Privacy Policy

Last Updated: April 2026

This Privacy Policy explains how Done 5 Technologies (“Done 5 Technologies”, “we”, “us”, or “our”) collects, uses, stores, and protects personal and technical data across all services, infrastructure, and platforms.

This policy applies to all users, customers, and visitors interacting with Done 5 Technologies systems, including hosting, domains, servers, websites, security services, and support channels.


1. Our Position on Privacy

Done 5 Technologies is built on a security-first foundation. Privacy is not treated as a compliance checkbox — it is part of how infrastructure is designed and operated.

We collect only what is required to:

  • Deliver and maintain services
  • Secure systems and prevent abuse
  • Process billing and account management
  • Provide support and operational continuity

We do not sell user data.
We do not monetize personal information.
We do not operate advertising-based tracking systems.


2. Information We Collect

2.1 Account & Identity Information

When you register or purchase services, we may collect:

  • Full name / company name
  • Email address
  • Phone number
  • Billing address
  • Payment-related information (processed via secure third-party gateways)

2.2 Technical & Service Data

To operate infrastructure and maintain service stability, we collect:

  • IP addresses
  • Login activity and timestamps
  • Server usage data (CPU, RAM, bandwidth, processes)
  • DNS and domain configuration data
  • Email routing logs (metadata only, not content unless required for troubleshooting)

This data is required for system performance, abuse prevention, and infrastructure control.


2.3 Support & Communication Data

When you contact support:

  • Tickets, chat logs, and email communication
  • Diagnostic data shared for troubleshooting
  • Access credentials provided temporarily (if required)

2.4 Website & Analytics Data

On Done 5 websites:

  • Basic analytics (traffic, device, location approximation)
  • Cookies for session management and login persistence

No invasive tracking, fingerprinting, or behavioral profiling is performed.


3. How We Use Information

We use collected data strictly for operational purposes:

  • Service provisioning (hosting, domains, servers)
  • Billing, invoicing, and renewal management
  • Security monitoring and threat detection
  • Abuse prevention (spam, malware, phishing)
  • Technical support and incident response
  • Service improvement and infrastructure optimization

As outlined in your infrastructure model, monitoring and logging are essential for detecting threats and maintaining system integrity.


4. Data Sharing & Disclosure

We do not sell or rent personal data.

Data may only be shared in the following cases:

4.1 Service Providers

  • Payment gateways
  • Domain registrars
  • Infrastructure providers (datacenters, network providers)

Only the minimum required data is shared.


4.2 Legal & Compliance

We may disclose data if required:

  • By applicable law or legal process
  • To respond to valid government or regulatory requests
  • To enforce our Terms of Service, AUP, or Abuse Policy

4.3 Security & Abuse Prevention

Data may be used or shared internally to:

  • Investigate malware, phishing, or attacks
  • Prevent network abuse
  • Protect other customers on shared infrastructure

5. Data Retention

We retain data only as long as necessary:

  • Active accounts → retained for service continuity
  • Billing records → retained for financial/legal compliance
  • Logs → retained based on security and operational requirements
  • Terminated accounts → data may be deleted or anonymized after a defined retention period

Backup systems may retain copies temporarily as part of disaster recovery policies.


6. Data Security

Security is the foundation of Done 5 infrastructure.

We implement:

  • Server-level isolation (CloudLinux)
  • Web Application Firewall (WAF)
  • Malware detection and removal systems
  • Encrypted data transmission (HTTPS)
  • Access control and authentication policies
  • Continuous monitoring and logging

Security services such as malware scanning, intrusion detection, and hardening are part of core operations, not optional add-ons.


7. Customer Responsibilities

Customers are responsible for:

  • Maintaining strong passwords and access control
  • Securing their applications (e.g., WordPress plugins/themes)
  • Managing user-level access within their accounts
  • Ensuring compliance with applicable data protection laws

Done 5 secures infrastructure. Application-level security remains a shared responsibility.


8. Cookies & Tracking

We use cookies only for:

  • Session authentication
  • Website functionality
  • Basic analytics

We do not use:

  • Third-party advertising trackers
  • Behavioral profiling systems
  • Data resale mechanisms

You may disable cookies via your browser, but some features may not function correctly.


9. International Data Processing

Done 5 operates across multiple regions, including:

  • Malaysia (primary infrastructure and HQ)
  • Bangladesh
  • United States
  • Other global datacenter locations

Data may be processed in any of these locations depending on service deployment.


10. Your Rights

Depending on your jurisdiction, you may have the right to:

  • Access your personal data
  • Request correction or updates
  • Request deletion (where applicable)
  • Object to certain processing activities

Requests can be submitted via official support channels.


11. Third-Party Links & Services

Our services may integrate with or link to third-party platforms.
We are not responsible for their privacy practices.

Users should review third-party policies independently.


12. Changes to This Policy

We may update this Privacy Policy to reflect:

  • Legal or regulatory changes
  • Infrastructure or service updates
  • Security improvements

Updated versions will be published with a revised “Last Updated” date.


13. Contact Information

For privacy-related inquiries:

Done 5 Technologies
Website: https://done5.com
Support: Official ticket system / support email


Final Position

We don’t treat privacy as paperwork.

We treat it the same way we treat infrastructure:

Controlled. Logged. Secured. Enforced.

Done5 Technologies was built in 2016 to solve one problem: infrastructure that fails when you need it most. Today, we manage infrastructures from 40+ global data centers and hundreds of security recoveries with a single focus —keeping websites online and protecting your brand

Get Connected

Copyright © 2016-26 Done 5 Technologies. All Rights Reserved. All Trademarks Are The Property of Their Respective Owners