1. Introduction
Welcome to the cloud-based physical machine rental service provided by VNCMac (hereinafter referred to as "we", "the platform", or "the Service Provider"). This Privacy Policy (hereinafter referred to as "the Policy") explains how we collect, use, store, share, and protect your personal information.
By starting to use our platform services (including but not limited to browsing the website, registering an account, or making a purchase), you indicate that you fully understand and agree to all contents of this Policy. If you do not agree with any part of this Policy, please stop using our services immediately.
We reserve the right to modify this Policy at any time. Modified policies take effect immediately upon publication without separate notice. Your continued use of the service constitutes acceptance of the modified Policy.
2. Information We Collect
2.1 Information You Actively Provide
During your use of the service, we may collect the following information that you actively provide:
- Account Info:Email address, password, username, nickname
- Identity Info:Real name, ID number, passport info (for real-name authentication and anti-fraud verification)
- Payment Info:Payment method, credit card info, billing address, transaction records
- Communication Info:Content of communications with our customer service and technical support teams, email correspondence, ticket records, and attachments
- Order Info:Rented device model, configuration, data center selection, lease term, usage duration, etc.
- Feedback Info:Opinions, suggestions, evaluations, and complaints you submit
2.2 Information We Automatically Collect
When you use the service, we automatically collect the following technical information and usage data:
- Device Info:Device model, OS type and version, browser type and version, screen resolution, unique device identifier (e.g., IMEI, MAC address)
- Network Info:IP address, network operator, connection type, geographic location info (based on IP)
- Log Info:Access time, visited page URL, click behavior, duration of stay, error logs, crash reports
- Cookie Data:Data collected using cookies, local storage, session storage, and other technologies
- Server Usage Data:Login records of the cloud physical machine you rent, resource usage (CPU, memory, storage, network traffic), running processes and services, network connection records
- Performance Data:Server response time, bandwidth usage, system load, and other technical indicators
2.3 Third-Party Source Information
We may obtain your information from the following third parties:
- Payment Service Providers:Payment status, transaction records, risk assessment info
- Identity Verification Services:Results of identity authenticity verification
- Anti-Fraud Services:Device fingerprint, risk score, blacklist info
- Partners:Other information you authorize to be shared
3. How Information is Used
We have the right to use your personal information in the following scenarios (your use of the service constitutes consent):
- Service Provision:Account management, identity verification, service configuration, resource allocation, billing, technical support
- Security Assurance:Identity verification, anomaly detection, fraud prevention, violation monitoring, abuse protection, security auditing
- Operational Analysis:Analyzing user behavior, usage preferences, and access patterns to optimize product and service experience
- Marketing & Promotion:Pushing product info, promotional activities, industry news, and service update notifications to you (you cannot fully opt out of necessary service-related notifications)
- Technical Support:Responding to your inquiries, complaints, and technical issues, providing remote assistance
- Legal Compliance:Cooperating with investigations by judicial and administrative authorities, fulfilling legal obligations, and responding to legal proceedings.
- Internal Management:Auditing, financial management, risk control, performance evaluation, and employee training.
- Business Cooperation:Using anonymized or de-identified data for business analysis, industry research, market surveys, and partnership negotiations.
- Credit Assessment:Assessing your credit status to decide whether to provide services or credit limits.
- Ad Placement:Displaying personalized advertisements on our website or third-party platforms.
We reserve the right to use your information for other reasonable business purposes not explicitly listed.
4. Sharing, Transfer, and Public Disclosure of Information
4.1 Sharing
We may share your personal information with third parties in the following circumstances:
- Affiliates:Sharing with our parent company, subsidiaries, and affiliated enterprises for business synergy and internal group management.
- Service Providers:Sharing necessary information with payment providers, cloud providers, CDN providers, data center operators, technical service providers, and outsourced customer support.
- Business Transfer:In the event of a merger, acquisition, asset sale, restructuring, or bankruptcy liquidation, your information may be transferred as part of the transaction assets.
- Legal Requirements:Disclosing information in accordance with laws, regulations, court orders, or government requirements.
- Rights Protection:Providing your information to lawyers, arbitration institutions, courts, or insurance companies to protect our legitimate rights and interests.
- Business Partners:Sharing anonymized data with advertising partners, data analysis firms, and market research institutions.
Once a third party receives your information, we cannot control how they use it. You understand and accept this risk.
4.2 Public Disclosure
We may publicly disclose your information in the following cases:
- If you seriously violate this Policy or Terms of Service, we may disclose your violation and account information.
- To protect the safety and interests of other users, the public, or ourselves.
- Disclosing fully anonymized data for academic research or statistical analysis.
- Upon request from law enforcement, copyright owners, or victims.
4.3 Transfer
If our business is transferred (including but not limited to merger, acquisition, or bankruptcy), your personal information will be transferred to the successor as part of the business assets without further consent.
5. Data Storage and Cross-Border Transfer
5.1 Storage Location
Your information will be stored in our data centers and servers located in Singapore, Japan, South Korea, Hong Kong, US East, and US West. Your information may be transferred between these locations based on business needs.
You explicitly agree that your information may be stored and processed outside of your country/region.
5.2 Storage Period
We will retain your information for the following periods (unless required longer by law):
- Account Info:Account Duration + 7 years after cancellation
- Transaction Records:10 years after transaction completion
- Server Logs:3 years
- Support Records:5 years
- Monitoring Data:Indefinitely (for security audits and compliance monitoring)
- Violation Records:Permanently retained (to prevent repeat violations)
Even if you delete your account or data, we still have the right to retain part or all of your information based on legal requirements, business needs, or operational safety needs.
5.3 Cross-Border Data Transfer
Since our business is global, your information may be transferred to, stored in, or accessed from countries outside of Mainland China. Data protection laws in these countries may differ from yours, and the level of protection may be lower.
By using our services, you explicitly consent to such cross-border transfers and waive any objections based on data localization requirements.
6. Your Rights and Their Limitations
6.1 Rights You May Have
Subject to applicable laws, you may have the following rights (if applicable):
- Right of Access:To query the personal information we hold about you.
- Right to Rectification:To request correction of inaccurate or incomplete information.
- Right to Deletion:To request deletion of information under specific circumstances.
- Right to Restrict Processing:To request restrictions on the use of certain information.
- Right to Data Portability:To request data in a structured, commonly used format.
- Right to Object:To object to certain data processing activities.
6.2 Limitations on Exercising Rights
However, you understand and agree that we have the right to refuse your request without giving reasons in the following cases:
- Related to our performance of obligations under laws and regulations.
- Directly related to national security, national defense, public safety, public health, or significant public interests.
- Directly related to criminal investigation, prosecution, trial, and execution of judgments.
- If there is sufficient evidence that you have subjective malice or are abusing your rights.
- Responding to your request would cause serious harm to the legitimate rights and interests of you or others.
- Involving our trade secrets, proprietary technology, or core business information.
- Out of reasonable necessity to maintain our system security and business operational efficiency.
- If it may harm our business interests or increase operating costs.
- Any other circumstances we deem inappropriate for responding.
We may need 30 business days to respond to your request. In complex cases, the response time may be extended to 90 business days. We may charge a reasonable fee to cover processing costs.
7. Information Security
7.1 Security Measures
We take reasonable technical and administrative measures to protect your information, including but not limited to data encryption, access control, security audits, and firewalls.
7.2 Security Disclaimer
However, you understand and agree:
- The internet environment is not completely secure, and we cannot guarantee absolute security of information.
- You should properly safeguard your account password and login credentials. We are not responsible for any information disclosure or loss caused by your own reasons (including password leakage, device loss, phishing attacks, etc.).
- In the event of a data breach, we will notify you as required by law (if applicable), but we shall not be liable for any direct or indirect loss resulting therefrom.
- Our security measures are limited by the current level of technology and reasonable cost, and we do not guarantee prevention of all security threats or attacks.
- The security of data on your server is your responsibility; we suggest you encrypt sensitive data yourself.
7.3 Security Incident Handling
In the event of a security incident, the response measures (including whether to notify, when to notify, and how to remedy) are determined by us at our sole discretion, and you have no right to demand specific handling methods.
8. Cookies and Similar Technologies
8.1 Use of Cookies
We use Cookies, Web Beacons, local storage, session storage, device fingerprinting, and other technologies to:
- Identify your identity and login status
- Record your preferences and settings
- Analyzing website usage and user behavior
- Serving personalized advertisements
- Preventing fraud and abuse
By using our services, you consent to our use of these technologies.
8.2 Third-Party Tracking
We use third-party analysis and advertising services (such as Matomo, Google Analytics, Facebook Pixel, etc.). These services may collect your browsing behavior, device info, location info, etc., and may track you across other websites.
We are not responsible for the privacy practices of third parties.
8.3 Consequences of Disabling Cookies
While you can disable Cookies via browser settings, this may result in some or all features being unavailable, for which we bear no responsibility.
9. Server Data and Monitoring
9.1 Monitoring Rights
Important Notice: Although we provide dedicated physical machine rental services, we explicitly reserve the following rights to ensure service quality, prevent abuse, and meet legal compliance requirements:
- Monitoring Rights:Real-time monitoring of server CPU, memory, storage, and network usage to detect abnormal traffic and suspicious behavior.
- Right of Access:Accessing your rented server and its data in scenarios such as technical support, security incident response, legal investigation, or system maintenance.
- Log Recording:Recording all server login logs, operation logs, network connection logs, and system call logs.
- Content Scanning:To prevent illegal content (including but not limited to malware, pirated software, prohibited information, and infringing content), we may perform automated or manual scanning.
- Data Backup:We may periodically back up server data for maintenance and disaster recovery (but do not guarantee data recoverability).
- Traffic Analysis:Analyzing network traffic destinations, protocols, and packet characteristics.
9.2 Limits of Data Privacy
You explicitly understand and agree:
- We have the right to view, analyze, copy, or disclose any data you store or transmit on the server under the premise of legality and compliance.
- We may use automated tools to scan your files and data.
- Our operations personnel may access your server when necessary.
- Please do not store information on the server that you consider absolutely private or highly sensitive.
9.3 Log Retention
We retain all log data for at least 3 years, and potentially indefinitely in cases involving security incidents, legal investigations, or violations. These logs may contain your personal info and server activity details.
10.3 Infringement Handling
If your content infringes upon third-party rights, you must independently bear all legal responsibilities and compensate us for resulting losses (including but not limited to legal fees, damages, and loss of goodwill).
If we discover a user is a minor (or provided false age info), we reserve the right to immediately terminate service and delete the account without refunding any paid fees.
If you are a parent or guardian and discover that your minor child has used our services, please contact us immediately.
11. Policy Updates
We reserve the absolute right to modify this Privacy Policy at any time. Modified policies will be published on this page and take effect immediately upon publication, without prior notice.
We may inform you of policy changes via email or site notifications, but the modified Policy remains binding even if you do not receive a notification.
If you do not agree with the modified Policy, your sole remedy is to stop using the service immediately. Your continued use will be deemed unconditional acceptance of the modified Policy.
12. Disclaimer
To the maximum extent permitted by applicable law, we explicitly declare:
- Force Majeure:We are not liable for data loss or disclosure caused by force majeure (natural disasters, war, pandemics, power outages, internet outages, supply chain disruptions).
- Third-Party Actions:We are not responsible for losses caused by hacker attacks, online scams, or third-party malicious behavior.
- Technical Limitations:We are not responsible for issues caused by technical defects, system vulnerabilities, or software bugs.
- User Negligence:We are not responsible for consequences caused by your failure to safeguard passwords, misoperations, or configuration errors.
- Third-Party Services:We are not responsible for the privacy practices or data security of third-party services such as payment gateways, CDNs, or network operators.
- Data Loss:Except for intentional deletion by us, we are not liable for data loss caused by any reason (including hardware failure, software errors, or operational mistakes).
- Indirect Losses:We are not liable for any indirect, incidental, special, punitive, or consequential damages (including loss of profits, loss of goodwill, data loss, business interruption, etc.) arising from the use or inability to use the service.
Our maximum liability (if any) shall not exceed the total service fees you paid to us in the past 3 months.
12. Applicable Law and Dispute Resolution
12.1 Applicable Law
The formation, execution, interpretation, and dispute resolution of this Policy shall be governed by the laws of the Republic of Singapore, excluding its conflict of laws rules.
12.2 Jurisdiction and Arbitration
Any dispute arising from this Policy shall be resolved as follows:
- Amicable Negotiation:Both parties shall first seek to resolve the dispute through amicable negotiation (within a maximum of 30 days).
- Mandatory Arbitration:If negotiation fails, either party has the right to submit the dispute to the Singapore International Arbitration Centre (SIAC) for arbitration in accordance with its rules.
- Arbitration Details:
- Location: Singapore
- Language: English
- Number of Arbitrators: 1 (appointed by SIAC)
- Fees: All costs (including arbitration fees, legal fees, and travel expenses) shall be borne by the losing party.
- The arbitral award shall be final,binding on both parties, and non-appealable.
You explicitly agree and waive:
- The right to file a lawsuit in your local courts.
- The right to participate in class action lawsuits.
- The right to a jury trial.
- The right to apply local consumer protection laws (if applicable).
12.3 Small Claims
For disputes with an amount below $500, the decision of our customer service department is final and you may not pursue arbitration or litigation.
13. Contact Us
If you have any questions, opinions, or suggestions regarding this Privacy Policy, or need to exercise your rights (where applicable), please contact us via:
We will respond within 30 business days of receiving your request. For complex or large requests, the response time may be extended to 90 business days. We may require proof of identity and charge a reasonable fee.
Last Updated: January 15, 2026
Effective Date: January 15, 2026
Important Statement
By using VNCMac services, you indicate that you have read, understood, and fully agree to all terms of this Privacy Policy.