Privacy and Data Use Policy

The use of your personal data is covered by this policy. We take your privacy seriously and will take all reasonable measures to protect your personal information. Furthermore, depending on the payment method, all that is required is a valid e-mail address and a username when signing up. You are free to provide any additional information at your discretion (for example, a name if you don’t want us to refer to you as Mr/Ms X).

Our customer database maintained by our company records your e-mail, your order date and the date and method of payment, and any other additional information you have chosen to provide upon signup.

Any personal information received will only be used to fill your order. We will not sell or redistribute your information to anyone unless required by law. We may use analytics on our website to help us to understand where our customers are coming from; however, no personally identifiable information is captured (such as a name, email address, or billing information).

We do not condone criminal or illegal activities, especially when they relate to crimes such as terrorist activities, child pornography, blackmail, online harassment/bullying, or any other activities that threaten people’s personal safety or ruin people’s lives. Please do not use our service if you intend to do any of the above.

Policy on User Activity Logs and Monitoring

Our service is committed to maintaining the privacy and security of our users. We do not keep logs of user activity, including user access, DNS requests, timestamps, bandwidth usage, or IP addresses. However, we do monitor the general overall traffic of the server and the number of connections to ensure the smooth functioning of our services.

We monitor the general traffic and number of connections on our servers to identify any unusual activity. This monitoring is not done on an individual level but rather as a measure to maintain the integrity and performance of our services.

If we notice unusual activity on our servers, such as high bandwidth loading, a high number of connections, or increased CPU usage, or if we receive a specific complaint related to hacking or spamming, we may temporarily enable logs to identify and address the abuse. This temporary logging is a last resort and is only used to ensure the integrity of our services. Once the offending user is identified, we will:

  • Terminate the offending user
  • Issue an email to the user explaining the reason for termination
  • Wipe the logs from our system

Temporary logging is rarely used, having occurred only a handful of times in our many years of operation. When implemented, logs are enabled for no more than a few hours and only for the specific server experiencing abuse. The information gathered is solely for the purpose of terminating the offending user and is not disclosed to third parties.

We do not condone or tolerate any criminal or illegal activities, especially those related to terrorism, child pornography, blackmail, online harassment, or any activities that threaten personal safety or ruin lives. Users intending to engage in such activities should not use our services. Our commitment to user privacy does not extend to protecting illegal actions, and we will take necessary measures to prevent and address such misuse of our platform.

Our approach to user activity monitoring and logging is designed to balance privacy with the need to maintain the security and integrity of our services. By adhering to this policy, we aim to provide a safe and reliable environment for all users while taking appropriate actions against those who misuse our platform.

Under what jurisdictions does your company operate, and under what exact circumstances will you share the information you hold with a 3rd party?

BolehVPN operates primarily from Malaysia. As we don’t keep logs, there is not much information to share even when requested. We also have a warrant canary active here.

Regarding data sharing, BolehVPN has a strict no-logs policy. We do not keep logs of user activity, including access times, DNS requests, or IP addresses. However, we may temporarily enable logs to identify and address abuse of their services, such as DoS attacks or spamming. Once the issue is resolved, these logs are deleted. Third parties are only notified when mandated by law.

For enhanced privacy, we recommend using anonymous payment methods like cryptocurrencies, Prepaid Debit Cards or Virtual Credit Cards. These payment details do not link to your VPN activities but only indicate that you have purchased a VPN subscription from us.

We at BolehVPN value your privacy and therefore have a detailed privacy policy in place.