Are Bright Data users under Log4J risk?
No - Bright Data is not using the Log4J library, and our users are not at risk of being exposed to the Log4J vulnerability.
Does your company perform a Business Impact Analysis (BIA)? If so, how often is it updated?
Yes, it is updated annualy.
Do employees and contractors sign non-disclosure and confidentiality contracts?
Yes, all employees and contractors sign non-disclosure and confidentiality contracts.
Do you undergo periodic penetration testing or any other security audit?
Yes, we do a full yearly audit and penetration tests.
How does Bright Data handle our private data?
Bright Data is fully committed to complying with all relevant data protection legal requirements, including the new EU data protection regulatory framework - the General Data Protection Regulation ("GDPR") and the California Consum...
Is there any way that the target website can trace the origin of the IP back to us?
No. When a Bright Data customer sends a request through the Bright Data residential proxy network, that request is sent to a Bright Data “Super proxy”, which is a server that strips away identifying information(if any), and sends t...
Can a peer intercept traffic?
No. Bright Data suggests to its customers to use HTTPS traffic, which is impossible to be intercepted. Customers that choose to use HTTP distribute their traffic over Bright Data's millions of peers, and thus no single peer (or eve...