What information we have access to, what information we store and for what purposes you can see it in our database.

According to the Law on Accounting published in the Official Gazette Nos. 78/15, 134/15, 120/16, which is applicable from 01.01.2017. Chapter II. LEGISLATIVE DOCUMENTS Article 10 Keeping the accounting documents in paragraphs 2 and 3 we are obliged to keep the following information necessary for issuing the accounting document (invoice, delivery note) for at least 11 years, and therefore we need the following information:

  • Name
  • Last name
  • VAT ID
  • Address

If the contract comes to fruition, we need information about the domain owner, technical contact and domain admin, all provide information so that the domain can be registered (we forward the same information to the registrar).

The service cannot be delivered without the above

  • Name
  • Last name
  • Name of company / craft / establishment
  • OIB
  • Address
  • Contact phone number
  • Contact fax number
  • User email

User data

  • Cookies on our web site store user information in terms of IP address, location, etc.
  • We do not have access to any additional information from users through domains

If the contract is not implemented, we do not need any information, the company / crafts / institution data is used.

User data
Cookies on our web site store user information in terms of IP address, location, etc.
We do not have access to any additional information from the user when installing the SSL certificate EXCEPT when the user requests us to assist with the installation of the certificate with the user.

If the contract is realized when activating the user’s E-mailbox, a password is sent so that we know the initial password of the e-mail. The user is obliged to change the same.

User data

  • Cookies on our web site store user information in terms of IP address, location, etc.
  • We have access to E-mail login. The messages contained in the E-mailbox are not read or accessed by the user’s inbox.
  • E-mailboxes are located on the server of our service provider, and the provider has access to messages. Messages are not read.

If a contract occurs when the desired hosting package is activated, a password is sent to access cPanel. The user can change the password later, but the initial password is visible to the system.

When migrating data from the user, the user provides us with access data from the current hosting provider. Primarily a cPanel username and password, but also mailbox information to migrate them.

User data

  • Cookies on our web site store user information in terms of IP address, location, etc.
  • Messages are stored inside the user’s E-mail in log form, and we have access to them. Used solely for debugging (technical support) purposes
  • We have access to data (content), which can include private data if the user uploads their data to the server. We only access user information in the case of an infected website or at the request of a user. The data are: databases, website content
  • The data is saved in a backup, which we access again only as needed (user query).
  • Packet access logs are saved and contain a username and an IP address.

If a contract occurs when the desired hosting package is activated, a password is sent to access cPanel. The user can change the password later, but the initial password is visible to the system.

When migrating data from the user, the user provides us with access data from the current hosting provider. Primarily a cPanel username and password, but also mailbox information to migrate them.

User data

  • Cookies on our web store user information in terms of IP address, location, etc.
  • Since this is an unmanaged server, we have root access to everything, but we don’t access anything. More specifically, we have access data, but we do not use it because we do not maintain maintenance in the unmanaged service.

If a VPS server activation agreement is executed, the password for access to the server is stored in our billing system.

Support agents and sysadmins have ssh access to the servers. This means that they have access to their content on the server (e-mail messages, logs, databases, page content).

User data

  • Cookies on our web site store user information in terms of IP address, location, etc.
  • User e-mails are saved as logs, and we have access to them. Used solely for debugging (technical support) purposes
  • We have access to data (content), which can include private data if the user uploads their data to the server. We only access user information in the case of an infected website or at the request of a user. The information is:
  • databases
  • content of the website
  • The data is saved in a backup, which we access again only as needed (user query).
  • Packet access logs are saved and contain a username and an IP address.

If the activation of the DEDICATED server occurs, the password for access to the server is stored in our billing system.

Support agents and sysadmins have ssh access to the servers. This means that they have access to their content on the server (e-mail messages, logs, databases, page content).

User data

  • Cookies on our web site store user information in terms of IP address, location, etc.
  • User e-mails are saved as logs, and we have access to them. Used solely for debugging (technical support) purposes
  • We have access to data (content), which can include private data if the user uploads their data to the server. We only access user information in the case of an infected website or at the request of a user. The information is:
  • databases
  • content of the website
  • The data is saved in a backup, which we access again only as needed (user query).
  • Packet access logs are saved and contain a username and an IP address.

<p style = “text-align: center;”> <strong> <em> The latest version of the Database was released and came into effect on May 11, 2018 </em> </strong> </p>

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.