Bright Data maintains a compliance system that is based on deterrence, prevention , and enforcement. This three-tiered process is the executive arm of Bright Data's core value – ensuring our network remains safe and ethical.
Bright Data attains its peers (Residential and Mobile IPs) through the Bright Data SDK, which is integrated into applications as another form of app monetization.
App users are presented with the option to opt-in to the Bright Data Network and become a peer (share their device idle resources) in exchange for an ad-free or free application. All peers sharing resources with the Bright Data residential network have personally opted-in and may opt-out at any time.
Once an app user has approved to share their device resources (becoming a peer) our infrastructure ensures traffic is only routed under strict conditions. These conditions include: having opted-in to the network, the device being idle (not in use), the device is connected to WiFi (we use a very limited amount of 3G/LTE data), sufficient battery power and more.
App owners that work with the Bright Data SDK have seen an increase in user-experience by being able to remove ads while still generating revenues. The app users themselves enjoy this ad-free experience without being affected by the Bright Data SDK as they are only active peers under strict conditions. All users who choose to opt-in and become a peer receive some form of value-added compensation such as an ad-free app experience.
As leaders of the IPPN market Bright Data has set the highest standards of compliance in the proxy industry. Every new Bright Data Residential/mobile customer is thoroughly vetted and must be approved by a compliance officer to ensure their use case meets our strict standards. Bright Data's in-depth on-boarding process requires clients to share their national ID and sign our compliance statement amongst various other identity verification techniques.
The Bright Data compliance officers personally handle every report of abuse including investigating warning and blocking suspicious clients. Our multi-faceted system includes a combination of internal safeguards in conjunction with external vendor reports to identify unethical activity patterns amongst clients who are promptly disabled accordingly.
Approved use of the Bright Data network includes gathering data for website testing, price comparison, travel data aggregation, brand protection, and actions of a similar nature for business intelligence. We do not accept any use of our network that aims to emulate a real user in return for direct payment, misleading purposes or fraudulent activity.
Bright Data uses two methods to ensure that our networks are free from abuse. The first is automated within our systems that detects suspicious behavior and automatically blocks the particular client while notifying the compliance team. The second is constant manual checks done by the compliance officers themselves. These manual checks include conducting random and direct log checks in order to detect any misuse of our network.
Bright Data does not allow the reselling of its networks or services in order to maintain our strict standards and procedures. By forbidding the reselling of our services we can guarantee that all access to the network is by accounts that have successfully passed our compliance check and have been approved by the compliance team and the senior compliance officer. We detect and immediately terminate any accounts that violate this rule.
Bright Data is fully committed to complying with all relevant data protection legal requirements, including the new EU data protection regulatory framework - the GDPR and the and the California Consumer Privacy Act of 2018 - the CCPA. As an enthusiastic advocate of internet security and privacy, Bright Data understands the importance of providing data subjects with greater control of their privacy and data. Therefore, we have taken considerable efforts to ensure that our privacy practices comply with data protection laws, including the GDPR and CCPA, and the industry's best practices regarding, among other things, respecting data subjects' requests to exercise their rights and more.