Here at CyberGhost, we consider privacy a basic human right.

It's what we're fighting to protect and the reason we keep no logs. But not everyone shares our vision. Case in point: the various requests we get to disclose the identity of CyberGhost users. Since we’re Bucharest-based and under no obligation from the Romanian law to store connections logs, we can honor our strict no-logs policy. This means we’re unable to comply with requests, even if they are legally binding.

Чтобы дать Вам представление о юридической стороне нашей деятельности, вот три основных типа юридических требований, которые мы обычно получаем.

15,819
2015
43,647
2016
42,805
2017
27,747
2018

Жалобы DMCA (закон об авторском праве в цифровую эпоху)

We usually receive Digital Millennium Copyright Act complaints from various law firms representing production companies. Most often, they indicate that copyrighted material was illegally shared via a CyberGhost IP. We're also provided with details like the timestamp of a torrent or the port used.

4,895
2015
10,362
2016
7,876
2017
11,116
2018

Malware Activity Flags

The complaints grouped in this category usually come from website owners or app developers and have to do with DDoS, botnets, scams, log-in attempts, or automated emails being send from CyberGhost IPs. Sometimes, data centers we work with around the world forward us complaints.

71
2015
40
2016
17
2017
37
2018

Police requests

Различные правоохранительные учреждения или полицейские ведомства могут запросить журналы или дополнительные сведения об IP-адресах, связанных с расследованиями или другими ситуациями. Эти запросы обычно сначала достигают сотрудников нашего центра данных, а затем напрямую перенаправляются нам.

Tackling abuse on our end

Over the years, we’ve taken our own measures to reduce the number of violations committed by using CyberGhost. For example, analyzing the ports used for torrent streaming and blocking them in countries where specific laws are in place turned out to be efficient.

And RE: malware activities, since most of the complaints specify the source of the attack, as well as the victim’s IP, we resorted to blocking access to the attacked IP, making further exploits impossible.

Also, a not-so-gentle reminder from our Legal team: by using our VPN, you have agreed to comply with our Terms and Conditions

We're keeping safe more than 30 million Ghosties from all around the world.

Got questions for us?

Send them our way, and we’ll gladly get back to you. Drop us a line at press.office@cyberghost.ro.