Security Policy

Hostsor.net is committed to maintaining the highest level of security for our users, their data, and all services delivered through our AI-powered web-based website builder platform. This Security Policy explains the measures, practices, and responsibilities associated with protecting information, infrastructure, and digital assets within the Hostsor.net SaaS ecosystem.


Hostsor.net uses modern security architecture designed to safeguard user data against unauthorized access, misuse, loss, or disclosure. Our systems are hosted on secure cloud infrastructure that includes firewalls, intrusion detection systems, traffic monitoring, and encryption technologies. All data transmitted between users and Hostsor.net servers is protected using secure communication protocols to reduce the risk of interception or tampering.


User accounts on Hostsor.net are protected through authentication mechanisms designed to prevent unauthorized access. Users are responsible for maintaining the confidentiality of their login credentials, including usernames and passwords. Hostsor.net recommends using strong passwords, enabling available security features, and avoiding sharing login details with any third party. Any activity occurring under a user account is assumed to be authorized by the account holder.


The AI website builder platform processes content, designs, and configurations generated by users. Hostsor.net does not claim ownership of user-generated content; however, security controls are applied to ensure isolation between accounts so that one user’s data cannot be accessed by another. Access controls are strictly enforced within the system to limit data exposure to only authorized services and personnel.

Hostsor.net follows the principle of least privilege, meaning internal access to systems and data is limited to authorized staff who require it to perform their duties. Administrative access is monitored, logged, and reviewed regularly. Employees and contractors with access to sensitive systems are bound by confidentiality obligations and security policies.


We regularly monitor our infrastructure for suspicious activities, vulnerabilities, and security threats. Automated systems and manual reviews are used to identify potential risks. When vulnerabilities are discovered, Hostsor.net takes prompt action to assess, mitigate, and resolve the issue. Security updates, patches, and improvements are applied as part of ongoing maintenance.


While Hostsor.net implements strong security measures, no system can be guaranteed to be completely secure. Users acknowledge that the use of internet-based services carries inherent risks. Hostsor.net is not responsible for security breaches caused by factors outside our reasonable control, including user negligence, compromised devices, or third-party services integrated into user websites.

In the event of a confirmed security incident that affects user data, Hostsor.net will take reasonable steps to investigate the issue, mitigate harm, and notify affected users when appropriate. Our response procedures are designed to minimize impact and restore system integrity as quickly as possible.


Users are prohibited from attempting to breach, test, or reverse-engineer the security mechanisms of Hostsor.net. Any attempt to exploit vulnerabilities, conduct unauthorized scans, or interfere with platform operations may result in immediate suspension or termination of accounts, and may lead to legal action.


This Security Policy may be updated periodically to reflect changes in technology, legal requirements, or operational practices. Continued use of Hostsor.net after any updates indicates acceptance of the revised policy.