返回首页

使用条款

请谨慎购买,一旦付款,恕不退款!

以下行为一旦发现,将暂停服务及封号:

  • 任何P2P及BT下载行为;
  • 诈骗、黑客、滥发邮件或其他网络违法行为;
  • 任何我们服务器提供商禁止的行为;
  • 通过我们的节点进行数字货币挖矿流量代理行为;
  • 发表不当内容。

我们将根据情况调整相关政策并保留相关一切权力。

隐私政策

我们(bestvpn,简称"我们")始终将用户隐私保护置于首位。为帮助您清晰理解我们的数据处理方式,特制定本隐私政策说明。

政策要点

  • 我们不会收集您的浏览历史、访问目标、数据内容、DNS查询记录、IP地址或会话时间戳
  • 仅收集必要数据用于账户管理、服务质量监控及套餐服务实施
  • 系统设计原则确保无法获取用户敏感活动信息
  • 多重安全措施保障数据存储与传输安全

数据收集基本原则

我们严格遵循以下数据收集原则:

  • 零活动日志:不记录任何网络活动数据(包括浏览内容、访问目标、DNS查询)
  • 零连接日志:不存储IP地址、连接时间、会话时长等信息
  • 服务必需原则:仅收集账户管理及套餐服务实施必需的数据
  • 去标识化处理:所有统计数据均无法关联到具体个人
  • 技术保障:即使服务器被物理获取,也无法还原用户活动轨迹

具体收集的信息类型

为实施套餐服务和保障系统安全,我们收集以下信息:

账户基础信息

  • • 注册电子邮箱(用于账户验证和服务通知)
  • • 套餐类型及有效期

流量监控

  • • 实时流量使用数据(精确到Bytes)用于执行套餐流量限制
  • • 检测异常流量行为(如单日用量超过常规用户1000倍)
  • • 流量耗尽时触发服务暂停机制

示例场景: 当用户购买的100GB月套餐用尽时,系统将自动暂停服务并推送续费提醒邮件。

通讯信息存储

我们系统化存储以下通讯记录:

  • • 账户注册时提供的电子邮箱
  • • 通过邮箱/网站提交的咨询记录
  • • 服务通知邮件往来
  • • 客服沟通记录(含语音/文字)

邮箱使用声明:

  • • 仅用于账户验证、服务状态通知
  • • 不向第三方共享邮箱信息
  • • 退订选项包含在所有营销邮件中

安全防护措施

我们采用多重防护体系保障数据安全:

基础设施

  • • 部署于经ISO认证的顶级数据中心
  • • 全磁盘加密技术保障服务器安全
  • • 严格筛选合作数据中心,若要求记录用户数据将立即终止合作

管理措施

  • • 分级访问权限控制
  • • 定期安全审计
  • • 员工隐私保护培训

特别说明:没有任何系统能提供100%绝对安全,但我们承诺持续改进防护体系。

Cookie使用说明

功能说明

  • • 保存语言偏好
  • • 管理网站登录状态
  • • 统计营销渠道效果

管理方式

  • • 通过浏览器设置可随时禁用/删除
  • • 禁用后可能影响部分网站功能
  • • 仅包含匿名标识符,不追踪站外活动

第三方网站声明

本站可能包含外部链接,其隐私政策与内容均与我们无关,请自行评估风险后使用。

政策更新机制

我们可能根据法律法规和服务发展修订本政策,持续使用服务即视为接受更新条款。

Privacy Policy

At bestvpn (hereinafter referred to as "we", "us", or "our"), we always prioritize user privacy protection. To help you clearly understand our data processing methods, we have formulated this Privacy Policy statement.

Policy Highlights

  • We do not collect your Browse history, traffic destination, data content, DNS queries, IP addresses, or session timestamps.
  • We only collect necessary data for account management, service quality monitoring, and the implementation of service plans.
  • Our system design principles ensure that we cannot access sensitive user activity information.
  • Multiple security measures are in place to protect data storage and transmission security.

Basic Principles of Data Collection

We strictly adhere to the following data collection principles:

  • Zero Activity Logs: We do not record any network activity data (including Browse content, traffic destination, DNS queries).
  • Zero Connection Logs: We do not store IP addresses, connection times, session durations, etc.
  • Service Necessity Principle: We only collect data essential for account management and the implementation of service plans.
  • De-identification: All statistical data cannot be linked to specific individuals.
  • Technical Safeguards: Even if our servers are physically accessed, user activity trails cannot be reconstructed.

Specific Types of Information Collected

To implement service plans and ensure system security, we collect the following information:

Basic Account Information

  • • Registered email address (used for account verification and service notifications).
  • • Service plan type and validity period.

Traffic Monitoring

  • • Real-time traffic usage data (accurate to the Byte) used to enforce plan traffic limits.
  • • Detection of abnormal traffic behavior (e.g., daily usage exceeding that of a typical user by 1000 times).
  • • Service suspension mechanism triggered when traffic allowance is exhausted.

Example Scenario: When a user's 100GB monthly plan is exhausted, the system will automatically suspend the service and send a renewal reminder email.

Storage of Communication Information

We systematically store the following communication records:

  • • Email address provided during account registration.
  • • Inquiry records submitted via email/website.
  • • Correspondence of service notification emails.
  • • Customer service communication records (including voice/text).

Email Usage Statement:

  • • Used only for account verification and service status notifications.
  • • We do not share email information with third parties.
  • • An unsubscribe option is included in all marketing emails.

Security Measures

We employ a multi-layered protection system to ensure data security:

Infrastructure

  • • Deployed in top-tier, ISO-certified data centers.
  • • Full-disk encryption technology ensures server security.
  • • We strictly vet partner data centers; if they require user data logging, we will immediately terminate the partnership.

Administrative Measures

  • • Tiered access control.
  • • Regular security audits.
  • • Employee privacy protection training.

Special Note: No system can provide 100% absolute security, but we are committed to continuously improving our protection systems.

Cookie Usage Explanation

Functional Description

  • • Save language preferences.
  • • Manage website login status.
  • • Analyze the effectiveness of marketing channels.

Management Method

  • • Can be disabled/deleted at any time through browser settings.
  • • Disabling them may affect some website functionalities.
  • • Contain only anonymous identifiers and do not track off-site activities.

Third-Party Website Disclaimer

Our site may contain external links. Their privacy policies and content are not related to us. Please assess the risks yourself before using them.

Policy Update Mechanism

We may revise this policy based on legal regulations and service development. Continued use of the service constitutes acceptance of the updated terms.

联系我们

如有任何问题,请通过以下方式联系我们:

邮箱地址:

[email protected]