Last Revised: January 15, 2026 Β· Version: PRIVACY-2026-V1
This policy applies to all users of the KVMNODE platform. We take data sovereignty with the utmost seriousness. This document clearly defines the minimal data processing boundaries for maintaining normal data center operations, as well as ourzero-access, zero-analysis commitment to user-stored data. By using the service, you have read and accepted all terms of this policy.
Minimal Data Collection Principle
We follow the principle of minimum necessity β collecting only the information strictly required to provide the service, and explicitly refusing any data collection beyond operational scope. The specific scope of what we collect includes and is limited to:
- π§Account credentials:The email address you provide during registration, and a one-way bcrypt-hashed digest of your password (we cannot recover your original password and have no need for it).
- π³Payment transaction summary:Payments are processed by licensed institutions such as Stripe. We retain only the order number, transaction status, and amount summary βwe do not hold full card numbers, CVV codes, or bank account information.
- π‘Infrastructure health telemetry:Device power state, total network bandwidth throughput, and public IP allocation records β entirely outside the OS layer, used solely to uphold SLA commitments, with no relation to your application data.
- π‘οΈSecurity protection logs:Source IP addresses and timestamps recorded by the WAF firewall, retained for no longer than 90 days for DDoS mitigation and malicious scan prevention β not used for user behavior profiling or commercial analytics.
β We explicitly commit tonot collecting application runtime data, screen content, keyboard input, or any device usage behavior from within your instance.
Data Used for Operational Purposes Only
We strictly limit the above data to the following automated operational scenarios. No data is used for commercial marketing analytics, user profiling, or any third-party monetization:
- πCompleting fully automated VPS instance allocation, system initialization, and secure SSH credential delivery β enabling the instant "order-to-use" experience.
- π§ΎExecuting periodic billing charges (daily/weekly/monthly/quarterly), generating electronic invoices, and sending renewal reminder notifications.
- π§When you request technical support through the ticket system, the engineering team uses account information to verify ownership, enabling faster diagnosis and resolution of underlying network or power issues.
- πIdentifying and filtering malicious network traffic from compromised nodes to protect the network quality of all users on the shared backbone switch environment.
π« We do not transmit user data to any advertising platform or data analytics provider. The console does not embed any third-party tracking scripts or behavioral data collection SDKs.
Core Commitment: Isolation and Zero Access
The KVM full virtualization architecture of KVMNODE ensures absolute isolation of user data by design β this is the fundamental distinction between our service and shared hosting solutions:
-
π»
No pre-installed monitoring agents:Our system images contain no background monitoring programs or agents. After your instance is delivered, you are the sole party with root access. The KVMNODE team cannot log in to your operating system.
-
ποΈ
Traffic is an absolute black box:We only count total bandwidth at the core switch level. Any form of deep packet inspection (DPI) is strictly prohibited. All of your communication content is completely invisible to us.
-
π₯
Data permanently destroyed after lease termination:After a subscription ends or an account is terminated, the system automatically triggers a deep disk wipe after the 24-hour grace period. All data traces from the previous tenant are physically unrecoverable.
> INIT_SECURE_WIPE --target [INSTANCE_DISK] --passes 3
> EXECUTING: Cryptographic Erase + DoD 5220.22-M Wipe...
> SUCCESS: Data unrecoverable. Hardware returned to clean pool.
This process is executed automatically without human intervention after the 24-hour grace period following subscription expiry or lease termination. All prior data is permanently converted into undecryptable random blocks, unrecoverable by any means.
Strictly Limited Data Sharing
We share minimal data only under the following three strictly limited circumstances:
- π³Licensed payment processors:Only an order identifier is passed to compliant payment institutions such as Stripe to execute the charge. Payment processors cannot access your instance usage content or any device information.
- π§On-site data center engineers:When performing special hardware operations, on-site engineers are given only a rack location number β no customer account or identity information is involved.
- βοΈLegally mandated disclosure:Upon receiving a legally valid judicial assistance request, we disclose only the minimum information required by law and notify the user at the earliest opportunity permitted by law.
π« We do not connect to any ad networks, do not use third-party Analytics SDKs, and do not embed any external tracking scripts in the console.
Technical Security Measures
We treat the account management system as a core asset at the same level as the physical data center, with continuous investment in the following technical security layers:
- πAll data transmission between the console and API endpoints is enforced with TLS 1.3 encryption. All downgrade connection attempts are rejected.
- ποΈUser passwords are stored using bcrypt + high-entropy random salt scheme for irreversible hash storage. Even in the event of a database breach, attackers cannot recover plaintext passwords.
- π₯οΈThe core billing database and account systems are deployed within aprivate VPC isolated subnet. Direct public internet access is prohibited. Access is controlled by strict RBAC policies, and all operations produce full audit logs.
- π·The data center facility is equipped with 24-hour video surveillance and biometric access control. Unauthorized personnel cannot access any cabinet area housing customer equipment.
- πRegularthird-party security audits are conducted on infrastructure systems, with a responsible vulnerability disclosure mechanism in place to ensure security issues are prioritized and addressed within 48 hours.
Your Control Over Your Data
We believe data sovereignty belongs to the user. The following rights can be exercised at any time, free of charge:
- π₯Access and export:In the console Billing & Finance module, you can self-service query and export all billing, order, and configuration history at any time β no customer service contact required.
- βοΈModify and correct:Update your contact email and account information at any time in Account Settings. Changes take effect immediately.
- πUnsubscribe:Disable auto-renewal at any time from the console. Daily billing orders are one-time charges with no automatic deductions.
- πAccount deletion and right to be forgotten:To permanently delete your account, submit a request via ticket and release all instances. We will then permanently and irrecoverably delete your account data from all production systems within 30 days. Deletion is irreversible β please back up any data you need before confirming.
β KVMNODE does not restrict you from exercising any of these rights, and no fee is charged. If you encounter a technical issue, please contact the support team via ticket.
Policy Updates and Contact
This policy will be continuously updated as the business evolves and regulations change.Material changes (involving changes to data sharing scope or user rights) will be notified to you via your registered email address 14 days in advance. Non-material wording or formatting adjustments will be published and take effect directly.
Continued use of the service constitutes acceptance of the most recent version of this policy. If you disagree with the updated policy, please discontinue use of the service before it takes effect and submit an account deletion request.
If you have any questions about this policy or wish to exercise any of the rights described above, please contact us through the following channels: