Privacy Policy

At TREJJ Communications Limited (trade name TREJJCOMMS), we value your privacy and strive to provide you with a personalized and secure experience. To enhance transparency regarding the collection and use of your personal information, please review our privacy and data retention policy outlined below.

What Personal Information About Customers Does TREJJCOMMS Gather?

The information we learn from customers helps us personalize and continually improve your TREJJ Communications Limited. (trade name TREJJCOMMS) experience. Here are the types of information we gather.

Information You Give Us:

We receive and store any information you enter on our Web site or give us in any other way. You can choose not to provide certain information, but then you might not be able to take advantage of many of our features. We use the information that you provide for such purposes as responding to your requests, customizing future shopping for you, improving our stores, and communicating with you.

Automatic Information:

We receive and store certain types of information whenever you interact with us. For example, like many Web sites, we use “cookies,” and we obtain certain types of information when your Web browser accesses TREJJCOMMS or advertisements and other content served by or on behalf of TREJJCOMMS on other Web sites.


When you download or use apps created by TREJJCOMMS or our subsidiaries, we may receive information about your location and your mobile device, including a unique identifier for your device. We may use this information to provide you with location-based services, such as advertising, search results, and other personalized content. Most mobile devices allow you to turn off location services.

E-mail Communications:

To help us make e-mails more useful and interesting, we often receive a confirmation when you open e-mail from TREJJCOMMS if your computer supports such capabilities. We also compare our customer list to lists received from other companies, in an effort to avoid sending unnecessary messages to our customers. If you do not want to receive e-mail or other mail from us, please adjust your Customer Communication Preferences.

Information from Other Sources:

We might receive information about you from other sources (such as from online marketplaces) and add it to our account information.

What About Cookies?

Cookies are unique identifiers that we transfer to your device to enable our systems to recognize your device and to provide features such as 1-Click purchasing, Recommended for You, personalized advertisements on other Web sites and storage of items in your Shopping Cart between visits.

The Help feature on most browsers will tell you how to prevent your browser from accepting new cookies, how to have the browser notify you when you receive a new cookie, or how to disable cookies altogether. Additionally, you can disable or delete similar data used by browser add-ons, such as Flash cookies, by changing the add-on’s settings or visiting the Web site of its manufacturer. Because cookies allow you to take advantage of some of TREJJCOMMS essential features, we recommend that you leave them turned on. For instance, if you block or otherwise reject our cookies, you will not be able to add items to your Shopping Cart, proceed to Checkout, or use any TREJJCOMMS products and services that require you to Sign in.

Does TREJJCOMMS Share the Information It Receives?

Information about our customers is an important part of our business, and we are not in the business of selling it to others. We share customer information only as described below and with subsidiaries TREJJCOMMS, Inc. controls that either are subject to this Privacy Notice or follow practices at least as protective as those described in this Privacy Notice.

Affiliated Businesses We Do Not Control:

We work closely with affiliated businesses. In some cases, these businesses operate stores at TREJJCOMMS or sell offerings to you at TREJJCOMMS. In other cases, we operate stores, provide services, or sell product lines jointly with these businesses. You can tell when a third party is involved in your transactions, and we share customer information related to those transactions with that third party.

Business Transfers:

As we continue to develop our business, we might sell or buy stores, subsidiaries, or business units. In such transactions, customer information generally is one of the transferred business assets but remains subject to the promises made in any pre-existing Privacy Notice (unless, of course, the customer consents otherwise). Also, in the unlikely event that TREJJCOMMS, Inc., or substantially all of its assets are acquired, customer information will of course be one of the transferred assets.

Protection of TREJJCOMMS and Others:

We release accounts and other personal information when we believe release is appropriate to comply with the law; enforce or apply our Conditions of Use and other agreements; or protect the rights, property, or safety of TREJJCOMMS, our users, or others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction. Obviously, however, this does not include selling, renting, sharing, or otherwise disclosing personally identifiable information from customers for commercial purposes in violation of the commitments set forth in this Privacy Notice.

With Your Consent:

Other than as set out above, you will receive notice when information about you might go to third parties, and you will have an opportunity to choose not to share the information.

Data Retention and Inactive Accounts:

To ensure the security and relevance of our services, we have implemented a data retention policy. Inactive accounts, with no active service for 90 days, will be closed, and associated data will be deleted. If your account becomes inactive, you will need to set up a new account and order a new service to resume using our website.

Why host with us?
Uptime Guaranteed

We use the best hardware and network available, which allows us to guarantee a 99.99% uptime. We don't just say it, we do it!

Daily Automatic Backups

Do not worry about your site getting compromised, hacked or accidentally getting deleted. We take backups every day and we can easily restore it!

24/7 Support

Our team consists of IT professionals in software and hardware related problems allowing us to keep the quality of our support top-notch.

Instant Activation

We guarantee that all virtual services will be up and running within 5 minutes. We will send an activation mail to your email address to this effect.

High Speed Network

Our data center's internal network is based on fiber optic connections, allowing almost zero latency.


Flexible monthly contracts ensure that you're never out of budget. While getting high quality service.

Frequently Asked Questions
With a VPS (virtual private server), companies and individuals can hire a real server that has been divided into several virtual servers. Each virtual server on the same physical server has its own operating system, CPU, memory, and disk space, creating an isolated environment from the other virtual servers. Because to this, organizations and people can have a dedicated server without having to pay for the full physical server. This is a clear and concise explanation of what a VPS is.
Windows VPS hosting is a type of Virtual Private Server (VPS) hosting that uses the Windows operating system as its foundation. With Windows VPS hosting, the physical server is partitioned into multiple virtual servers using virtualization technology. Each virtual server operates independently with its own dedicated resources, such as CPU, RAM, storage, and an individual Windows-based operating system. Advantages of Windows VPS Hosting Familiarity: Windows is a widely used operating system, and many users are already familiar with its interface and management tools, making it easier to manage and maintain the VPS. Compatibility: Windows VPS server supports various Microsoft technologies, such as ASP.NET, MSSQL, Microsoft Exchange, and Microsoft Access, which are essential for running specific applications and websites. User-Friendly: The Windows operating system is known for its user-friendly graphical user interface (GUI), making it easier for users to manage their VPS without extensive command-line knowledge. Remote Desktop Access: Windows VPS provides Remote Desktop access, allowing users to manage their servers remotely with ease. Support: Windows VPS server is backed by Microsoft's support, ensuring that users have access to updates and patches. Windows VPS hosting is an excellent choice for businesses and individuals who rely on Microsoft technologies, prefer a user-friendly interface, or require Remote Desktop access for managing their server.
Linux VPS hosting is a type of Virtual Private Server (VPS) hosting that uses the Linux operating system as its foundation. In a Linux VPS environment, the physical server is partitioned into multiple virtual servers using virtualization technology. Each virtual server operates independently with its own dedicated resources, such as CPU, RAM, storage, and an individual Linux-based operating system. Advantages of Linux VPS Hosting Open-Source: Linux is an open-source operating system, which means it's free to use and has a large community of developers contributing to its development and security. Flexibility and Customization: Linux offers a wide range of distributions, such as Ubuntu, CentOS, and Debian, allowing users to choose the one that best fits their requirements. It also supports various web hosting control panels like cPanel/WHM and Plesk. Stability and Performance: Linux is known for its stability, making it a reliable choice for hosting websites and applications. It often delivers better performance than its counterparts due to its efficient resource management. Security: Linux has a strong security track record, and its open-source nature allows for continuous security updates and patches. Linux VPS hosting is an excellent choice for web developers, system administrators, and users familiar with Linux environments or those who prefer open-source solutions.
You can use a Virtual Private Server (VPS) for a variety of purposes, including: Running a high-traffic website Running multiple applications (Docker Container, Node.js, Git, Laravel) Hosting a file server Hosting a database server Hosting a game server Testing new environments Hosting private backups Hosting an email server Use as Forex VPS Hosting a VPN server Browsing the internet and using it as a home computer And many more
1. First, choose the operating system you want for your VPS. 2. Select a plan that best fits your business requirements. 3. Choose your preferred server location 4. Select your desired payment method and proceed to checkout. 5. After completing the payment, check your email for your VPS details. All VPS services are provisioned instantly after payment.
The short answer is Yes. Due to the growth of the internet and hence the depletion of IPv4 addresses, we have started providing IPv6 addresses with all our Linux VPS. You will be given an IPv4 and an IPv6 address for all our Linux VPS servers.
Yes, you can change your operating system whenever you wish to. This can be done with ease from our VPS management control panel. You can access the control panel by logging into the TREJJCOMMS client area. Usually, changing a Linux OS takes around 45 seconds. Once the OS is changed, all the server data will be cleared out, and you will get a fresh server with the new OS.
Yes. You can use your custom operating system for KVM Instances. You can upload your custom OS ISO file when you log in to our client area and get to the VPS Management control panel. Complete the installation, and your OS will be installed on your brand-new VPS.
Yes. We do provide VNC access to all our Linux VPS hosting clients. You can access your server by logging into our client area and going to the VPS management control panel. From here, you will get the chance to access your server via VNC (Virtual Network Computing).
On the internet, the most important thing is data, and we know this is a very critical issue for all our clients. We use SSD hard drives with RAID 10 Configuration to guarantee data security on our servers. RAID technology helps us to keep data secure even if we lose some of our SSD drives. Your data will be secured in all our VPS hosting servers.
For our VPS services at TREJJCOMMS, we use both Openvz and KVM (Kernel-based Virtual Machine) virtualization technologies. Our cutting-edge virtualization systems guarantee our customers the best possible experience with their Virtual Private Servers by offering outstanding performance, isolation, and flexibility.
We at TREJJCOMMS are proud to accept Bitcoin as a payment method for our VPS services.
What Our Customers Say
Switching From Another Host?
Our dedicated Migrations Team is standing by to transfer your existing content from your prior host and configure it to perform optimally on our platform. We can also transfer domain registrations from other registrars in order to provide you complete management of your entire online portfolio all in one place!

Contact Us