We value the privacy and security of our visitors, customers and our customers' visitors. We know you have questions about log files and how to protect them. Our hosting products provide options regarding how much control you want over your servers and how they are configured.
We configure and manage log files for our shared hosting products.
- Only data necessary to administer, improve, customize, and enhance our Services is captured.
- IP address data is used to generate aggregate, non-identifying information about how our Services are used.
- Access to the logs is restricted to only support personnel.
- We provide you access to view the logs that pertain to your particular server(s). However, any individual to whom you grant root level access may view these logs.
- We rotate logs every 30 days to remove stale data.
Our collection and use of log data was designed to comply with applicable privacy laws, including the GDPR.
Dedicated and Virtual Dedicated Hosting
You have full control over log files in our dedicated and virtual dedicated hosting products.
- You may enable or disable logging.
- You may set log rotation periods.
- You may grant individuals access to view your logs, or remove such access.
Need help figuring out how?
Good Security Practices
Whether we handle the logs for you or you manage log settings yourself, a few good security practices go a long way:
- URL Parameters: Do not pass any personally identifiable information in URL parameters. This is not only bad security practice, but these values could show up in logs as well.
- Access: Only grant access to view logs to people who need to see them. Keeping this number to a minimum helps reduce opportunities for inadvertent copying or loss.
- Rotation: Where you manage your log settings, make sure to implement rotation. This helps remove stale data, but also keeps your log files from taking over your storage space.