Ethical Web Data Collection

Our commitment to responsible, transparent, and compliant proxy services

Our Core Principles

🤝

Consent-Based Network

All IP addresses in our residential and mobile pools come from users who have explicitly opted in to share their bandwidth. We never use compromised devices or botnets.

🔒

Privacy First

We implement strict data protection measures. User data is never sold, shared with third parties, or used for any purpose beyond providing proxy services.

⚖️

Legal Compliance

Our services are designed for legitimate business purposes only. We comply with GDPR, CCPA, and other data protection regulations worldwide.

🌐

Respect for Websites

We encourage our users to respect robots.txt directives, implement reasonable request rates, and only collect publicly available data.

🔍

Transparency

We maintain clear documentation about our practices and are committed to honest communication with our customers, partners, and the public.

🛡️

Security Standards

We implement industry-standard security measures including encryption, access controls, and regular security audits to protect our infrastructure and users.

Acceptable Use Policy

✓ Allowed Use Cases

  • Market research and competitive intelligence
  • Price monitoring and comparison
  • Ad verification and brand protection
  • Academic and scientific research
  • SEO monitoring and SERP tracking
  • Testing website accessibility across regions
  • Aggregating publicly available information
  • Social media analytics (public data only)

✗ Prohibited Activities

  • Any illegal activities
  • Unauthorized access to private accounts
  • Scraping personal data without consent
  • Violating website terms of service maliciously
  • DDoS attacks or network abuse
  • Fraud, identity theft, or impersonation
  • Distribution of malware or spam
  • Any activity that harms individuals or organizations

Compliance & Data Protection

GDPR Compliance

We process data in accordance with the General Data Protection Regulation. Users can request data access, correction, or deletion at any time.

KYC/AML Policies

We implement Know Your Customer and Anti-Money Laundering policies. All enterprise customers undergo verification to prevent misuse.

Data Retention

We retain only essential operational data and logs for security purposes. Personal data is deleted upon account closure per user request.

Incident Response

We have established procedures for handling security incidents and will notify affected parties in accordance with applicable regulations.

How We Source Our IPs

1

Explicit Consent

Users voluntarily opt-in to our network through partner applications. Clear disclosure is provided about how their bandwidth will be used.

2

Fair Compensation

Participating users receive compensation or benefits in exchange for sharing their bandwidth. This creates a transparent, mutually beneficial relationship.

3

Easy Opt-Out

Users can withdraw from our network at any time with immediate effect. We respect user autonomy and make the opt-out process simple.

4

Regular Audits

We conduct regular audits of our network to ensure all IPs are ethically sourced and no compromised devices are included.

Questions About Our Ethics Policy?

We're committed to transparency. If you have questions about our practices, please reach out.

We eat cookies. Read more about Cookies Policy