Privacy Policy

IV Data Center Privacy Policy

IVDC is a big supporter of our customers’ privacy. We will track the speed (not the actual data info) you use to help us manage our network and to help us troubleshoot problems when they arise. On occasion, IVDC will inspect traffic, but only for the purpose of network management and troubleshooting. We will not sell (or give) any of your info to marketers, other customers, other companies, or individuals that will sell your info to marketers. If you are concerned about privacy, please encrypt your traffic so that only you and whomever you share it with will see it. It’s good for you, it’s good for us, it’s good for everyone.

Redress Options:

If you are having a problem, please call, email, Facebook Messenger, text us, or just stop by the office. We will get it resolved as quickly as we can. If you want to discontinue service, please let us know the end date and a time when we can pick up our equipment. IVDC has a money-back guarantee for install costs if we are notified within 30 days of installation (please give us a chance to resolve any problem you may have before canceling).

Our Rights:

We reserve the right to terminate service without cause, though we'll try to discuss it with you first. We do not endorse illegal downloading of copyrighted material or other illegal activity using the internet. We may cancel service without notice to repeat offenders. If you attack, or cause our network to be digitally attacked, either internally or externally, we reserve the right to cancel service without notice. This includes DDoS attacks, spreading malware, malicious spying, and other attacks which seek to deny or impede services to other customers or users.

Retention and access to data:

A list of prohibited content can be found below, which includes but is not limited to the following:

  • 1. Virtual currency mining (such as bitcoin, prime coin etc.), except on plans with dedicated CPU
  • 2. Child pornography
  • 3. Malware/virus/security exploit activities
  • 4. Terrorist activities
  • 5. Port scanning, brute forcing or any other hacking attempts
  • 6. Any CPU, disk or network abusing software. Including but not limited to card sharing (Multicast etc.), Folding @Home, Traffic Exchange & other similar software. Exceptions can be made for plans with dedicated CPU if we are notified in advance.

Legal and Security

If you are terminated due to a violation of our terms of service you agree that you will not receive any partial refunds and that this shall be considered a reasonable estimate of the liquidated damage and not a penalty.