Privacy Policy

Privacy policy
Rental - Purchase And Sale Policy

Privacy Policy Of
J&J Property Real Estate

Purpose:

This security policy aims to safeguard the personal information and real estate data of customers, employees, and partners, ensuring compliance with relevant data security regulations.

Scope:

This policy applies to all personal information and data related to real estate collected, processed, and stored by the real estate company.

Types of Information:

  1. Network and System Security:
    • Use data encryption.
    • Manage information access through an access management system.
    • Regularly update and test security systems.
  2. Access Rights Management:
    • Identify and manage employee and third-party access rights.
    • Monitor and log access activities.

Information Collection Procedures:

  1. Network and System Security:
    • Use data encryption.
    • Manage information access through an access management system.
    • Regularly update and test security systems.
  2. Access Rights Management:
    • Identify and manage employee and third-party access rights.
    • Monitor and log access activities.
  3. Physical Security:
    • Manage access to offices and server rooms.
    • Physically protect devices storing information.

Training and Education:

  • Provide regular training for employees on security policies and measures to protect information.
  • Promote security awareness across all departments.

Reporting and Monitoring:

  • Establish a monitoring system to track security activities.
  • Immediately report any violations and implement corrective measures.

Violation Handling:

  • Establish a rapid and effective process for handling security breaches.

Legal Compliance:

  • Commit to complying with regulations related to personal information security and real estate data.

Regular Evaluation:

  • Periodically assess the effectiveness of the policy and make adjustments as necessary.

Third-Party Engagement:

  • Identify third parties with access to information and establish relevant security measures.

This security policy must be regularly reviewed and updated to ensure effectiveness and compliance with changes in legal requirements and the business environment.

Privacy Policy Of
J&J Property Real Estate

Purpose:

This security policy aims to safeguard the personal information and real estate data of customers, employees, and partners, ensuring compliance with relevant data security regulations.

Scope:

This policy applies to all personal information and data related to real estate collected, processed, and stored by the real estate company.

Types of Information:

  1. Network and System Security:
    • Use data encryption.
    • Manage information access through an access management system.
    • Regularly update and test security systems.
  2. Access Rights Management:
    • Identify and manage employee and third-party access rights.
    • Monitor and log access activities.

Information Collection Procedures:

  1. Network and System Security:
    • Use data encryption.
    • Manage information access through an access management system.
    • Regularly update and test security systems.
  2. Access Rights Management:
    • Identify and manage employee and third-party access rights.
    • Monitor and log access activities.
  3. Physical Security:
    • Manage access to offices and server rooms.
    • Physically protect devices storing information.

Training and Education:

  • Provide regular training for employees on security policies and measures to protect information.
  • Promote security awareness across all departments.

Reporting and Monitoring:

  • Establish a monitoring system to track security activities.
  • Immediately report any violations and implement corrective measures.

Violation Handling:

  • Establish a rapid and effective process for handling security breaches.

Legal Compliance:

  • Commit to complying with regulations related to personal information security and real estate data.

Regular Evaluation:

  • Periodically assess the effectiveness of the policy and make adjustments as necessary.

Third-Party Engagement:

  • Identify third parties with access to information and establish relevant security measures.

This security policy must be regularly reviewed and updated to ensure effectiveness and compliance with changes in legal requirements and the business environment.