.
– Cookies: Small computer files necessary for temporarily storing essential information on the user's computer for convenient and rapid communication. However, (organization/website) is conscientious about user privacy and avoids using cookies. If necessary, the company will carefully consider security and privacy of the service recipient.
– Auto Log Off: After using (organization/website) services, always log off. In case the user forgets to log off, the system will automatically log off within a suitable time frame for the user's security.

Recommendations for Ensuring Security
Despite having high-level technology standards and security measures to prevent unauthorized access to your personal or confidential data as mentioned above, it is known that there is currently no security system that can fully protect your data from destruction or unauthorized access. Therefore, you should follow these security recommendations:
– Exercise caution when downloading software from the Internet for use. Verify the website address before logging into the service to prevent website spoofing.
– Install virus detection systems on your computer and regularly update virus detection software.
– Install Personal Firewall software to protect your computer from attacks by malicious individuals such as crackers or hackers.