Privacy Policy
Last Updated: April 2026
This Privacy Policy explains how Done 5 Technologies (“Done 5 Technologies”, “we”, “us”, or “our”) collects, uses, stores, and protects personal and technical data across all services, infrastructure, and platforms.
This policy applies to all users, customers, and visitors interacting with Done 5 Technologies systems, including hosting, domains, servers, websites, security services, and support channels.
1. Our Position on Privacy
Done 5 Technologies is built on a security-first foundation. Privacy is not treated as a compliance checkbox — it is part of how infrastructure is designed and operated.
We collect only what is required to:
- Deliver and maintain services
- Secure systems and prevent abuse
- Process billing and account management
- Provide support and operational continuity
We do not sell user data.
We do not monetize personal information.
We do not operate advertising-based tracking systems.
2. Information We Collect
2.1 Account & Identity Information
When you register or purchase services, we may collect:
- Full name / company name
- Email address
- Phone number
- Billing address
- Payment-related information (processed via secure third-party gateways)
2.2 Technical & Service Data
To operate infrastructure and maintain service stability, we collect:
- IP addresses
- Login activity and timestamps
- Server usage data (CPU, RAM, bandwidth, processes)
- DNS and domain configuration data
- Email routing logs (metadata only, not content unless required for troubleshooting)
This data is required for system performance, abuse prevention, and infrastructure control.
2.3 Support & Communication Data
When you contact support:
- Tickets, chat logs, and email communication
- Diagnostic data shared for troubleshooting
- Access credentials provided temporarily (if required)
2.4 Website & Analytics Data
On Done 5 websites:
- Basic analytics (traffic, device, location approximation)
- Cookies for session management and login persistence
No invasive tracking, fingerprinting, or behavioral profiling is performed.
3. How We Use Information
We use collected data strictly for operational purposes:
- Service provisioning (hosting, domains, servers)
- Billing, invoicing, and renewal management
- Security monitoring and threat detection
- Abuse prevention (spam, malware, phishing)
- Technical support and incident response
- Service improvement and infrastructure optimization
As outlined in your infrastructure model, monitoring and logging are essential for detecting threats and maintaining system integrity.
4. Data Sharing & Disclosure
We do not sell or rent personal data.
Data may only be shared in the following cases:
4.1 Service Providers
- Payment gateways
- Domain registrars
- Infrastructure providers (datacenters, network providers)
Only the minimum required data is shared.
4.2 Legal & Compliance
We may disclose data if required:
- By applicable law or legal process
- To respond to valid government or regulatory requests
- To enforce our Terms of Service, AUP, or Abuse Policy
4.3 Security & Abuse Prevention
Data may be used or shared internally to:
- Investigate malware, phishing, or attacks
- Prevent network abuse
- Protect other customers on shared infrastructure
5. Data Retention
We retain data only as long as necessary:
- Active accounts → retained for service continuity
- Billing records → retained for financial/legal compliance
- Logs → retained based on security and operational requirements
- Terminated accounts → data may be deleted or anonymized after a defined retention period
Backup systems may retain copies temporarily as part of disaster recovery policies.
6. Data Security
Security is the foundation of Done 5 infrastructure.
We implement:
- Server-level isolation (CloudLinux)
- Web Application Firewall (WAF)
- Malware detection and removal systems
- Encrypted data transmission (HTTPS)
- Access control and authentication policies
- Continuous monitoring and logging
Security services such as malware scanning, intrusion detection, and hardening are part of core operations, not optional add-ons.
7. Customer Responsibilities
Customers are responsible for:
- Maintaining strong passwords and access control
- Securing their applications (e.g., WordPress plugins/themes)
- Managing user-level access within their accounts
- Ensuring compliance with applicable data protection laws
Done 5 secures infrastructure. Application-level security remains a shared responsibility.
8. Cookies & Tracking
We use cookies only for:
- Session authentication
- Website functionality
- Basic analytics
We do not use:
- Third-party advertising trackers
- Behavioral profiling systems
- Data resale mechanisms
You may disable cookies via your browser, but some features may not function correctly.
9. International Data Processing
Done 5 operates across multiple regions, including:
- Malaysia (primary infrastructure and HQ)
- Bangladesh
- United States
- Other global datacenter locations
Data may be processed in any of these locations depending on service deployment.
10. Your Rights
Depending on your jurisdiction, you may have the right to:
- Access your personal data
- Request correction or updates
- Request deletion (where applicable)
- Object to certain processing activities
Requests can be submitted via official support channels.
11. Third-Party Links & Services
Our services may integrate with or link to third-party platforms.
We are not responsible for their privacy practices.
Users should review third-party policies independently.
12. Changes to This Policy
We may update this Privacy Policy to reflect:
- Legal or regulatory changes
- Infrastructure or service updates
- Security improvements
Updated versions will be published with a revised “Last Updated” date.
13. Contact Information
For privacy-related inquiries:
Done 5 Technologies
Website: https://done5.com
Support: Official ticket system / support email
Final Position
We don’t treat privacy as paperwork.
We treat it the same way we treat infrastructure:
Controlled. Logged. Secured. Enforced.