Your Data, Your Rules
let talk about your rights shall we?
Catlomao LTD Privacy Promise
What's Catlomao LTD?
Catlomao LTD is a one-person operation. Just me, personally running the infrastructure behind your services. No automation accessing your data, no corporate teams, no third-party handlers. When you need something, you talk directly to the person who built, maintains, and touches your environment.
What You Can Ask Me
I work for you. You have every right to know:
"Where exactly is my data?"
- I'll tell you the specific geographic location of servers
- Where backups live, how they're secured, and who else has physical or logical access
- Whether any data leaves my direct control (it doesn't without your say-so)
"How is my data protected?"
- Encryption for storage and transmission, if requested
- Network isolation and access controls, depends on the service
- Backup frequency and retention policies, also depends on the service
- Security measures specific to your service type, x2 depends on the service
"Who can see my stuff?"
- Short answer: You and only you — unless you explicitly authorize me
- I maintain zero standing access to your running services, files, or accounts
- No employees, no contractors, no automated systems scanning your data
Ask me anything. I'll answer in plain English, not corporate speak.
The Consent Rule
I cannot touch your data without permission. This is non-negotiable. I am required to request your explicit consent before accessing anything of yours.
What Requires Your Consent
| Situation |
What I Request |
What I Don't Do |
| Troubleshooting |
Read-only access to specific logs or configs |
Browse your data "just to check" |
| Maintenance |
Limited scope, time-bound access |
Assume ongoing permission |
| Security incident |
Access to investigate specific threat |
Access unrelated services or data |
| Your direct request |
Exactly what you asked for |
Exceed the scope you approved |
How Consent Works
- I ask — You receive a specific request detailing exactly what I need, why I need it, and for how long
- You decide — Approve, deny, or modify the scope. No hidden consequences for saying no
- I act — Only within the boundaries you set, manually
- It expires — Access terminates; I confirm completion
"Hi — your service is experiencing connectivity issues. To diagnose, I need read-only access to network logs for the past hour. This won't give me access to your application data, databases, or user content. Reply YES to authorize, or suggest a time for a screen share instead."
Your Options
- Grant — I proceed exactly as described
- Deny — I'll propose alternatives (screen sharing, you run diagnostics, scheduled maintenance)
- Modify — "Only during business hours," "Call me first," or "Just tell me the commands to run myself"
- Revoke — Change your mind anytime, even mid-task
What You Control Directly
Depending on your service, you typically control:
- Start, stop, or restart your services
- Configure security settings and access controls
- Install, modify, or remove software
- Manage your own users and permissions
- Monitor resource usage and logs
I don't have backdoors. When you lock me out administratively, I'm locked out until you choose otherwise.
When I Might Need Access
| Scenario |
My Process |
| Hardware or platform failure |
Notify you immediately, request emergency access with specific scope, provide estimated resolution time |
| Security patch or update |
Contact you in advance, schedule maintenance window, confirm before any changes |
| Your support request |
Wait for your explicit go-ahead before investigating, even if you reported the issue |
| Backup verification |
Request scheduled read-only access, confirm what I'll verify, report findings |
Emergency exception: If your service poses immediate risk to infrastructure or other customers, I may act first to isolate the threat — then notify you within 15 minutes with full documentation of what was accessed and why.
Your Right to Leave
- Export: Request your data, configurations, or full service images — no format restrictions
- Delete: Confirm complete removal of your data and backups from my systems
- Verify: I'll provide timestamped confirmation of deletion
- No retention: Once you're gone, your data isn't "anonymized" or kept for "research" — it's destroyed
To be even more transparent, this page is ai generated because idk how to make styling rly im sorry, but i have read it fully and i will apply it fully, thank you