Legal terms & Policies

GDPR & data security
Acceptable Use Policy
Terms of Services

Last updated revision January 10th 2019.

At ASERGO, implementing privacy and security best practices is not a new idea. As a hosting and IT-outsourcing company, we're constantly revising and improving our systems, tools and processes, in order to maintain great and secure platforms.

Our GDPR Roles

Our responsibilities in terms of personal data protection depend on our various data processing activities:

How we protect your privacy on and when you use our services.

ASERGO offer many services to help you run your business. As part of running those services we collect data about you and your business. This data is not only essential to run our services, but also critical for the safety of our services and all our users. This policy explains what information is collected, why it is collected, and how we use it.

We make legal and binding contractual commitments available to you through a Data Processing and Confidentiality Agreement compliant to the GDPR.

If your company collects, store or analyzes personal data of European residents, GDPR provisions require you to use a compliant third party Data Processor like ASERGO as your dedicated server hosting provider.

Enabling trust, safeguarding data and respecting privacy is what GDPR is all about. As a hosting company, we believe that privacy is a fundamental right and the GDPR is an important step forward to further clarify and enable individual privacy rights.

Obtaining GDPR compliance

Several appropriate technical and organisational measures has been implemented that ensure and demonstrate that we comply. This include internal data protection policies such as staff training, internal audits of processing activities, and reviews of internal policies.

Our appointed data protection officer, DPO is maintaining relevant documentation on processing activities.

Implementation of measures that meet the principles of data protection by design and data protection by default is ongoing. Measures include data minimization, pseudonymization and transparency.

Acceptable Use Policy

Our AUP is divided into two sections. The first section concerns your adhering to national laws. The second section is expressing our company's strong policy of keeping our network clean at all times, to the benefit of both you and ourselves.

Violation of national laws

Breach of national laws can lead to legal actions on our part, and to possible immediate disconnection or termination of your account, without any prior notice. Violation of national laws include but is not limited to;

  • Child porn
  • Drugs
  • Terrorism
  • Phishing
  • ID theft
  • Hacking
  • Cracking
  • DDos
  • Forgery
  • Spam
  • Copyright infringement

Violation of our company policies

Violation of our company policies include, but is not limited to;

  • IRC servers
  • TOR
  • NNTP
  • Open relay
  • Proxy / Public VPN
  • Port scanning
  • Flooding
  • Spoofing
  • Shells
  • Warez
  • Web crawler
  • Unsolicited bulk e-mail
  • Game servers

If you are unsure if your usage of our services is compliant with our company policies, please contact us for further information.

Violation of either national laws or our company policies, will result in one or more of following actions;

  • A ticket serving as a warning asking you to cure the breach of contract.
  • Disconnection of your services.
  • Termination of your services.