Safety Memorandum

Safety & Security Memorandum

Raidbox™ (a service of Ox2 Net Corp)
Vancouver, British Columbia, Canada

1. Introduction

Internet security is not absolute — it is a continuous process and a shared responsibility.
At Raidbox, we take security seriously and operate with a defense-in-depth philosophy designed to protect, mitigate, detect, and respond to threats across all layers of our infrastructure.

This memorandum explains our security principles, operational practices, and legal boundaries, so customers clearly understand what we protect, how we protect it, and where responsibility is shared.


2. Our Vision

Raidbox is not merely a hosting provider.
We aim to be a responsible infrastructure operator within the global internet ecosystem.

Our objectives are to:

  • Protect client environments using multi-layer security controls

  • Maintain service availability and integrity

  • Prevent abuse that could harm other networks or users

  • Respect privacy, lawful use, and due process

We defend customer privacy and data to the fullest extent permitted by law, and we act only on verified evidence and lawful requests.


3. Security Model & Infrastructure Protection

Raidbox operates a multi-layer, military-grade inspired security architecture, including but not limited to:

a) Network & Perimeter Security

  • Segmented network zones (public, management, internal)

  • Stateful firewalls at:

    • Edge gateway

    • Hypervisor layer

    • Virtual machine / container layer

  • DDoS mitigation and traffic anomaly detection

  • Controlled ingress/egress routing

b) Platform & Virtualization Security

  • Hardened Linux hosts

  • Isolated virtualization environments

  • Mandatory access controls

  • Continuous system monitoring and logging

c) Application & Service Security

  • Pre-hardened WordPress environments (where applicable)

  • Malware detection and abuse prevention systems

  • Secure provisioning pipelines

  • Least-privilege access enforcement

d) Operational Security

  • 24/7 monitoring

  • Incident detection and response procedures

  • Regular patching and configuration reviews

Important Notice
While Raidbox employs industry-grade and military-inspired security practices, no system is bulletproof.
Absolute security does not exist in any digital environment.


4. Responsibility & Risk Disclaimer

Raidbox does not guarantee immunity from:

  • Zero-day vulnerabilities

  • Advanced persistent threats

  • User-caused misconfigurations

  • Credential compromise

  • Software flaws outside our control

By using Raidbox services, you acknowledge that:

  • You are responsible for your application data, credentials, and backups unless otherwise specified in a written agreement

  • Raidbox is not liable for data loss, corruption, unauthorized access, or service interruption except where required by applicable law

We strongly recommend:

  • Independent backups

  • Strong authentication practices

  • Secure application configuration


5. Client Data Protection & Privacy

  • Raidbox does not inspect or access customer content

  • Data is processed only to deliver services or comply with lawful obligations

  • Access to systems is restricted, logged, and audited

  • Data minimization principles are enforced

We respect:

  • GDPR (EU Regulation 2016/679)

  • PIPEDA (Canada)

  • Applicable U.S. privacy laws where relevant


6. Abuse Handling & Legal Compliance

Raidbox maintains clear, documented procedures for:

  • Abuse reports

  • Security complaints

  • Legal notices

Abuse reports are:

  • Acknowledged promptly

  • Investigated based on evidence

  • Handled with transparency and proportionality

Raidbox does not act as a judge or law enforcement authority.
Actions are taken only when:

  • Required by law

  • Supported by credible technical or legal evidence


7. Legal Framework & Jurisdiction

Raidbox services operate under and are governed by:

  • Laws of British Columbia, Canada

  • Applicable federal laws of Canada

  • Relevant United States federal laws when U.S.-based infrastructure or requests apply

  • International cooperation frameworks where legally required

Nothing in this memorandum constitutes:

  • A warranty of uninterrupted service

  • A guarantee of absolute data security

  • A waiver of statutory limitations or liabilities


8. Continuous Improvement & Ethical Cooperation

Security is a continuous process, not a final state.

Raidbox commits to:

  • Regular infrastructure improvements

  • Ongoing threat assessment

  • Ethical collaboration with security professionals

  • Responsible disclosure handling


9. Client Education & Shared Responsibility

We actively encourage clients to:

  • Use strong passwords and MFA

  • Keep applications updated

  • Monitor access logs

  • Follow security best practices

Security is strongest when provider and client work together.


10. Conclusion

Raidbox is committed to delivering secure, resilient, and professionally managed infrastructure, while remaining honest about the realities and limits of cybersecurity.

We defend, monitor, and protect —
but no digital system is invulnerable.

Raidbox will always act responsibly, transparently, and lawfully in protecting our infrastructure, our clients, and the broader internet.


Raidbox™
Secure Infrastructure. Transparent Operations.
A service of Ox2 Net Corp
Vancouver, British Columbia, Canada

en English