This Privacy Policy explains how we collect, use, disclose, and protect personal data when you visit our website, create an account, purchase Services, or communicate with us. It also clarifies the roles and responsibilities where we process personal data in Customer Content as a hosting provider.
We act as a “controller” (or equivalent term) for personal data we collect and use to operate our business, including account registration data, billing and payment data, support communications, and marketing preferences.
For personal data contained in Customer Content hosted on the Services (for example, your website database containing end-user records), we typically act as a “processor” (or “service provider”) on behalf of the Customer. In this context, the Customer determines what data is collected and the purposes of processing. Our processing is limited to providing the hosting infrastructure and support and complying with legal obligations.
Where the UK GDPR or EU GDPR applies, we rely on the following legal bases:
We share personal data only as needed for the purposes above:
We may process data in the United Kingdom, the European Union, and other locations where our subprocessors operate. Where data is transferred internationally and GDPR applies, we use appropriate safeguards such as standard contractual clauses, vendor due diligence, and security measures.
We retain personal data only as long as necessary for the purposes described:
Depending on your jurisdiction, you may have rights such as access, correction, deletion, restriction, portability, and objection. You may also withdraw consent where processing is based on consent. To exercise rights, contact us using the details above. We may request verification to protect against unauthorized requests.
We implement technical and organizational measures designed to protect personal data, including access controls, least privilege, encryption in transit where supported, monitoring, and incident response processes. No system is perfectly secure; you are responsible for securing your own applications and credentials.
We use essential cookies to operate the site and client portal. Where required, we ask for consent for non-essential cookies (analytics and marketing). You can manage cookie settings in your browser and, where available, through our cookie consent tool.
The Services are not directed to children. We do not knowingly collect personal data from children under 13 (or the age required by local law). If you believe a child has provided data, contact us and we will take appropriate steps.
We may update this Privacy Policy. We will post the updated version on our site and update the effective date. Material changes may be notified via email or the client portal.
Contact us at [email protected]. If you are in the UK or EEA and believe we have not addressed your concern, you may also have the right to lodge a complaint with your local data protection authority.
We use service providers (“subprocessors” when acting as a processor) to help operate the Services. Typical categories include:
We contractually require providers to protect data and use it only for our instructions. Where we act as a processor, customers may request an up-to-date subprocessor list via support.
When we request identity or business verification, we use the data to prevent fraud, comply with payment provider requirements, and protect platform integrity. Verification data may be processed by third-party verification services. We restrict access to verification data and store it for the shortest period necessary, subject to legal obligations and fraud prevention needs.
Depending on your U.S. state, you may have privacy rights similar to GDPR (access, deletion, correction, and opt-out of certain disclosures). We do not sell personal information in the traditional sense. Some disclosures to service providers for analytics or marketing may be considered “sharing” under certain U.S. state laws. Where required, we provide opt-out mechanisms and honor browser-based signals where applicable.
We may use automated systems to detect fraud, abuse, or security anomalies (for example, login risk scoring or abuse pattern detection). These systems may lead to temporary restrictions or requests for manual verification. You may contact support to request human review of a decision that materially affects your access to the Services.
If you are an end user of a website hosted by one of our customers and you want to exercise data rights regarding that website’s content, you should contact the site operator (our customer) because they control the content and purposes of processing. We can assist the customer as needed as a processor.
Security controls vary by service tier and may include: encrypted connections (TLS) for web portals; access control and role-based permissions for internal systems; monitored authentication events; malware scanning and quarantining (where enabled); network firewalls and WAF; DDoS mitigation; secure backups (where purchased); and incident response procedures. Customers remain responsible for application-layer security, credential hygiene, and safe configuration of their services.
Copyright © 2014‐2026 Yhost. All Rights Reserved