Privacy Policy

Effective Date: July 27, 2025

Computeman, Inc. (“Computeman,” “we,” “us,” or “our”) provides Virtual Private Servers (VPS), Dedicated Servers, and GPU Servers. We are committed to protecting your privacy and the security of your data. This Privacy Policy explains how we collect, use, disclose, and safeguard your personal information when you use our services or interact with us.

Scope

This policy applies to information we collect:

  • Through our website (computeman.com) and client portal.
  • When you order, manage, or use our VPS, Dedicated Server, or GPU Server services.
  • In email, text, ticket, chat, and other electronic communications.
  • From third parties (e.g., payment processors, fraud detection services).
    It does not apply to data you store or process on your Computeman server (“Server Data”). You, as the server administrator/customer, are responsible for the privacy and security of Server Data.

Information We Collect

a. Account & Ordering Information:

  • Name, email address, billing address, phone number.
  • Company name (if applicable).
  • Username, password, security questions/answers.
  • Payment information (credit card details processed by our secure third-party payment gateways; we typically only store payment token IDs and last 4 digits).
  • Service configuration choices (OS, control panel, hardware specs).

b. Service Usage & Infrastructure Data:

  • Server resource usage (CPU, RAM, disk I/O, bandwidth, GPU utilization – for monitoring, billing, and support).
  • IP addresses assigned to your server(s) and your connection IP addresses.
  • System logs related to server provisioning, maintenance, security events, and network operations (excluding the content of your Server Data).
  • Support ticket history, chat logs, and call recordings (where applicable).
  • Authentication logs for client portal access.

c. Website & Client Portal Usage:

  • IP address, browser type, operating system, referring URLs.
  • Pages visited, time spent, links clicked (via cookies and similar technologies – see our separate Cookie Policy).

d. Information from Third Parties:

  • Payment verification and fraud prevention data from payment processors.
  • Credit history information (with consent, for certain payment methods).
  • Publicly available information for fraud prevention or security purposes.

How We Use Your Information

  • To Provide Services: Provision, maintain, secure, and support your servers; process orders and payments; communicate service updates.
  • Billing & Account Management: Generate invoices, process payments, manage your account, enforce terms.
  • Customer Support: Respond to inquiries, troubleshoot issues, provide technical assistance.
  • Security & Abuse Prevention: Detect, prevent, and respond to security incidents, fraud, abuse, and violations of our Terms of Service (TOS) or Acceptable Use Policy (AUP).
  • Network & System Operations: Monitor performance, maintain infrastructure, plan capacity, diagnose problems.
  • Communication: Send service-related announcements (essential), security alerts, billing reminders, and (with consent) marketing/promotional information. You can opt-out of non-essential marketing.
  • Improvement: Analyze aggregated usage data to improve our website, services, and customer experience.
  • Legal Compliance: Comply with applicable laws, regulations, legal processes, or enforceable governmental requests.

How We Share Your Information

We do not sell your personal information. We may share it only in the following ways:

  • Service Providers: With trusted third parties who perform services on our behalf under strict confidentiality agreements (e.g., payment processors, data centers, bandwidth providers, email delivery services, security monitoring, customer support platforms). They are only permitted to use the data to perform these services.
  • Legal Obligations & Protection: If required by law, subpoena, court order, or if we believe in good faith that disclosure is necessary to: comply with the law; protect our rights, property, or safety, or that of our users or the public; investigate fraud or abuse; enforce our TOS/AUP.
  • Business Transfers: In connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business by another company. You will be notified via email and/or a prominent notice on our website of any change in ownership or uses of your information.
  • Consent: With your explicit consent for a specific purpose not covered here.

Your Server Data

  • Your Control: You retain full ownership and responsibility for all data stored or processed on your VPS, Dedicated Server, or GPU Server (“Server Data”). This includes customer data, application data, databases, files, etc.
  • Our Access: Computeman personnel generally do not access your Server Data. Exceptions include:
    • With your explicit permission for specific support requests.
    • If required to investigate suspected violations of our TOS/AUP or illegal activity (following defined internal procedures).
    • If necessary to maintain the security or stability of our infrastructure or other customers’ services.
    • If compelled by law enforcement with valid legal process.
  • Security: We implement robust physical, network, and administrative security measures to protect the infrastructure hosting your Server Data. You are responsible for securing your server (OS, applications, firewalls, access controls).

Data Security

We implement industry-standard technical and organizational security measures designed to protect your personal information from unauthorized access, disclosure, alteration, or destruction. These include (but are not limited to):

  • Encryption in transit (TLS/SSL) and at rest (for sensitive data).
  • Secure data centers with physical access controls.
  • Network security (firewalls, intrusion detection/prevention).
  • Regular security assessments and vulnerability management.
  • Access controls and principle of least privilege for staff.
  • Employee security training.
  • Important Note: No method of transmission over the Internet or electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your information, we cannot guarantee its absolute security. You are responsible for safeguarding your account credentials.

International Data Transfers

Your information may be transferred to, stored, and processed in countries other than your own, including the United States, where our data centers or service providers are located. These countries may have data protection laws different from your jurisdiction. We rely on appropriate safeguards for such transfers, such as Standard Contractual Clauses approved by the European Commission or equivalent mechanisms, and require our providers to adhere to similar protections.

Data Retention

We retain your personal information only for as long as necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required or permitted by law (e.g., for tax, legal, accounting, or security purposes). Retention periods vary based on the type of data:

  • Active Account Data: Retained while your account is active and for a reasonable period afterward for business continuity and legal compliance.
  • Billing Records: Typically retained for 7+ years for tax and audit purposes.
  • Server Logs & Infrastructure Data: Retained for a limited period necessary for security, troubleshooting, and performance monitoring (e.g., 30-180 days, depending on the log type).
  • Support Tickets: Retained to improve service and handle follow-up issues.
    We securely delete or anonymize data when it is no longer needed.

Your Privacy Rights (Depending on Jurisdiction – e.g., GDPR, CCPA):

Depending on your location, you may have rights regarding your personal information, such as:

  • Access: Request a copy of the personal data we hold about you.
  • Correction: Request correction of inaccurate or incomplete data.
  • Deletion: Request deletion of your personal data (subject to legal limitations).
  • Restriction/Objection: Request restriction of processing or object to certain processing activities.
  • Data Portability: Request a portable copy of your data in a structured format.
  • Opt-out of Marketing: Opt-out of receiving promotional communications.
  • Non-Discrimination: Not be discriminated against for exercising your rights (CCPA).
    To exercise these rights, please submit a verifiable request via a support ticket in your Client Area or email privacy@computeman.com. We will respond within the timeframe required by applicable law and may need to verify your identity. We do not discriminate against users who exercise their privacy rights.

Children’s Privacy

Our services are not directed to individuals under the age of 16 (or other age as required by local law). We do not knowingly collect personal information from children. If we become aware that a child has provided us with personal information, we will take steps to delete such information.

Changes to This Policy

We may update this Privacy Policy from time to time. We will notify you of significant changes by posting the new policy on our website with an updated effective date and/or by sending you an email notification (if applicable). We encourage you to review this policy periodically.

Contact Us

If you have any questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us:

  • Primary Method: Submit a support ticket via the Computeman Client Area (Billing/Privacy category).
  • Email: privacy@computeman.com
  • Mail: Computeman, Inc. – Privacy Officer
    [Your Company Address Here]

Key Points

  1. Server Data Distinction: Clear separation between customer account data (covered) and data on customer servers (not covered, customer responsibility).
  2. Infrastructure Focus: Collection of resource usage, IPs, and system logs relevant to VPS/Dedicated/GPU hosting.
  3. Limited Server Access: Explicitly states when and why Computeman might access Server Data (rarely, with strict reasons).
  4. Hosting-Centric Security: Highlights measures protecting the infrastructure hosting your server.
  5. Third-Party Dependencies: Acknowledges reliance on data centers, payment processors, bandwidth providers.
  6. Practical Retention: Tailored retention periods for logs, billing data, and accounts relevant to a hosting provider.
  7. Compliance Ready: Incorporates mechanisms for GDPR/CCPA rights and international transfers.