Политика конфеденциальности
The TerraVPN Privacy Policy describes the general privacy practices TerraVPN. More privacy-related information for TerraVPN is provided below.
Additional information collected by TerraVPN Services
TerraVPN guarantees a strict no-logs policy for TerraVPN Services, meaning that your internet activity while using TerraVPN Services is not monitored, recorded, logged, stored or passed to any third party. We do not store connection time stamps, used bandwidth, traffic logs, IP addresses or browsing data. From the moment a TerraVPN user connects to one of our VPN servers, their internet data becomes encrypted. Any internet activity becomes no longer visible to ISP, third-party snoopers or cyber criminals.
In addition to the information provided in general Privacy Policy, we process the following data when you use TerraVPN Services:
Technical information
Statistical server load information. We monitor server performance (cpu, ram, servers net usage) to recommend the most suitable servers to our customers.
Username and a timestamp of the last session status. This information is used to limit the amount of concurrent active user sessions and is automatically deleted within 15 minutes after a session is terminated.
Connectivity information. To prevent abuse and to be able to dispute unfair chargebacks, we register whether the user has used the Service in the last 30 days. No personally identifiable information is collected in this case, apart from the fact that the Service was or was not used during the mentioned period.
Information collected on our applications
Application diagnostics. This aggregated and anonymized data helps us to identify problems related to our app performance and updates. The collected information includes crash error reports. You can opt-out of collection of application diagnostics data at any time by navigating TerraVPN app settings.
Anonymized telemetry data. We collect statistical information about the activity on your account: search, item rating and content viewed events, opened push notifications, etc. (in-app events). This analytical information provides knowledge of how our application is being used so we can improve the user experience and the app itself. You can opt-out of collection of anonymized app usage statistics at any time by navigating TerraVPN app settings.
Device information. As in case of when you visit our website, we collect some device information on our application too. Such information is logged automatically and may include the model of your device, operating system version and similar non-identifying information. We may use this information to monitor, develop and analyze the use of our Services.
Device identifiers. In some cases, we may record your mobile device’s identifier for marketing or analytics purposes. These identifiers are assigned to your device by the OS manufacturer and can be reset at any time from your device's settings. For instructions, see following policies for different devices: Advertising & Privacy on iOS devices and Managing your Google Settings on Android devices.
Threat Protection feature
TerraVPN offers a Threat Protection feature to its users. When enabled, this feature blocks ads, trackers, malicious websites and malware. The data processed about users of the Threat Protection feature depends on its use. Generally, we process only the data which helps us provide and improve the service.
In all cases the Threat Protection feature processes statistics about the use of the feature, such as the date of the last update of malicious items’ list, number of blocked entries and similar data. We process this data to gain knowledge of how the Threat Protection feature is used, so we can improve the user experience and the feature itself. You can opt-out of processing of such statistics at any time by navigating TerraVPN app settings.
URL scanning. The Threat Protection feature matches the URLs against the databases of already known items and, if found there, it blocks ads, trackers, phishing attempts and malicious websites. We are not able to tell which particular user interacted with the exact URL or website. The data that we process is the URL and its status (e.g., if it is blocked). This is necessary to perform and improve the service.
Initial file scanning. When the Threat Protection feature initially scans newly downloaded files, it is using a lightweight engine to determine if the file is malicious or not. At this point, the data is processed as follows:
Scan status. In order for us to be able to block harmful files, we process information if the file is malicious or not, and if the scanning was technically properly performed.
Connection information. The network connection is essential for the Threat Protection feature to perform smoothly, therefore we process limited data that helps us to determine the quality of the connection. Such data may include your country, time zone and the name of your internet service provider.
Deep file scanning. This option is only available for users that have enabled it. When the initial file scan cannot tell if a file is malicious, we upload a file to the cloud where we run a deep scan for malware detection. The deep file scanning applies only to executable files, meaning that we do not upload other types of files (such as .doc, .pdf, .jpg) to the cloud. When the file is uploaded to the cloud, we are not able to tell which particular user the file belongs to. After deep file scanning the scanned files are stored and used to improve our services.
Закрыть