Union Networks

Monday – Friday, 9:00 AM – 6:00 PM

Information Stewardship Statement

This document explains how union-networks handles the information you entrust to us when engaging with our financial analysis platform designed for investment professionals operating in Taiwan's market.

Effective:January 15, 2026 Last Updated:January 15, 2026 Version:2.1

What Information Enters Our Systems

Information arrives through three distinct pathways. When you register for platform access, we obtain identity markers—your professional designation, organizational affiliation, contact coordinates, and authentication credentials. Throughout active sessions, behavioral traces accumulate: which analytical tools you activate, report generation patterns, interface interaction sequences, timestamp records. We also derive technical environment specifications automatically—device fingerprints, network routing data, browser configuration details, operating system parameters.

Categories of Details We Obtain

Professional Identity Elements

Full name, professional email address, job title, organization name, phone number, business address in Taiwan

Platform Engagement Patterns

Tool usage frequency, report generation timestamps, search query composition, feature activation sequences, session duration metrics

Technical Environment Data

IP address origin, browser type and version, device specifications, screen resolution, language preferences, referring URL paths

Communication Records

Support inquiry content, feedback submissions, correspondence history, meeting scheduling details, webinar attendance records

Some intake happens passively—your browser automatically transmits configuration details when establishing connections. Other elements require deliberate submission: form completions, uploaded documents, manually entered specifications. The platform doesn't distinguish between passive and active sources during processing, but understanding these pathways helps clarify how information flows into our environment.

Why We Need These Details

Every category of information serves specific operational purposes that enable platform functionality. Authentication credentials verify your identity each time you access protected analytical tools—without these elements, secure access becomes impossible. Usage patterns help us identify which features deliver genuine value to investment professionals versus those requiring refinement.

  • Delivering requested financial analysis tools and generating custom reports based on your specified parameters
  • Maintaining secure access to your account workspace and protecting proprietary analytical configurations
  • Responding to technical support requests and resolving platform functionality issues you encounter
  • Improving interface design based on observed interaction patterns and identifying confusing navigation sequences
  • Communicating platform updates, new feature releases, and critical system maintenance notifications
  • Meeting regulatory compliance obligations under Taiwan's financial services framework and data protection standards
  • Detecting unusual access patterns that might indicate unauthorized account compromise attempts
  • Processing billing transactions for premium analytical tool subscriptions and generating accurate invoices

We don't harvest information speculatively. Each data element connects to either immediate service delivery requirements or specific operational necessities that support platform reliability. When behavioral traces no longer serve active purposes—say, session logs older than regulatory retention mandates—deletion protocols activate automatically.

How Information Moves Beyond Our Organization

Several scenarios trigger outbound information transfer. Cloud infrastructure providers who host our analytical processing environment receive technical data necessary for server operations—though they operate under strict contractual prohibitions against examining content for their own purposes. Payment processors handle transaction credentials when you subscribe to premium features, but they never see your platform usage patterns or generated reports.

When legal authorities present valid data production demands accompanied by proper documentation, compliance obligations may require disclosure. Taiwan's financial regulatory framework imposes reporting requirements for specific transaction categories, which can necessitate sharing relevant records with designated government entities. We contest overbroad requests through available legal mechanisms, but ultimate compliance depends on judicial determinations beyond our control.

Professional service relationships occasionally require limited information sharing. Our technical infrastructure partner needs system performance metrics to optimize server configurations. The specialized security firm conducting quarterly penetration testing receives anonymized access logs to identify vulnerability patterns. Email delivery services process your contact coordinates solely for transmitting platform notifications you've explicitly requested.

Business structure changes could theoretically trigger broader transfers—if union-networks merged with another financial technology provider, subscriber information might transfer to the acquiring entity. Such scenarios would prompt advance notification explaining your options, though legal constraints might limit available choices. We've never experienced this situation and have no current plans suggesting it's imminent.

Your Control Mechanisms

Platform subscribers maintain several avenues for influencing how we handle their information. Account settings panels let you modify professional details, adjust communication preferences, and deactivate specific analytical tool access. Complete account closure remains available through a straightforward request process—though we must retain certain transaction records for Taiwan's mandatory financial documentation periods.

Actions You Can Initiate

Review Stored Details

Request comprehensive exports of all information we maintain about your account, delivered in machine-readable formats within 30 calendar days

Correct Inaccuracies

Identify and modify erroneous professional details through self-service interfaces or by submitting correction requests to our support team

Limit Processing Activities

Object to specific information uses not essential for core platform operations—we'll suspend those activities unless compelling operational requirements exist

Request Deletion

Initiate removal of your account and associated information, subject to mandatory retention obligations under financial services regulations

Withdraw Permissions

Revoke previously granted consents for optional processing activities like market research participation or beta feature testing programs

Data Portability

Obtain your platform-generated reports and configurations in formats compatible with alternative financial analysis systems

Exercising these controls doesn't guarantee identical platform experiences—restricting certain information uses might disable dependent features. Requesting complete deletion naturally terminates platform access since authentication becomes impossible without credential records. We explain these trade-offs clearly before processing requests that significantly impact functionality.

Security Approach and Remaining Exposure

Multiple defensive layers protect information residing within our infrastructure. Transport encryption secures data moving between your browser and our servers—intercepting these transmissions without cryptographic keys yields only unintelligible noise. Access controls restrict which team members can reach specific information categories based on legitimate operational needs. Automated monitoring systems flag anomalous access patterns that might indicate compromised credentials or insider threats.

Database encryption renders stored information unreadable without proper decryption keys, which we manage through dedicated hardware security modules. Regular security assessments conducted by independent specialists identify potential vulnerabilities before malicious actors can exploit them. Incident response protocols outline specific steps our team executes if breach indicators emerge—including how rapidly we'd notify affected subscribers.

Perfect security remains theoretically impossible regardless of deployed safeguards. Sufficiently sophisticated attackers with extensive resources might eventually penetrate defenses despite our best efforts. Zero-day vulnerabilities in third-party software components occasionally create temporary exposure windows before patches become available. Social engineering attacks targeting individual employees could potentially compromise access credentials. We work diligently to minimize these risks, but cannot eliminate them entirely.

Your own security practices significantly influence overall risk levels. Weak password selection, credential reuse across multiple services, failure to enable available multi-factor authentication—these choices create vulnerabilities we cannot compensate for through infrastructure hardening alone. Comprehensive protection requires collaboration between our technical controls and your security-conscious behaviors.

Retention Durations and Deletion Triggers

Different information categories follow distinct retention schedules based on operational necessity and regulatory mandates. Active account credentials persist throughout your subscription period plus brief grace periods allowing reactivation. Session logs and usage analytics typically remain accessible for eighteen months before automated purging—this window supports troubleshooting recent issues while limiting indefinite accumulation.

Financial transaction records face longer retention requirements imposed by Taiwan's accounting and tax documentation standards. Invoice details, payment processing logs, and subscription billing history remain archived for seven years minimum regardless of account status. Support correspondence stays available for three years to inform future inquiry responses and identify recurring technical problems requiring systemic fixes.

Account closure initiates cascading deletion sequences with staggered timelines. Your authentication credentials become immediately invalid, preventing further login attempts. Personal identifiers disappear from active databases within 90 days, though anonymized usage statistics might persist longer for legitimate analytical purposes. Backup systems gradually purge deleted information as routine media rotation cycles complete—typically requiring 12-18 months for comprehensive removal across all storage tiers.

Exceptional circumstances can interrupt standard deletion schedules. Ongoing legal disputes might freeze specific information pending case resolution. Active regulatory investigations could mandate extended retention until authorities confirm inquiry completion. We document these situations carefully and resume normal purging protocols immediately after special circumstances conclude.

Legal Foundations for Processing

Multiple legal bases authorize our information handling activities depending on specific contexts. Contractual necessity covers most core platform operations—we literally cannot deliver subscribed analytical services without processing authentication credentials, usage parameters, and generated report configurations. You've requested these services explicitly, and providing them requires working with the associated information.

Legitimate business interests justify certain processing activities not directly essential for immediate service delivery. Analyzing aggregated usage patterns to improve interface design, detecting fraudulent account creation attempts, maintaining backup systems for disaster recovery—these activities support long-term platform sustainability and security without requiring individual explicit consent for each specific action.

Regulatory compliance obligations mandate specific information handling practices regardless of subscriber preferences. Taiwan's Anti-Money Laundering Act requires financial service providers to maintain detailed transaction records and report suspicious patterns. Personal data protection frameworks impose security standards and breach notification duties. Tax documentation requirements dictate invoice retention schedules. These legal mandates override individual control mechanisms in specific defined contexts.

Explicit consent governs optional processing activities extending beyond core service requirements. Market research surveys, beta testing programs, case study participation—these voluntary initiatives proceed only after you've provided clear affirmative agreement, which remains revocable without impacting basic platform access.

Questions About Information Handling

Privacy concerns deserve direct, substantive responses rather than bureaucratic deflection. Our team addresses specific inquiries about how we handle your information, what control options exist, and how policies translate into actual operational practices.

Reaching us doesn't require navigating complex phone trees or submitting tickets into opaque queue systems. Multiple direct communication channels remain available, with responses typically arriving within two business days for straightforward questions and slightly longer for complex technical matters requiring internal consultation.

If our responses don't adequately address your concerns, Taiwan's regulatory framework provides escalation pathways. The National Development Council's Department of Cyber Security handles data protection complaints and can investigate processing practices that potentially violate applicable standards. We prefer resolving concerns directly through cooperative dialogue, but external oversight mechanisms exist when internal resolution proves insufficient.