The policies and standards that implemented PT Kustodian Sentral Efek Indonesia (KSEI) has established to uphold the confidentiality, integrity, and security of personal data belonging to K-CASH users are outlined below.
The Users information is classified into the following three categories:
Data Derived from users Input
K-CASH Registration
User are permitted to utilize the K-CASH in accordance with the terms and conditions they have adhered to.
Technical Information
KSEI will collect technical data from the device utilized by the users whenever they employ K-CASH. This data may consist of location information, among other things. The provided information is effective in facilitating analysis and advancing the development of K-CASH.
User's Activity
Information regarding documented activities while utilizing the K-CASH, including visited pages, utilized features, page retention rate, and other relevant metrics, will be collected by KSEI for the purposes of statistical analysis, troubleshooting, and K-CASH development.
K-CASH will disclose Securities Sub-Account and Investment Fund Unit Account that are linked to User’s single investor identification number (SID) as well as investment products provided by parties in collaboration with KSEI.
KSEI will use User’s personal information to manage User’s account, execute transactions according to the User’s instructions, connect User’s account with User’s portfolio data, answer User questions, and to develop and disseminate information on Investment Products and KSEI services. KSEI may perform demographical and statistical analyses on the activities of K-CASH users with the intention of enhancing the K-CASH user experience.
The policy pertaining to the utilization of user email information is as follows:
KSEI places great importance on the confidence that users place in it when they disclose personal information. Consequently, KSEI, therefore, KSEI makes every effort to safeguard its data security. Utilizing encryption as one method, but not exclusively, KSEI has established a robust security system to safeguard user information against unauthorized access, and dissemination, in addition to preventing accidental loss. However, KSEI cannot provide an absolute guarantee that its systems are impervious to intrusions, viruses, malwares, unauthorized access, or other security threats.
In accordance with statutory regulations, KSEI reserves the right to comply with legitimate requests from law enforcement officials or competent state authorities for the disclosure of user personal and transaction data in furtherance of pertinent law enforcement processes and in response to law enforcement requirements, or for the purposes.
KSEI may delete and/or destroy user’s personal information from K-CASH system, except in cases where:
The user’s personal information still within the retention period based on the laws and regulations.
Users are required to submit a written request to securities companies or selling agent where user registered and KSEI Helpdesk regarding request for deletion and/or destruction of personal information
KSEI retains the prerogative to modify or update this Privacy Policy without prior notification at any time, any such modifications or updates will be prominently display on this page. The user is recommended periodically reviewing this page for updates to the Privacy Policy.
Through the use of K-CASH, users grant their consent to the Terms and Conditions and Privacy Policy of KSEI.
The K-CASH Security System is a policy and practice implemented by PT Kustodian Sentral Efek Indonesia ("KSEI") to demonstrate KSEI's commitment to maintaining and protecting privacy and security while users utilize K-CASH.
KSEI employs a three-layer security system to protect K-CASH users' access and transactions:
Security tips for using K-CASH include:
Phising involves deceptive methods by certain parties to obtain someone's confidential information, such as User ID, Password, and PIN. Phishing methods include:
Security Tips:
b. Virus or Worm
A virus is a program created for specific purposes, usually damaging operating systems, applications, and data on infected media. Viruses can spread through various media, including email, disks, CDs, USB drives, flash memory, internet programs, networks, and malicious web pages.
Examples of virus impacts:
A worm is similar to a virus but designed to spread quickly. While worms generally do not cause as much damage as viruses, they can carry various payloads, including harmful ones.
Security Tips:
Security Tips:
Use the latest antivirus software on your phone.
d. Bot (robot)
Security Tips: