Here at CyberGhost, we consider privacy a basic human right.

It's what we're fighting to protect and the reason we keep no logs. But not everyone shares our vision. Case in point: the various requests we get to disclose the identity of CyberGhost users. Since we’re Bucharest-based and under no obligation from the Romanian law to store connections logs, we can honor our strict no-logs policy. This means we’re unable to comply with requests, even if they are legally binding.


For more detailed numbers, take a look at the quarterly editions of our Transparency Report:




To give you an idea of our judicial landscape, here are the three major types of legal demands we usually receive.

27,747
2018
57,094
2019
117,219
2020
264,238
2021

DMCA complaints

We usually receive Digital Millennium Copyright Act complaints from various law firms representing production companies. Most often, they indicate that copyrighted material was illegally shared via a CyberGhost IP. We're also provided with details like the timestamp of a torrent or the port used.

11,116
2018
30,912
2019
10,707
2020
24,623
2021

Malware Activity Flags

The complaints grouped in this category usually come from website owners or app developers and have to do with DDoS, botnets, scams, log-in attempts, or automated emails being send from CyberGhost IPs. Sometimes, data centers we work with around the world forward us complaints.

37
2018
60
2019
50
2020
55
2021

Police requests

Various law enforcement agencies or police departments can request logs or more information about an IP linked to an investigation or a case. These inquiries usually reach our data center collaborators first, and then get forwarded to us.

Tackling abuse on our end

Over the years, we’ve taken our own measures to reduce the number of violations committed by using CyberGhost. For example, analyzing the ports used for torrent streaming and blocking them in countries where specific laws are in place turned out to be efficient.

And RE: malware activities, since most of the complaints specify the source of the attack, as well as the victim’s IP, we resorted to blocking access to the attacked IP, making further exploits impossible.

Also, a not-so-gentle reminder from our Legal team: by using our VPN, you have agreed to comply with our Terms and Conditions.

We're keeping over 38 million Ghosties all around the world safe.

Got questions for us?

Send them our way, and we’ll gladly get back to you. Drop us a line at press.office@cyberghost.ro.

×

Don't Miss Our Digital Privacy Month Sale!

Enjoy 2 Years
+ 3 Months Free

1
4
0
5
1
3
2
8
DaysHoursMinsSec

undefined 45-Day Money-Back Guarantee