Many are not as straightforward as they first appear some even seem to be deliberately misleading and that is the very reason why we asked our own questions instead. They never get any information about our users. We believe our role is to provide a net-neutral internet access. This information is deleted immediately when an account is terminated. But with the hackers, it might often be alarming to work without necessary protection. This is for users who wish to seek assistance in the rare case of connection issues.
The information you are required to submit varies with the payment method selected. Apologies to the providers who contacted us at the last minute but were too late to be included in the report — we had to stop somewhere. We use Google Analytics, Zendesk for tickets, and Snapengage for live chat support. We use a service from Provide Support ToS for live support. Still, all the notices are ignored because they have no legal bearing to us as we only need to comply with Panamanian law.
Our client only keeps essential connection logs for the active session, once the session is disconnected the logs erase from memory. Those who fail to understand that are in need of remedial work on network architecture. With mobile virtual private network, users are allowed gain access to their company's resources on a trip. People will ask for more and more data retention as seen around the world in many countries recently. Your internet protocol address is private, private information, and you've got every right to disguise it from eavesdroppers who potentially may be deploying it against you. Some are just a simple checkbox, and others want a written reply. In all cases, our network nodes load over our encrypted network stack and run from ramdisk.
We do not disclose any information to 3rd parties and this can be done only in case of a certain lawsuit filed against our company. Because we do not host any content it is not possible for us to remove anything from a server. All this being said, we do not log and do not have any data on our customers other than their e-mail and account username. We do not monitor our users, period. Billing and Authentication are separate.
They are one of the few companies that do not make anonymity claims. We do not censor our servers, period. We also actively ensure no link is created to from the data in either system to any specific customer following a trial or purchase of our product. In times when data is lost, recovery is key. We therefore simply are not able to hand data out.
And we will always keep you informed of such communication, either via our transparency report, our network issues or our warrant canary. We have physical control over our servers. Active computer programs remain active even when there is really a change of wireless connection. We have physical control over our servers and network in Sweden. There is a record of the payment for the service and the billing information associated to the credit card confirming the service has been paid for.
As soon as you make a compromise, you are going down a slippery slope to surveilance. The answer is really a resounding yes, as long when you aren't doing it to aid you in illegal activities. We accept payments via Bitcoin, Credit Card and PayPal. There are also several software packages that can hide your online protocol address for you. If a valid court order comes in asking us to identify someone that is in our system, we would be required to provide that persons billing information.
From Provide support: Chat conversation transcripts are not stored on Provide Support chat servers. There is nothing to take down, as we are not a content host. We accept Bitcoin, Cash, PayPal and credit cards. We run an algorithm to randomly reboot each server on a regular basis so we can clear the ramdisk. It may also be a means for others to find out your location located geographically.
We do not store any other data about payments associated with the users account. In addition, you are able to access. So if one office suffers an outage, an alternative solution location able to accommodate the excess amount of staff can be utilised. What countries are your servers located in? This is definitely an area that we are actively looking at with the revision of our customer portal that is underway. Anyone taking control of the server would have no usable data on the disk. To put it in the most elementary terms, whatever you download on the Internet - including webpages themselves - consumes bandwidth.