Digital Sovereignty & Privacy Policy

  • Home /
  • Digital Sovereignty & Privacy Policy

Effective Date: February 25th, 2026

1. Our Sovereign Commitment

At FOSSadmin, we don’t just “protect” your privacy—we champion your Digital Sovereignty. We believe that data ownership is a fundamental right. Unlike traditional service providers that treat your data as a secondary concern, we architect our systems to ensure that you remain the sole owner and arbiter of your digital life.

2. Principles of Data Sovereignty & Minimization

We adhere to the principle of “Privacy by Default” and “Sovereignty by Design.” This means:

  • No Harvesting: We never collect data for the purpose of selling or profiling.
  • Zero-Knowledge: Where possible, we utilize tools and encryption methods that ensure we cannot see your sensitive data even while managing your systems.
  • Sovereign Infrastructure: We prioritize hosting services on infrastructure you own or control, rather than third-party “black box” platforms.
  • Minimal Logging: We only retain the absolute minimum amount of data required to provide our services and ensure security.

3. Information We Collect (And Why)

To provide our managed services, we may interact with:

  • Contact Information: Name, email, and communication handles (we prioritize Signal/Matrix) for service delivery and support.
  • Technical Metadata: Basic system logs and performance metrics required for 24/7 monitoring and fault analysis.
  • Billing Data: Information necessary to process payments for our services.

4. Data Sharing and Independence

  • No Third-Party Sales: We do not sell, rent, or trade your personal information. Period.
  • Sub-processors: We only utilize third-party service providers (e.g., bare-metal hosting) that meet our high standards for privacy and security.
  • Legal Requests: We will resist any unlawful requests for data to the fullest extent of the law and will notify you of any such requests unless legally prohibited from doing so.

5. Sovereign Security

We implement enterprise-grade, open-source security measures, including:

  • Full Disk Encryption (FDE) on managed devices.
  • End-to-End Encryption (E2EE) for all sensitive communications.
  • Hardware Hardening to minimize the attack surface of your infrastructure.
  • No Backdoors: We never include or allow backdoors in the systems we build for you.

6. Your Sovereign Rights & Control

Because we believe in sovereignty, you have total control:

  • Access & Portability: You can request a full “Sovereignty Handover” package at any time, containing your credentials and data in open formats.
  • No Vendor Lock-in: Our systems are built to be portable. You are never “trapped” in our ecosystem.
  • Erasure: We will purge your data upon request, subject only to legal retention requirements.
  • Audit: As we use open-source tools, you have the right and ability to audit the software we use to manage your systems.

7. Changes to This Policy

We may update this policy as we find new ways to better protect your sovereignty. Significant changes will be communicated directly to active clients.

8. Contact Our Sovereign Support

If you have questions about your privacy or wish to exercise your rights, please reach out via our secure channels.

Contact