Privacy Policy

Last Updated: 06/15/2025

At Kingdom, we are committed to protecting your privacy and ensuring the security of your data. This Privacy Policy outlines how we collect, use, and safeguard your information when you use our services.

1. Introduction

Kingdom provides hosting services for PocketBase applications. By using our services, you agree to the collection and use of information in accordance with this policy.

2. Data Collection and Usage

2.1 Information We Collect

  • Personal Information: We collect only the personal information that you voluntarily provide to us, such as your email address. This information is necessary for account creation, authentication, and communication purposes.

2.2 How We Use Your Information

  • Communication: Your email address is used solely for transactional communications (like account confirmations, password resets, and service notifications) and for sending you updates about our services.

  • No Third-Party Sales: We do not sell or rent your personal information to any third parties.

  • Authorized Third Parties: We may share your information with third-party service providers who are authorized to communicate on our behalf, solely for the purpose of providing our services to you.

2.3 Aggregate Data

  • Public Statistics: We may publish aggregate data such as user counts, instance counts, and other platform statistics. This information does not include any personally identifiable information and is used to inform the public about our platform's usage.

2.4 Anonymized Troubleshooting

  • Community Support: Occasionally, we may discuss particular user behaviors on platforms like Discord for troubleshooting purposes. These discussions are always conducted anonymously to protect your identity.

3. Data Storage and Security

3.1 Hosting Environment

We utilize PocketHost.io for hosting our infrastructure. PocketHost.io is a trusted provider specializing in PocketBase hosting.

PocketHost.io Security Measures

  • At-Rest Encryption: PocketHost.io handles encryption of volume storage at rest, protecting data against unauthorized physical access.

  • Network Security: Advanced network security measures like firewalls and intrusion detection systems are employed.

  • Access Controls: Strict access controls with multi-factor authentication and role-based permissions are in place.

  • Regular Backups and Redundancy: Regular backups and redundant systems prevent data loss and ensure high availability.

3.2 PocketBase Instances

Each PocketBase instance is managed by PocketHost.io with their standard security practices and configurations.

Data at Rest

  • Data Storage: Your data is stored according to PocketHost.io's standard practices and security measures.

3.3 SSH Security and Data Encryption

  • Security: PocketHost.io manages all server access and security protocols.

  • In-Flight Data Encryption: All data transmission is encrypted using industry-standard protocols, safeguarding against interception.

3.4 Use of Cloudflare

We utilize Cloudflare services to enhance security and performance.

  • Caching: Cloudflare provides intelligent caching to improve load times.

  • Origin Security: Acts as a reverse proxy, offering DDoS mitigation, Web Application Firewall (WAF) protection, and SSL/TLS encryption.

  • SSL/TLS Encryption: All connections between end-users and Cloudflare are encrypted, ensuring secure data transmission.

4. Cookies and Tracking Technologies

  • Authentication and Analytics: We use cookies to manage user authentication and gather analytics to improve our services.

  • No Ad Tracking: We do not use cookies or scripts for ad tracking or any similar purposes.

  • Opt-Out: You can configure your browser settings to refuse cookies, but this may affect the functionality of our services.

5. Data Sharing and Disclosure

  • No Selling of Personal Data: We do not sell or rent your personal information to anyone.

  • Third-Party Service Providers: We may share your information with third-party service providers who assist us in operating our services, under strict confidentiality agreements.

  • Legal Requirements: We may disclose your information if required to do so by law or in response to valid requests by public authorities.

6. User Rights

  • Access and Correction: You have the right to access and correct your personal data at any time.

  • Data Portability: You can request a copy of your data in a structured, machine-readable format.

  • Deletion: You may request the deletion of your personal data, subject to certain legal obligations.

7. Changes to This Privacy Policy

We may update our Privacy Policy periodically. We will notify you of any significant changes by posting the new Privacy Policy on this page with an updated effective date.

8. Contact Us

If you have any questions or concerns about this Privacy Policy, please contact us at: