Overview
- About Bright Data's API token and its usage
- I'm not being blocked by my target websites. Why should I still use Bright Data?
- How does Bright Data differ from TOR?
- What is IP allocation?
- What is the waterfall?
- Is communication between relays encrypted?
Getting Started
- Using Google Authenticator mobile app for 2FA
- How can I activate my account?
- I signed up but I have not received an email confirmation from Bright Data. What should I do?
- How can I setup a production account?
- How to Add users to the account?
- Users permissions
Blacklist and whitelist IPs
Residential Network Security & Privacy
- Security Overview
- What is Bright Data platform
- How does it work?
- How does Bright Data ensure network security?
- Does a user with "Bright Data" App installed breach the AUP for their ISP?
- Are Bright Data Apps exposed to the user's private network traffic?
Suspend & Reactivate Account
Customer Privacy
- Are Bright Data users under Log4J risk?
- Does your company perform a Business Impact Analysis (BIA)? If so, how often is it updated?
- Do employees and contractors sign non-disclosure and confidentiality contracts?
- Do you undergo periodic penetration testing or any other security audit?
- How does Bright Data handle our private data?
- Privacy Regulations
Accept Usage
- Clarification for forbidden activities while using Bright Data
- Does your organization have an acceptable use policy (or similar) that is communicated to employees?
- What is reselling and is it allowed with Bright Data?
- Is crawling a particular site legal?
- Is crawling an acceptable use case?
- How does Bright Data ensure the legitimate use of its proxy network?