Privacy Policy
The cryptographic and administrative protocols governing the collection, processing, and protection of your data payloads.
TL;DR: The Core Parameters
- No Data Brokering (Do Not Sell): We do not sell your personal information. Our revenue stream relies strictly on providing transparent compute capabilities.
- Telemetry Limits & AI: We log connection metrics (IPs, bandwidth usage) solely for automated DDoS mitigation, which may utilize AI-assisted threat models for endpoint security.
- GDPR & 30-Day Windows: You may request access, modification, or the complete purging of your data. Deletion requests are processed strictly within a codified 30-day window.
- Encryption & Backups: External billing payloads are encrypted in transit (TLS 1.3) and at rest (AES-256). System-level arrays undergo a strict 24-hour backup discipline.
1. Information Collection Architecture
We collect and process personal data directly connected to the provisioning and maintenance of our hosting infrastructure. This includes standard identifiers (name, email, physical address for fraud mitigation) and payment processing tokens via our PCI-compliant payment gateway. We do not store raw credit card numbers on our servers.
For detailed information about cookies and tracking technologies used on our platform, please review our Cookie Policy.
2. "Do Not Sell My Personal Information" Declaration
We explicitly declare that GOZEN HOST LLC does not, and will not, sell your personal information, infrastructure logs, or identifying metadata to broker networks, advertising conglomerates, or third-party marketing entities. Our revenue stream is derived strictly from compute capabilities, not data exploitation or unauthorized aggregation.
3. AI-Assisted Network Threat Monitoring
To ensure the global reliability of our ASN, infrastructure logs (IP addresses, ingress bandwidth, error routing) may be processed by AI-assisted monitoring tools. These predictive models are deployed purely for internal site security, rapid DDoS mitigation, and anomaly detection. These monitoring deployments never inspect or parse the underlying file contents housed on your hosted volumes.
4. GDPR & Data Portability Windows
In compliance with universal 2026 mandates spanning GDPR and the EU Data Act, we codify the following absolute rights regarding your structured data profiles:
- Right of Access & Portability: You maintain continuous API or dashboard access to export a complete JSON ledger of your profile metadata and interaction history.
- Right to Rectification: You may correct inaccurate primary identifiers immediately via the billing portal.
- 30-Day "Right to be Forgotten" Limit: Authorized requests to permanently purge an account hierarchy will be securely executed, cascaded across backup arrays, and mathematically confirmed within a strict 30-day enforcement window. Note that legally required taxation ledgers may persist for 7 years on vaulted servers.
5. Encryption & Backup Discipline
Communications across our frontend API and client dashboards are encrypted via Transport Layer Security (TLS 1.3). Databases housing your personal data use Advanced Encryption Standard (AES-256) block ciphers at rest. Our core management infrastructure executes an automated daily backup cycle via Backuply, storing data on separate physical servers in distinct geographic zones.
Automated Snapshots: If you subscribe to the optional Automated Snapshot add-on, snapshot data is stored on encrypted volumes in the same datacenter region as your primary instance. Snapshots are retained according to your selected schedule (daily, weekly, or monthly) and are permanently deleted within 48 hours of add-on cancellation or account termination. Snapshot data is not shared with third parties.
6. Sub-Processor Network & Transit Providers
To distribute your traffic globally, we route data through Tier-1 transit providers including NTT, GTT, and Cogent. These carriers transport network packets between our datacenters and the public internet. Transit providers process IP addresses and packet headers as part of standard network routing but do not have access to application-level data or hosted content.
We also integrate with datacenter facility operators and edge security providers. All sub-processors are contractually bound by Data Processing Agreements (DPAs) that enforce data protection standards equivalent to our own.
7. Legal & Authorized Disclosures
We disclose data to law enforcement only when required by valid, legally binding subpoenas from a competent jurisdiction. Our default posture is to notify the affected user before data handoff, unless prohibited by the requesting legal authority.
Related Legal Documents
Privacy Operations Team
To exercise your data portability rights or request account deletion inside the 30-day enforcement window, initiate an authenticated session ticket or contact our legal team directly.