Legal πŸ”’ PRIVACY-2026-V1 Last Updated: 2026-01-15

Privacy Policy

As a VPS infrastructure provider, we operate under a minimal data collection principle. This policy clearly defines the boundaries of our data handling practices, and ourzero-access commitment to your disk data and network traffic.

πŸ”¬
Minimal Collection
Only limited data required for operations is collected
πŸ”’
Zero Disk Access
We cannot access your operating system
🫢
No Data Selling
We never sell your information to commercial third parties
πŸ”₯
Secure Destruction on Expiry
Deep disk wipe within 24h after lease termination
ℹ️

Last Revised: January 15, 2026 Β· Version: PRIVACY-2026-V1
This policy applies to all users of the KVMNODE platform. We take data sovereignty with the utmost seriousness. This document clearly defines the minimal data processing boundaries for maintaining normal data center operations, as well as ourzero-access, zero-analysis commitment to user-stored data. By using the service, you have read and accepted all terms of this policy.

πŸ—„οΈ
01

Minimal Data Collection Principle

πŸ”¬ Minimum Necessity Principle 🚫 No Over-Collection

We follow the principle of minimum necessity β€” collecting only the information strictly required to provide the service, and explicitly refusing any data collection beyond operational scope. The specific scope of what we collect includes and is limited to:

  • πŸ“§Account credentials:The email address you provide during registration, and a one-way bcrypt-hashed digest of your password (we cannot recover your original password and have no need for it).
  • πŸ’³Payment transaction summary:Payments are processed by licensed institutions such as Stripe. We retain only the order number, transaction status, and amount summary β€”we do not hold full card numbers, CVV codes, or bank account information.
  • πŸ“‘Infrastructure health telemetry:Device power state, total network bandwidth throughput, and public IP allocation records β€” entirely outside the OS layer, used solely to uphold SLA commitments, with no relation to your application data.
  • πŸ›‘οΈSecurity protection logs:Source IP addresses and timestamps recorded by the WAF firewall, retained for no longer than 90 days for DDoS mitigation and malicious scan prevention β€” not used for user behavior profiling or commercial analytics.

βœ… We explicitly commit tonot collecting application runtime data, screen content, keyboard input, or any device usage behavior from within your instance.

βš™οΈ
02

Data Used for Operational Purposes Only

We strictly limit the above data to the following automated operational scenarios. No data is used for commercial marketing analytics, user profiling, or any third-party monetization:

  • πŸš€Completing fully automated VPS instance allocation, system initialization, and secure SSH credential delivery β€” enabling the instant "order-to-use" experience.
  • 🧾Executing periodic billing charges (daily/weekly/monthly/quarterly), generating electronic invoices, and sending renewal reminder notifications.
  • 🎧When you request technical support through the ticket system, the engineering team uses account information to verify ownership, enabling faster diagnosis and resolution of underlying network or power issues.
  • πŸ”Identifying and filtering malicious network traffic from compromised nodes to protect the network quality of all users on the shared backbone switch environment.

🚫 We do not transmit user data to any advertising platform or data analytics provider. The console does not embed any third-party tracking scripts or behavioral data collection SDKs.

πŸ›‘οΈ
03 Zero-Touch Policy

Core Commitment: Isolation and Zero Access

The KVM full virtualization architecture of KVMNODE ensures absolute isolation of user data by design β€” this is the fundamental distinction between our service and shared hosting solutions:

  • πŸ’»
    No pre-installed monitoring agents:Our system images contain no background monitoring programs or agents. After your instance is delivered, you are the sole party with root access. The KVMNODE team cannot log in to your operating system.
  • πŸ‘οΈ
    Traffic is an absolute black box:We only count total bandwidth at the core switch level. Any form of deep packet inspection (DPI) is strictly prohibited. All of your communication content is completely invisible to us.
  • πŸ”₯
    Data permanently destroyed after lease termination:After a subscription ends or an account is terminated, the system automatically triggers a deep disk wipe after the 24-hour grace period. All data traces from the previous tenant are physically unrecoverable.
Secure Disk Wipe Protocol
> INIT_SECURE_WIPE --target [INSTANCE_DISK] --passes 3 > EXECUTING: Cryptographic Erase + DoD 5220.22-M Wipe... > SUCCESS: Data unrecoverable. Hardware returned to clean pool.

This process is executed automatically without human intervention after the 24-hour grace period following subscription expiry or lease termination. All prior data is permanently converted into undecryptable random blocks, unrecoverable by any means.

πŸ“€
04

Strictly Limited Data Sharing

🀝 We solemnly commit:We will never sell, rent, or exchange any of your personal information to any commercial third party.

We share minimal data only under the following three strictly limited circumstances:

  • πŸ’³Licensed payment processors:Only an order identifier is passed to compliant payment institutions such as Stripe to execute the charge. Payment processors cannot access your instance usage content or any device information.
  • πŸ”§On-site data center engineers:When performing special hardware operations, on-site engineers are given only a rack location number β€” no customer account or identity information is involved.
  • βš–οΈLegally mandated disclosure:Upon receiving a legally valid judicial assistance request, we disclose only the minimum information required by law and notify the user at the earliest opportunity permitted by law.

🚫 We do not connect to any ad networks, do not use third-party Analytics SDKs, and do not embed any external tracking scripts in the console.

πŸ”’
05

Technical Security Measures

πŸ” TLS 1.3 πŸ—οΈ bcrypt Encryption πŸ“· 24H Surveillance

We treat the account management system as a core asset at the same level as the physical data center, with continuous investment in the following technical security layers:

  • πŸ”All data transmission between the console and API endpoints is enforced with TLS 1.3 encryption. All downgrade connection attempts are rejected.
  • πŸ—οΈUser passwords are stored using bcrypt + high-entropy random salt scheme for irreversible hash storage. Even in the event of a database breach, attackers cannot recover plaintext passwords.
  • πŸ–₯️The core billing database and account systems are deployed within aprivate VPC isolated subnet. Direct public internet access is prohibited. Access is controlled by strict RBAC policies, and all operations produce full audit logs.
  • πŸ“·The data center facility is equipped with 24-hour video surveillance and biometric access control. Unauthorized personnel cannot access any cabinet area housing customer equipment.
  • πŸ”Regularthird-party security audits are conducted on infrastructure systems, with a responsible vulnerability disclosure mechanism in place to ensure security issues are prioritized and addressed within 48 hours.
🎯
06

Your Control Over Your Data

We believe data sovereignty belongs to the user. The following rights can be exercised at any time, free of charge:

  • πŸ“₯Access and export:In the console Billing & Finance module, you can self-service query and export all billing, order, and configuration history at any time β€” no customer service contact required.
  • ✏️Modify and correct:Update your contact email and account information at any time in Account Settings. Changes take effect immediately.
  • πŸ”•Unsubscribe:Disable auto-renewal at any time from the console. Daily billing orders are one-time charges with no automatic deductions.
  • πŸ‘‹Account deletion and right to be forgotten:To permanently delete your account, submit a request via ticket and release all instances. We will then permanently and irrecoverably delete your account data from all production systems within 30 days. Deletion is irreversible β€” please back up any data you need before confirming.

βœ… KVMNODE does not restrict you from exercising any of these rights, and no fee is charged. If you encounter a technical issue, please contact the support team via ticket.

πŸ”„
07

Policy Updates and Contact

This policy will be continuously updated as the business evolves and regulations change.Material changes (involving changes to data sharing scope or user rights) will be notified to you via your registered email address 14 days in advance. Non-material wording or formatting adjustments will be published and take effect directly.

Continued use of the service constitutes acceptance of the most recent version of this policy. If you disagree with the updated policy, please discontinue use of the service before it takes effect and submit an account deletion request.

If you have any questions about this policy or wish to exercise any of the rights described above, please contact us through the following channels:

🎟️
Submit a ticket via the console β†’ Category:Account & Compliance
⏱️
Business days response time:within 48 hoursprocessing