Who we are
Our website address is: https://privacymountain.com. We are a company specializing in providing privacy oriented hosting solutions to customers from all around the globe.
What personal data we collect and why we collect it
We do not allow any comments to be posted anywhere on our website, the only information we collect in regards to comments may be comments made by our own staff for which we collect the dates and times, usernames and email addresses. No such information (including IP addresses) is collected from visitors or customers of our websites.
The only information gathered from contact forms is the email address so that we can contact you back as well as the message within. We do not log any IP addresses, cookies, or any other information from those utilizing our contact forms.
We do not store or utilize any cookies outside of our own staff. The cookies utilized for our own staff are collected and used for the purpose of editing website content and internal content review.
Embedded content from other websites
Articles on this site do not include any embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website, therefore, for the sake of privacy, we do not include any such embedded content to prevent any unnecessary tracking of our customers.
We do not use any sort of analytical software/scripts on our website nor anywhere on our infrastructure to ensure that the privacy of our customers is not impacted.
Who we share your data with
The little amounts of data that we do gather on our customers such as ‘Pseudo Name’ and ‘Email Address’ have never been, are not, and will not ever be shared with any external parties. All such information is even restricted from access by our own employees unless they are in a position that requires access to said data.
How long we retain your data
Since we do not allow comments, no comments nor their metadata are retained.
We also do not allow for registration on this website, and as a result do not store any personal information that users usually provide in their user profile.
What rights you have over your data
If you have an account with us on any of our other web applications, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us that we have retained. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for legal or security purposes. This data is limited to the types of data mentioned above, which usually include the Pseudo Name on the account as well as the Email Address.
Where we send your data
We do not send any of your data to any external parties, and challenge any such legal requests. However, we may at some point be legally forced to disclose the pseudo name and email address that we have on file for our customers. We therefore recommend that you utilize an email address that can not be personally identified/tracked down to your real identity. This will help ensure that even in the event of a legal obligation of providing such information, no truly personally identifying information (PII) is released.
Your contact information
You can contact us through a wide variety of communication methods. The top two communication methods can be found below:
Email: [email protected]
We do not utilize (outside of no-reply mailboxes) any email addresses on our domain. Any non-sales related emails and conversations are removed every 60 days, this includes emails and conversations regarding technical support.
How we protect your data
We utilize cloud agnostic encryption on all of our hosting infrastructures and encrypt any and all data we can. Even in the event of a total export of any virtual machines, the data will be unmountable and unbrowsable without access to our private keys. As for the pseudo name and email addresses of our current customers, we retain such data for the purpose of providing our customers with technical support and billing related matters.
What data breach procedures we have in place
In the event of a data breach the affected portions of our systems are disconnected from the network and the data is cloned. Once the data has been cloned, the affected machines/portions of our system are analyzed by our SOC (Security Operation Center) and the cloned data remains untouched. Once the threat has been fully analyzed, eliminated and any necessary bugfixes have been put into place, the machines are put back online. Our procedure calls for a 1 hour window for notifications to our customers once such a threat or breach has been detected.
What third parties we receive data from
We receive data from a variety of sources. This may include, but is not limited to payment gateways we utilize as well as SEO-related content.
What automated decision making and/or profiling we do with user data
We do not perform any sort of automated decision making nor profiling with any user data (pseudo names and email addresses).
Industry regulatory disclosure requirements
Due to our wide array of datacenter locations, we can not provide an adequate fits-all description of industry regulatory disclosures nor compliance certifications.
We can, however, provide you with some of the information on the Chicago datacenter location that we utilize for customers that choose to utilize U.S. based hosting solutions
- SOC1 Compliant
- SOC2 Compliant
- SOC3 Compliant
- PCI-DSS Compliant
- ISO 9001 Compliant
- ISO 14001 Compliant
- ISO 27001 Compliant
- Biometric and Card Access to all spaces
- Anti-Tailgating and 24/7 Onsite Security