At NyronProxies, we take your privacy seriously. This comprehensive privacy policy explains how your personal and non-personal data is collected, processed, stored, and protected when using our proxy services. We are committed to ensuring the highest standards of data privacy and security in accordance with global data protection regulations, including GDPR, CCPA, and other applicable laws. By using our services, you agree to the data practices outlined in this policy. We encourage you to read this document carefully to understand how we handle your information and the steps we take to safeguard it.
This Privacy Policy applies to all NyronProxies services, websites, applications, and platforms (collectively referred to as 'Services'). It covers all personal and non-personal data collected through our Services, regardless of the method of collection. Our services may contain links to or integrate with third-party websites, services, or applications that operate independently from NyronProxies. These third parties have their own privacy policies, and we strongly recommend reviewing their policies before engaging with them. We are not responsible for the privacy practices, data security measures, or content of any third-party services, even if accessed through our platform. As a proxy service provider, we take exceptional measures to ensure data privacy, but we cannot guarantee absolute protection against all potential vulnerabilities or unauthorized access attempts. By using our Services, you acknowledge these limitations and agree to use our services responsibly and in compliance with applicable laws.
To provide our proxy services effectively, we collect various types of information from our users. The specific data collected depends on the services you use, your interaction with our platform, and the legal requirements applicable to your region. 2.1 Account Information • Personal identifiers: Full name, username, email address • Account security data: Password (stored in encrypted format), two-factor authentication details • Contact information: Billing address, contact phone number (optional) • Profile information: Company name (for business accounts), job title, profile preferences 2.2 Payment Information • Payment details: Credit card information (stored securely by our payment processors), bank account details for wire transfers • Billing history: Transaction records, subscription details, payment timestamps • Tax information: VAT numbers, tax IDs (for business customers) 2.3 Technical Data • Device information: Device type, operating system, hardware version, unique device identifiers • Network data: IP addresses (source and destination), connection metadata, bandwidth usage statistics • Browser information: Browser type and version, plugins, time zone, language preferences • Service usage data: Proxy connection timestamps, session duration, data transfer volume, connection attempts • Performance data: Error reports, server response times, application crashes 2.4 Usage Logs and Proxy Activities • Connection logs: Time of connection, duration, connection type, protocol used, exit node information • Request logs: Websites accessed through our proxies (domain level only, not specific URLs or content) • Traffic patterns: Volume of data transferred, geographical distribution of connections • Error logs: Failed connection attempts, authentication failures, service interruptions 2.5 Customer Support Interactions • Support tickets: Content of your communications with our support team • Call recordings: Records of customer support calls (with prior notification) • Support history: Previous issues, resolution details, support agent notes We collect this information through various methods, including direct input from users, automated collection through our services and websites, and from third-party sources (such as payment processors, identity verification services, and fraud prevention tools).
We use the information we collect for various purposes related to providing, improving, and securing our proxy services. Here's a detailed explanation of how we use your information: 3.1 Service Provision and Improvement • Delivering our proxy services according to your subscription and preferences • Managing your account, processing payments, and sending service notifications • Analyzing usage patterns to improve our infrastructure and connection reliability • Developing new features and services based on user behavior and feedback • Troubleshooting technical issues and optimizing service performance • Providing personalized experiences based on your usage history and preferences 3.2 Security and Fraud Prevention • Verifying user identity and preventing unauthorized access to our services • Monitoring for suspicious activities that might indicate abuse of our platform • Detecting and preventing fraudulent transactions and account takeover attempts • Protecting our infrastructure against DDoS attacks and other security threats • Enforcing our Terms of Service and Acceptable Use Policy • Investigating potential violations of our policies or applicable laws 3.3 Communication and Support • Responding to your inquiries, support requests, and feedback • Sending essential service updates, maintenance notifications, and security alerts • Providing technical assistance and troubleshooting guidance • Conducting customer satisfaction surveys to improve our support services • Sending promotional communications (with your consent where required by law) • Notifying you about changes to our policies, terms, or service offerings 3.4 Legal and Compliance Purposes • Complying with applicable legal requirements and government regulations • Responding to legal process (such as subpoenas or court orders) • Establishing, exercising, or defending legal claims • Conducting audits related to privacy, security, and financial compliance • Meeting record-keeping obligations • Verifying compliance with our license agreements 3.5 Business Operations • Conducting internal research and development • Generating anonymized statistical data for market analysis • Planning infrastructure capacity and resource allocation • Managing vendor and partner relationships • Processing business transactions such as mergers or acquisitions • Creating aggregated or de-identified data sets that cannot reasonably identify you In all cases, we strive to limit our data processing to what is necessary for the specific purpose and maintain appropriate security measures to protect your information.
Protecting your information is a top priority at NyronProxies. We implement comprehensive technical, administrative, and physical security measures to safeguard your data against unauthorized access, disclosure, alteration, or destruction. 4.1 Technical Security Measures • Advanced Encryption: We utilize industry-standard TLS/SSL encryption for data in transit and AES-256 encryption for sensitive data at rest • Secure Infrastructure: Our servers are hosted in Tier III+ data centers with ISO 27001 certification and robust physical security controls • Network Protection: Implementation of firewalls, intrusion detection systems, and regular vulnerability scanning • Access Controls: Role-based access control with strict authentication requirements including multi-factor authentication for all administrative access • Secure Coding Practices: Regular security code reviews and penetration testing by internal and external security experts • Database Security: Data partitioning, encryption, and access logging for all sensitive information 4.2 Administrative Security Measures • Security Policies: Comprehensive information security policies aligned with ISO 27001 standards • Employee Training: Regular security awareness training for all staff members with access to customer data • Background Checks: Pre-employment screening for employees with access to sensitive systems • Confidentiality Agreements: Binding confidentiality obligations for all employees and contractors • Incident Response Plan: Documented procedures for identifying, responding to, and mitigating security incidents • Regular Audits: Internal and external security audits and compliance assessments 4.3 Physical Security Controls • Secure Data Centers: Our infrastructure is hosted in facilities with 24/7 security personnel, biometric access controls, and video surveillance • Equipment Security: Physical protection of servers and networking equipment against unauthorized access • Redundant Systems: Multiple layers of redundancy for power, cooling, and network connectivity • Disaster Recovery: Comprehensive backup systems and disaster recovery procedures 4.4 Security Testing and Verification • Vulnerability Management: Regular automated and manual security testing of our systems • Penetration Testing: Periodic penetration tests conducted by qualified third-party security firms • Security Monitoring: 24/7 monitoring for suspicious activities and potential security breaches • Compliance Validation: Regular verification of compliance with security standards and best practices 4.5 Third-Party Security • Vendor Assessment: Rigorous security assessment of third-party service providers • Data Protection Agreements: Contractual obligations requiring appropriate security measures by our vendors • Ongoing Monitoring: Regular review of third-party security practices and compliance Despite these comprehensive security measures, no method of electronic storage or transmission is 100% secure. We continuously improve our security practices as technology evolves, but we cannot guarantee absolute security. If you have reason to believe that your interaction with us is no longer secure, please contact us immediately.
NyronProxies uses cookies and similar tracking technologies to enhance your experience, analyze usage patterns, and optimize our services. This section explains how we use these technologies and your choices regarding their use. 5.1 What Are Cookies? Cookies are small text files that are placed on your device when you visit a website. They help recognize your device and remember certain information about your visit. Cookies can be "persistent" (remaining on your device until you delete them) or "session-based" (deleted when you close your browser). 5.2 Types of Cookies and Tracking Technologies We Use • Essential Cookies: Required for our services to function properly. They enable core functionality such as security, account authentication, and remembering your preferences. These cookies cannot be disabled. • Performance/Analytics Cookies: Help us understand how visitors interact with our website by collecting and reporting information anonymously. We use these insights to improve our platform and user experience. • Functionality Cookies: Allow our website to remember choices you make (such as your language preference or login details) to provide a more personalized experience. • Marketing/Advertising Cookies: Used to track visitors across websites to enable us to display relevant advertisements and measure their effectiveness. We use these only with your explicit consent where required by law. • Web Beacons and Pixels: Small graphic images that help us monitor user behavior and track campaign performance. • Local Storage: Similar to cookies but can store larger amounts of data and are stored in your browser. 5.3 Specific Cookies We Use • Authentication Cookies: Remember your login status and maintain your session • Preference Cookies: Store your language, region, and interface customizations • Security Cookies: Detect suspicious activities and protect against unauthorized access • Load Balancing Cookies: Distribute traffic across multiple servers for optimal performance • Analytics Tools: We use services like Google Analytics to understand how users interact with our platform 5.4 Third-Party Cookies Some cookies are placed by our third-party service providers, such as payment processors, analytics services, and marketing tools. These third parties may be able to link information collected through cookies with other information they hold about you. 5.5 Your Cookie Choices You have several options to control or limit how we and our partners use cookies: • Browser Settings: Most browsers allow you to refuse or accept cookies and to delete existing cookies • Cookie Preference Center: Our website includes a cookie management tool that allows you to selectively enable or disable non-essential cookies • Do Not Track: We honor Do Not Track signals from browsers where technically feasible • Opt-Out Links: Where applicable, we provide links to opt out of analytics tracking Please note that disabling certain cookies may impact your experience on our website, as some features may not function properly without cookies. 5.6 Cookie Policy Updates We may update our cookie practices over time. We encourage you to periodically review this section for the latest information on our cookie practices.
NyronProxies limits the sharing of your personal information with third parties to specific circumstances that are necessary for our business operations, compliance with legal obligations, or with your explicit consent. This section details how, when, and why we share your data with third parties. 6.1 Categories of Third Parties • Service Providers: Companies that provide services on our behalf, such as: - Payment processors and billing services - Customer support and help desk platforms - Cloud infrastructure and hosting providers - Analytics and monitoring services - Email delivery and communication tools - Security and fraud prevention services • Business Partners: In limited circumstances, we may share data with: - Resellers and distribution partners authorized to sell our services - API integration partners that connect with our proxy services - Identity verification services for KYC (Know Your Customer) requirements • Legal and Regulatory Authorities: - Government agencies and law enforcement when required by law - Regulatory bodies during compliance investigations - Courts and opposing parties in litigation • Corporate Transactions: - Potential buyers or investors in the event of a business sale, merger, or acquisition - Professional advisors related to business transactions (attorneys, accountants, etc.) 6.2 Information We Share The specific information shared depends on the third party and the purpose of sharing, but may include: • Account information necessary for service provision • Payment information required for transaction processing • Usage data for analytics and service improvement • Contact information for support and communication • Technical information for troubleshooting and security We never sell your personal information to third parties for marketing purposes. 6.3 Legal Basis for Sharing We share personal information with third parties only when: • Necessary to fulfill our contractual obligations to you • Required to comply with legal obligations • Based on our legitimate business interests (and your rights don't override these interests) • You have given explicit consent • Necessary to protect vital interests or for public interest reasons 6.4 Data Protection Safeguards When sharing information with third parties, we implement appropriate safeguards: • Data Processing Agreements: Requiring third parties to maintain confidentiality and implement appropriate security measures • International Transfer Mechanisms: Such as Standard Contractual Clauses for transfers outside the EEA • Vendor Assessment: Evaluating security practices and compliance of potential partners • Access Limitations: Restricting access to only what is necessary for the specific service • Ongoing Compliance Monitoring: Regular review of partner practices 6.5 Third-Party Privacy Policies Third parties that receive your information from us have their own privacy policies. We encourage you to review these policies, as their data practices will apply to information we share with them. While we carefully select our partners, we cannot be responsible for their subsequent handling of your information. 6.6 Aggregated and De-identified Data We may share aggregated or de-identified information that cannot reasonably be used to identify you with third parties for market research, analytics, and industry benchmarking purposes.
NyronProxies respects and upholds your rights regarding your personal information. Depending on your location, you may have specific rights under applicable data protection laws such as the EU General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and similar regulations worldwide. 7.1 Rights for All Users Regardless of your location, we provide all users with certain fundamental rights: • Access to your personal information • Correction of inaccurate data • Account deletion and data removal • Opt-out of marketing communications 7.2 Rights Under GDPR (For EEA Residents) If you are located in the European Economic Area (EEA), you have the following specific rights: • Right to Access: You can request a copy of all personal data we hold about you and information about how we process it. • Right to Rectification: You can request correction of inaccurate personal information or completion of incomplete information. • Right to Erasure (Right to be Forgotten): You can ask us to delete your personal information in certain circumstances, such as when it's no longer necessary for the purpose it was collected. • Right to Restriction of Processing: You can request that we temporarily or permanently stop processing some or all of your personal information. • Right to Data Portability: You can request to receive your personal information in a structured, commonly used, machine-readable format for transfer to another provider. • Right to Object: You can object to our processing of your personal information based on our legitimate interests, direct marketing, or for research/statistical purposes. • Rights Related to Automated Decision-Making: You have the right not to be subject to decisions based solely on automated processing that significantly affect you, unless necessary for our contract or you provide explicit consent. • Right to Withdraw Consent: Where we process data based on your consent, you can withdraw that consent at any time. 7.3 Rights Under CCPA/CPRA (For California Residents) If you are a California resident, you have the following rights: • Right to Know: You can request information about the categories and specific pieces of personal information we have collected, the sources of collection, our purpose for collection, and the categories of third parties with whom we share data. • Right to Delete: You can request deletion of personal information we have collected from you, subject to certain exceptions. • Right to Opt-Out of Sale or Sharing: You can direct us not to sell or share your personal information with third parties for cross-context behavioral advertising purposes (note that NyronProxies does not sell personal information as defined by the CCPA). • Right to Correct: You can request correction of inaccurate personal information. • Right to Limit Use of Sensitive Personal Information: You can limit our use of certain sensitive personal information. • Right to Non-Discrimination: We will not discriminate against you for exercising your rights under the CCPA. 7.4 How to Exercise Your Rights To exercise any of these rights: • Submit a request through our Privacy Rights Request Form on our website • Email us at [email protected] with the subject line "Privacy Rights Request" • Contact our Data Protection Officer at [email protected] For security purposes, we may need to verify your identity before processing your request. We will respond to all legitimate requests within the timeframes required by applicable law (typically 30 days under GDPR or 45 days under CCPA, with possible extensions). 7.5 Limitations and Exceptions Your rights may be subject to limitations and exceptions under applicable law. For example, we may retain certain information despite a deletion request if required by law, necessary for legitimate business purposes, or to protect our legal rights. 7.6 Complaints to Supervisory Authorities If you are dissatisfied with our response to your request or how we process your personal information, you have the right to complain to a data protection supervisory authority in your country of residence or place of alleged infringement.
NyronProxies maintains a comprehensive data retention policy to ensure we keep your personal information only for as long as necessary to fulfill the purposes for which it was collected, to comply with legal obligations, or to protect our legitimate business interests. 8.1 Retention Periods The length of time we retain different types of data varies based on several factors: • Account Information: We retain basic account information (name, email, account history) for the duration of your relationship with us and for a defined period afterward (typically 24 months) to handle any follow-up inquiries or issues. If you haven't used our services for an extended period, we may contact you to confirm your continued interest before retention. • Payment Information: We retain transaction records for financial and tax reporting purposes for up to 7 years as required by applicable accounting and tax laws. Detailed payment instrument information (like credit card numbers) is only stored by our payment processors according to their retention policies. • Usage Data and Logs: Connection logs and proxy usage data are retained for a shorter period (typically 30-90 days) for security monitoring, fraud detection, and debugging purposes. After this period, such data is either deleted or fully anonymized for statistical analysis. • Support Interactions: Customer support communications and tickets are retained for 24 months after resolution to maintain service continuity and improve customer experience. • Marketing Preferences: If you opt out of marketing communications, we maintain a record of this preference indefinitely to ensure compliance with your request. • Cookies and Tracking Data: Session cookies expire when you close your browser. Persistent cookies typically have varying lifespans from 30 days to 12 months depending on their purpose. 8.2 Criteria for Determining Retention Periods We determine appropriate retention periods based on: • Legal Requirements: Mandatory retention periods under applicable laws and regulations • Contractual Obligations: Requirements to maintain records under our service agreements • Operational Necessity: Time needed for billing, account management, and service delivery • Security Considerations: Period necessary for detecting and investigating security incidents • Legitimate Business Interests: Time required for business analytics, planning, and improvement • User Expectations: Reasonable expectations regarding how long data should be retained 8.3 Data Minimization and Review We regularly review our data holdings to identify information that is no longer necessary. Our retention policy includes periodic data minimization efforts to limit the scope of information we maintain. 8.4 Data Deletion and Anonymization When retention periods expire, personal information is either: • Securely deleted using industry-standard deletion methods • Anonymized by removing all identifying elements so the remaining information cannot be associated with an individual • Aggregated into statistical formats that do not permit individual identification 8.5 Data Backup and Recovery For disaster recovery purposes, information may remain in our backup systems for up to 30 days after deletion from active systems. During this period, we maintain security controls to protect this information but do not actively process it. 8.6 Retention for Legal Proceedings If we receive a legal hold notice, are involved in litigation, or anticipate legal proceedings, we may need to retain certain information beyond our standard retention periods until the matter is resolved.
As a global proxy service provider, NyronProxies operates internationally and may transfer your personal information across national borders. This section explains how we handle international data transfers in compliance with applicable data protection laws. 9.1 Our Global Infrastructure Our services are provided through a distributed network of proxy servers located in various countries worldwide. Additionally, we use cloud service providers and other vendors that may process data in different jurisdictions. As a result, your information may be transferred to, stored, and processed in countries other than your country of residence. 9.2 Data Transfer Mechanisms When transferring personal data from the European Economic Area (EEA), United Kingdom, Switzerland, or other regions with data protection laws that restrict international transfers, we implement appropriate safeguards in accordance with applicable legal requirements. These include: • Standard Contractual Clauses (SCCs): We use EU-approved Standard Contractual Clauses in our agreements with third parties receiving data from the EEA. These clauses contractually bind the recipient to provide adequate protection for personal data. • Adequacy Decisions: Where available, we transfer data to countries that have been recognized by relevant authorities (such as the European Commission) as providing adequate protection for personal data. • Binding Corporate Rules: In some cases, we may rely on the Binding Corporate Rules of our corporate partners for intra-group transfers. • Consent: Where appropriate and permitted by law, we may rely on your explicit consent for specific transfers after informing you of the potential risks. • Necessity for Contract Performance: We may transfer data internationally when necessary to fulfill our contract with you or to implement pre-contractual measures at your request. 9.3 Risk Assessment and Additional Safeguards Before engaging in international transfers, we conduct transfer impact assessments to evaluate the level of protection in the destination country. Based on these assessments, we implement supplementary measures when necessary, such as: • Enhanced encryption for data in transit and at rest • Pseudonymization or de-identification where feasible • Strict access controls and data minimization practices • Regular audits of data recipients' privacy practices • Technical restrictions limiting access to data from certain regions 9.4 Countries Where Your Data May Be Processed While our primary operations are based in [Primary Country], your data may be processed in any of the countries where: • We maintain offices or facilities • Our proxy server infrastructure is located • Our cloud service providers or other vendors operate • Our corporate affiliates or subsidiaries are located The specific countries may change over time as we expand our operations or modify our infrastructure. A current list of countries where we maintain proxy servers is available on our website. 9.5 Data Protection Standards Regardless of where your information is processed, we apply the same level of protection as described in this Privacy Policy. We ensure that any third party that processes data on our behalf adheres to data security standards consistent with our commitments to you. 9.6 Your Rights Regarding International Transfers If you have concerns about international transfers of your data, you may: • Request information about the countries where your data is processed • Ask for a copy of the safeguards we have implemented for specific transfers • Where feasible, request that your data be processed only in certain regions To make such requests, please contact our Data Protection Officer as described in the "User Rights" section.
NyronProxies services are designed for adults and business users, not for children. We take children's privacy protection seriously and comply with applicable laws regarding the collection of data from minors. 10.1 Age Restrictions Our services are not directed to, intended for, or designed to attract individuals under the age of 18. Specifically: • We do not knowingly collect or solicit personal information from anyone under the age of 13 in the United States or under the applicable minimum age in other jurisdictions. • Users between the ages of 13 (or the applicable minimum age in the user's jurisdiction) and 18 may only use our services with the involvement, supervision, and approval of a parent or legal guardian. • The registration process for our services requires users to confirm they are at least 18 years old or have parental consent. 10.2 Parental Consent If a parent or guardian becomes aware that their child has provided us with personal information without their consent, they should contact us immediately. We will take steps to remove such information from our systems as soon as reasonably possible. 10.3 Discovery of Child Data If we discover that we have collected personal information from a child under the applicable minimum age without verifiable parental consent, we will: • Immediately discontinue processing such information • Delete the information from our records as soon as possible • Take reasonable measures to ensure similar information is not collected in the future 10.4 Educational or School Context We do not offer services directly to educational institutions for use by students. If our services are being used in an educational context involving students under 18, it is the responsibility of the educational institution to obtain appropriate parental consent as required by applicable laws, including the Children's Online Privacy Protection Act (COPPA) in the United States and similar regulations in other countries. 10.5 Features Designed to Protect Children To help prevent the inadvertent collection of children's data, we have implemented various protective measures: • Age-screening mechanisms during account creation • Terms of Service that explicitly prohibit use by individuals under the minimum age • Monitoring systems designed to detect and prevent account creation by minors • Employee training on handling data potentially belonging to children 10.6 Compliance with Children's Privacy Laws We are committed to complying with all applicable children's privacy protection laws, including: • Children's Online Privacy Protection Act (COPPA) in the United States • Age Appropriate Design Code in the United Kingdom • General Data Protection Regulation (GDPR) provisions relating to children in the EU • Similar regulations in other jurisdictions where we operate If you have questions about our practices regarding children's data, please contact our Data Protection Officer at [email protected].
NyronProxies may update this Privacy Policy from time to time to reflect changes in our practices, services, legal requirements, or other factors. This section explains how and when we make changes to our Privacy Policy and how we will notify you of these changes. 11.1 Types of Changes Changes to our Privacy Policy may include: • Substantive Changes: Material modifications that affect how we collect, use, share, or otherwise process your personal information. Examples include collecting additional categories of data, using data for new purposes, sharing data with new categories of third parties, or changes to your privacy rights and choices. • Non-Substantive Changes: Minor updates that do not materially affect your privacy rights, such as correcting typographical errors, updating contact information, clarifying existing practices, or reorganizing content for improved readability. 11.2 Notification Methods We will inform you about changes to our Privacy Policy through various methods, depending on the nature of the changes: • For Substantive Changes: - Prominent notice on our website before the changes take effect - Email notifications to registered users (for significant changes) - In-app notifications or alerts when applicable - Account dashboard notifications upon login - Special announcements for major policy overhauls • For Non-Substantive Changes: - Updated policy posted on our website - Updated "Last Modified" date at the top of the Privacy Policy 11.3 Timing of Notifications For substantive changes, we will typically provide notice at least 30 days before the changes take effect, where feasible and unless a shorter notice period is required by law or necessary for security reasons. This gives you an opportunity to review the changes and decide whether to continue using our services under the updated terms. 11.4 Prior Versions When we make substantive changes, we maintain archives of previous versions of our Privacy Policy for your reference. You may request access to these prior versions by contacting our Data Protection Officer. 11.5 Your Choices When We Update the Policy When we make substantive changes to our Privacy Policy, you may have certain choices: • Continuing to use our services after the changes take effect constitutes your acceptance of the updated policy. • If you do not agree with the changes, you may need to discontinue using our services. In some cases, this may involve canceling your account according to our Terms of Service. • Where legally required or appropriate, we may seek your explicit consent for certain changes. 11.6 Regulatory Compliance We review and update our Privacy Policy to ensure ongoing compliance with evolving data protection laws and regulations worldwide. When new legal requirements come into effect, we may update our policy even if our actual data practices have not changed. 11.7 Questions About Policy Changes If you have questions or concerns about any changes to our Privacy Policy, please contact our Data Protection Officer at [email protected]. We are committed to addressing your inquiries and providing clarification about our privacy practices.
Last Updated: February 2024
For privacy-related inquiries, please contact us at [email protected]