We are committed to protecting your privacy
We collect the minimum amount of information about you that is commensurate with providing you with a satisfactory service. We created this policy to indicate the type of processes that may result in data that may be collected from you. Once you sign up with us you agree with our policies which will result in a minimum of information that will need to be collected.
We may collect any or all of the information that you give us depending on the type of transaction to process, including your name, address, telephone number, fax number and email address, together with data about your use of the website. Other information that may be needed from time to time to process a request may also be collected as indicated on the website.
We do not provide under any circumstance personal information obtained about you from this website to third parties. We may use the information to keep in contact with you and inform you of developments associated with our business. If at any time in the future we should wish to disclose information collected on this website to any third party, it would only be with your consent.
Disclosure to Law Enforcement
Cloud Computing Network (https://www.cloudcomputing.network) may disclose any subscriber information to law enforcement agencies without further consent or notification to the subscriber upon lawful request from such agencies. We will cooperate fully with law enforcement agencies.
We use the information collected primarily to process the task for which you visited the website. All reasonable precautions are taken to prevent unauthorized access to this information. This safeguard may require you to provide additional forms of identity should you wish to obtain information about your account details.
We know for having lots of scam and fraudulent activities, most of the hosted customers face several unconscious abuse report(s). We therefore, tried to create a powerful abuse team to verify the abuse reports (Copyright, Email Spam, and Unauthorized Activities) sent to us. We first verify the reporters identity and then verify the existence of copyrighted material according to our company law. A reporter has to send a paper with the company header signed by him/her/company’s MD to prove the copyright authorization. According to MLA, only Abuse Department (Or Piracy Department) of the related company/personal is only allowed to send an abuse request to our Department for verification. If it’s a personal copyright, then a Passport identity including his/her copyright over the material has to be proven to our abuse department. All the documents are verified according to our law and MLA. If Abuse passes the request to Support, then support department asks the owner to take proper action against the complaint. If support doesn’t receive proper information(s) from client then a suspension is issued after 15 days of escalation. These steps are only taken to prevent fraudulent scam reports and reduce the activities of support to verify the abuse report. For Email spamming a proper header is required so that it’s possible to do a network scan and find out the verification of the email sender.
Changes to this Policy