PRIVACY POLICY

Effective Date: January 1, 2025
Last Updated: September 5th, 2025

1. INTRODUCTION

Wired Tech LLC ("Company," "we," "us," or "our") operates WiredProxies and provides proxy services, IPv4/IPv6 address allocations, VPN endpoints, and related network infrastructure services (collectively, the "Services"). This Privacy Policy explains how we collect, use, disclose, and protect information when you use our website www.wiredproxies.com (the "Site") and our network infrastructure Services.

This Privacy Policy applies to all information collected through our Services, whether accessed via our Site, API endpoints, third-party platforms (Discord, Telegram, WhatsApp), or through direct business relationships. By using our Services, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. If you do not agree with our data practices, you must not use our Services.

We are committed to respecting your privacy while providing reliable network infrastructure services. This Privacy Policy describes our practices transparently, including what information we collect, why we collect it, and how it is used. We recognize that many users choose proxy services for privacy reasons, and we have designed our practices to collect only the information necessary for service delivery, security, and legal compliance.

2. INFORMATION WE COLLECT

Network and Connection Data

As a provider of proxy and network infrastructure services, we collect certain technical information necessary for service operation:

Connection Logs: For each connection through our Services, we collect connection timestamps (start and end times), source IP address (your original IP), destination hostnames and IP addresses accessed, proxy server locations and endpoints used, protocol types (HTTP, HTTPS, SOCKS4, SOCKS5), bandwidth consumed (upload and download), and connection status and error codes. These logs are essential for service delivery, troubleshooting, and abuse prevention.

Traffic Metadata: We collect aggregate information about network traffic including data transfer volumes, connection counts and duration, protocol distribution, geographic distribution of traffic, peak usage times and patterns, and error rates and performance metrics. This metadata helps us optimize network performance and capacity planning.

Technical Performance Data: We monitor latency and response times, packet loss and network quality metrics, server load and resource utilization, DNS query information, TLS/SSL handshake data, and network path information. This data is used solely for maintaining service quality and reliability.

Account and Billing Information

We collect information necessary to establish and maintain your account:

Registration Information: When you create an account, we collect username and password (stored encrypted), email address for account management, contact name (individual or business), company information (for business accounts), preferred payment methods, and time zone and locale preferences.

Payment Information: To process payments, we collect payment method details (card, cryptocurrency, etc.), billing address and contact information, transaction history and invoices, subscription status and renewal dates, and usage-based billing metrics. Payment card processing is handled by PCI DSS-compliant third-party processors who maintain their own privacy policies.

Identity Verification: For certain services or payment methods, we may collect government-issued identification (for high-volume accounts), business registration documents, proof of address, tax identification numbers, and Know Your Customer (KYC) documentation as required by financial regulations.

Usage and Analytics Data

We collect information about how you interact with our Services:

Service Usage Patterns: We monitor API endpoint usage and authentication, proxy location preferences and rotation patterns, authentication methods used, feature utilization and configuration settings, session duration and frequency, and error rates and support ticket patterns.

Website Analytics: When you visit our Site, we collect pages visited and navigation paths, referring websites and search terms, browser type and version, operating system and device type, screen resolution and interface preferences, and interaction with Site features. This information helps us improve user experience and Site functionality.

Information You Provide

Communications: When you contact us for support or inquiries, we collect the content of your messages, any attachments or screenshots provided, support ticket history and resolutions, feedback and feature requests, and communication preferences.

Configuration Data: If you use advanced features, we may collect custom routing rules and configurations, whitelist/blacklist settings, authentication credentials for proxy access, API keys and webhook URLs, and integration settings with third-party services.

3. HOW WE USE YOUR INFORMATION

Service Delivery and Operations

We use collected information primarily to provide and maintain our network infrastructure Services:

Network Operations: We use information to route network traffic through appropriate proxy servers; manage IP address allocations and rotations; balance load across server infrastructure; maintain network performance and availability; provide geographic diversity in exit nodes; and ensure protocol compatibility and optimization.

Account Management: Your information enables us to authenticate and authorize access to Services; manage subscription levels and feature access; process payments and maintain billing records; provide customer support and technical assistance; communicate service updates and maintenance notices; and deliver usage statistics and reporting.

Security and Abuse Prevention

We analyze information to protect our Services and infrastructure:

Threat Detection: We monitor for distributed denial of service (DDoS) attacks, unauthorized access attempts and intrusions, automated bot traffic and scrapers, violation of rate limits and fair use policies, malicious traffic patterns and payloads, and attempts to compromise proxy infrastructure.

Abuse Prevention: We work to prevent use of Services for illegal activities; spamming, phishing, or fraud; circumvention of security measures; violation of third-party terms of service; excessive resource consumption; and activities that could harm our reputation or infrastructure.

Network Security: We implement and maintain firewall rules and access controls; intrusion detection and prevention systems; traffic filtering and anomaly detection; security patches and updates; incident response procedures; and compliance with security best practices.

Performance and Optimization

We analyze usage data to optimize proxy server locations and capacity; improve routing algorithms and latency; identify and resolve bottlenecks; plan infrastructure expansion; enhance API performance and reliability; and develop new features based on usage patterns.

Legal Compliance

We use information as necessary to comply with applicable laws and regulations; respond to legal process and government requests; protect our rights, property, and safety; enforce our Terms of Service; investigate security incidents; and maintain required business records.

4. HOW WE SHARE YOUR INFORMATION

Infrastructure and Service Providers

We share information with third parties who help us deliver and maintain our Services:

Infrastructure Providers: We work with data center operators and colocation facilities; cloud infrastructure providers (for certain services); content delivery networks (CDNs); DDoS protection services; bandwidth and transit providers; and domain name system (DNS) providers. These providers may have access to traffic data and connection information necessary for service delivery.

Business Services: We engage payment processors and merchant services; accounting and tax preparation services; customer relationship management platforms; support ticketing systems; email delivery services; and analytics platforms. These services are bound by confidentiality agreements and may only use your information as directed by us.

Legal Disclosures

We may disclose information when required by law or when we believe in good faith that disclosure is necessary:

Legal Process: We respond to valid subpoenas and court orders; search warrants and seizure orders; regulatory inquiries and audits; tax authority requirements; and other lawful government requests. We will notify you of legal requests when permitted by law and not prohibited by the requesting authority.

Protection and Safety: We may disclose information to prevent fraud or cybercrime; protect against imminent physical harm; preserve evidence of violations; defend legal claims; or protect our network infrastructure from attacks.

Business Transfers

In the event of a merger, acquisition, bankruptcy, or sale of assets, your information may be transferred to the successor entity. We will provide notice via email and prominent Site notice before your information becomes subject to a different privacy policy.

Aggregated and Anonymized Data

We may share aggregated or anonymized information that cannot identify you individually. This may include network performance statistics, geographic usage patterns, protocol and feature adoption rates, security threat intelligence, and general industry insights. This information may be shared publicly or with partners for any purpose.

No Sale of Personal Information

We do not sell, rent, or trade your personal information to third parties for their marketing purposes. We do not engage in data brokering or participate in advertising networks that would require sharing your personal information.

5. DATA RETENTION

Connection and Usage Logs

Active Accounts: Connection logs are retained for ninety (90) days for operational purposes, troubleshooting, and abuse investigation. After this period, logs are automatically purged unless preservation is required for legal or security reasons.

Closed Accounts: Upon account closure, connection logs are deleted within thirty (30) days unless retention is required by legal obligation or ongoing investigation.

Aggregated Data: Statistical and performance data that has been aggregated and anonymized may be retained indefinitely for analytical purposes.

Account Information

Account Data: Profile information, preferences, and configurations are retained for the duration of your account plus twelve (12) months after closure to handle any residual issues, disputes, or reactivation requests.

Financial Records: Payment transactions, invoices, and tax-related documents are retained for seven (7) years as required by tax and accounting regulations.

Support Communications: Support tickets and communications are retained for two (2) years to provide continuity of service and maintain service improvement records.

Legal and Security Retention

Legal Holds: Information subject to legal process, investigation, or litigation hold is retained until the matter is fully resolved and all appeal periods have expired.

Security Incidents: Data related to security incidents, Terms of Service violations, or abuse is retained as necessary to prevent recurrence and protect our Services, typically for twenty-four (24) months.

Compliance Records: Documentation required for regulatory compliance, including KYC records and verification documents, is retained according to applicable regulatory requirements.

6. YOUR PRIVACY RIGHTS

Access and Portability

You have the right to access personal information we maintain about you. You can request:

Your account profile and settings; billing history and payment records; current service configuration; support ticket history; and available connection logs (within retention period).

To request your information in a portable format, contact us using the methods below. We will provide data in a commonly used, machine-readable format where technically feasible.

Correction and Deletion

Updating Information: You can update most account information through your dashboard. For information you cannot modify directly, contact our support team for assistance.

Deletion Rights: You may request deletion of your personal information by contacting us. We will delete information except where retention is necessary to complete pending transactions; comply with legal obligations; resolve disputes and enforce agreements; maintain security and fraud prevention records; or preserve information subject to legal holds.

Communication Preferences

You can manage your communication preferences to opt out of promotional emails and newsletters; choose notification methods for service updates; set preferences for maintenance notifications; and control marketing communications. Essential service communications related to security, billing, and service availability cannot be disabled while maintaining an active account.

Privacy Choices

Do Not Track: Our Site responds to Do Not Track browser signals by not collecting analytics data when DNT is enabled. Note that this does not affect operational data collection necessary for service delivery.

Cookie Management: You can control cookies through your browser settings. Disabling cookies may affect Site functionality but does not impact proxy service operation.

Regional Privacy Rights

California Residents (CCPA/CPRA): California residents have rights including the right to know what personal information we collect, use, and disclose; delete personal information (subject to exceptions); opt-out of "sales" (we do not sell personal information); correct inaccurate information; limit use of sensitive personal information; and non-discrimination for exercising privacy rights.

To exercise these rights, California residents can submit requests through our privacy portal or contact us directly. We will verify your identity before processing requests.

European Economic Area and United Kingdom (GDPR): Individuals in the EEA and UK have rights including access to personal data; rectification of inaccurate data; erasure ("right to be forgotten"); restriction of processing; data portability; objection to processing; and rights regarding automated decision-making.

Our legal bases for processing include consent (for optional services), contract performance (service delivery), legal obligations (compliance), and legitimate interests (security and service improvement).

Other Jurisdictions: If you reside in a jurisdiction with privacy laws providing additional rights, contact us to exercise any applicable rights. We will respond according to applicable law.

7. DATA SECURITY

Technical Security Measures

We implement comprehensive security controls to protect your information:

Encryption: All connections to our Services use TLS 1.2 or higher; proxy connections support encrypted protocols; API communications require HTTPS; passwords are hashed using bcrypt; sensitive data is encrypted at rest using AES-256; and payment information is tokenized.

Access Controls: We enforce principle of least privilege for system access; multi-factor authentication for administrative functions; API authentication using secure tokens; regular access reviews and revocations; comprehensive audit logging; and separation of production and development environments.

Network Security: Our infrastructure includes advanced firewall configurations; intrusion detection and prevention systems (IDS/IPS); distributed denial of service (DDoS) protection; network segmentation and isolation; regular vulnerability scanning; and penetration testing by third parties.

Operational Security

Infrastructure Security: Our servers are hosted in secure data centers with physical access controls; 24/7 monitoring and surveillance; redundant power and cooling systems; fire suppression systems; and compliance with industry standards (SOC 2, ISO 27001).

Personnel Security: Our staff undergo background checks; sign confidentiality agreements; receive security awareness training; are subject to access restrictions; and follow incident response procedures.

Vendor Management: Third-party providers are subject to security assessments; contractual security obligations; regular security reviews; and compliance certifications.

Incident Response

We maintain a comprehensive incident response program including documented response procedures; dedicated security team; defined escalation paths; forensic capabilities; breach notification procedures; and regular drills and updates.

In the event of a data breach affecting your personal information, we will notify affected users as required by applicable law; take steps to mitigate harm; conduct thorough investigations; and implement measures to prevent recurrence.

8. PROXY-SPECIFIC PRIVACY CONSIDERATIONS

Traffic Routing and Visibility

When you use our proxy Services, your internet traffic is routed through our infrastructure. This means:

What We Can See: Connection metadata (IPs, ports, protocols); destination hostnames (via DNS and SNI); traffic volume and timing; and connection success/failure status.

What We Cannot See: Encrypted traffic content (HTTPS payload); passwords and form data in encrypted connections; specific page content on HTTPS sites; and end-to-end encrypted communications.

Geographic Considerations

Server Locations: Our proxy servers are located in multiple countries. When you select a proxy location, your traffic exits the internet in that jurisdiction, potentially subject to local laws and surveillance.

Data Localization: While we are a U.S. company, connection data may be temporarily processed in the country where the proxy server is located before being transmitted to our central systems.

Transparency About Limitations

No Anonymity Guarantee: While proxies can mask your IP address from destination sites, we necessarily know your real IP address to provide service. True anonymity requires additional measures beyond our Services.

Legal Obligations: Despite our commitment to privacy, we must comply with valid legal process. Users engaging in illegal activities should not expect protection from lawful investigation.

Third-Party Visibility: Destination websites, internet service providers, and network intermediaries may still collect information about your activities independent of our Services.

9. INTERNATIONAL DATA TRANSFERS

Our Services operate globally with infrastructure in multiple countries. Your information may be transferred to and processed in:

Primary Operations: United States (headquarters and primary data processing); European Union (certain proxy servers and regional support); and other countries where we maintain proxy infrastructure.

Cross-Border Transfers: When you use a proxy server in a specific country, connection data is processed locally then transferred to our central systems. We implement appropriate safeguards for international transfers including standard contractual clauses; data processing agreements; and adherence to cross-border transfer mechanisms.

Your Consent: By using our Services, you consent to the transfer of your information to the United States and other countries where we operate, understanding that data protection laws may vary by jurisdiction.

10. CHILDREN'S PRIVACY

Our Services are not intended for individuals under eighteen (18) years of age. We do not knowingly collect personal information from children. If we learn that we have collected information from a child under 18, we will delete that information promptly.

If you are a parent or guardian and believe your child has provided us with personal information, please contact us immediately so we can delete such information.

11. THIRD-PARTY SERVICES AND WEBSITES

External Links

Our Site may contain links to third-party websites or services that are not operated by us. We are not responsible for the privacy practices of these third parties. We encourage you to review their privacy policies before providing any information.

Payment Processors

We use third-party payment processors who collect payment information directly according to their own privacy policies. These include traditional payment processors (credit cards, ACH); cryptocurrency payment gateways; and alternative payment methods. Review their privacy policies to understand how they handle your payment information.

Destination Websites

When using our proxy Services to access third-party websites, those sites may collect information about your visit according to their own privacy policies, even though your IP address is masked by our proxy service.

12. CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy to reflect changes in our practices, technologies, legal requirements, or business operations. When we make changes:

Notification: We will update the "Last Updated" date at the top of this policy. For material changes, we will provide notice via email to registered users; prominent notice on our Site dashboard; and in-app notifications where applicable.

Acceptance: Your continued use of our Services after changes constitutes acceptance of the updated Privacy Policy. If you disagree with changes, you should discontinue use of our Services and contact us to close your account.

Review: We encourage you to periodically review this Privacy Policy to stay informed about our data practices and your privacy rights.

13. DATA PROTECTION OFFICER

We have designated a Data Protection Officer to oversee our privacy program and ensure compliance with applicable privacy laws. Our DPO can be reached at dpo@wiredtech.com for:

Privacy-related inquiries and complaints; requests to exercise privacy rights; questions about our data practices; reports of potential privacy violations; and consultation on privacy impact assessments.

14. CONTACT INFORMATION

For questions, concerns, or requests regarding this Privacy Policy or our privacy practices:

General Support: help@wiredproxies.com

When contacting us about privacy matters:

Please provide sufficient information to identify your account; be prepared to verify your identity for security purposes; specify the nature of your request or concern; and allow reasonable time for us to investigate and respond.

Response Times

We strive to respond to privacy inquiries within:

Law Enforcement Guidelines

Law enforcement agencies should direct requests to legal@wiredtech.com and include:

Emergency requests involving imminent danger should be clearly marked as such and include sufficient information to evaluate the emergency.

15. PRIVACY COMMITMENT

At Wired Tech LLC, we recognize that privacy is a fundamental concern for users of proxy and network infrastructure services. We commit to:

Minimal Data Collection: Collecting only the information necessary for service delivery, security, and legal compliance.

Transparency: Being clear about what data we collect, why we collect it, and how it is used.

Security: Implementing strong security measures to protect your information from unauthorized access or disclosure.

User Control: Providing you with choices and control over your information where feasible.

Legal Compliance: Following applicable privacy laws while advocating for user privacy where permitted.

Continuous Improvement: Regularly reviewing and enhancing our privacy practices as technology and regulations evolve.

Your trust is essential to our business. We strive to earn and maintain that trust through responsible data practices and transparent communication about privacy.


END OF PRIVACY POLICY
© 2025 Wired Tech LLC. All rights reserved.
Last reviewed by legal counsel: September 5th, 2025