Ethical usage

Luminati maintains a compliance system that is based on deterrence, prevention , and enforcement. This three-tiered process is the executive arm of Luminati’s core value – ensuring our network remains safe and ethical.

Protecting our peers

Once an app user has approved to share their device resources (becoming a peer) our infrastructure ensures traffic is only routed under strict conditions. These conditions include: having opted-in to the network, the device being idle (not in use), the device is connected to WiFi (we use a very limited amount of 3G/LTE data), sufficient battery power and more.

Improved user-experience

App owners that work with the Luminati SDK have seen an increase in user-experience by being able to remove ads while still generating revenues. The app users themselves enjoy this ad-free experience without being affected by the Luminati SDK as they are only active peers under strict conditions. All users who choose to opt-in and become a peer receive some form of value-added compensation such as an ad-free app experience.

User compliance evaluation & compliance

As leaders of the IPPN market Luminati has set the highest standards of compliance in the proxy industry. Every new Luminati customer is thoroughly vetted and must be approved by a compliance officer to ensure their use case meets our strict standards. Luminati’s in-depth on-boarding process requires clients to share their national ID and sign our compliance statement amongst various other identity verification techniques.

No collection of end-user data

The Luminati SDK is only interested in the IP addresses themselves.
No user-data or personal data is collected upon opting-in or throughout the time the peer is part of the Luminati Network.

Dedicated compliance officer

The Luminati compliance officers personally handle every report of abuse including investigating warning and blocking suspicious clients. Our multi-faceted system includes a combination of internal safeguards in conjunction with external vendor reports to identify unethical activity patterns amongst clients who are promptly disabled accordingly.

Verified use cases only

Approved use of the Luminati network includes gathering data for website testing, price comparison, travel data aggregation, brand protection, and actions of a similar nature for business intelligence. We do not accept any use of our network that aims to emulate a real user in return for direct payment, misleading purposes or fraudulent activity.

Usage monitoring

Luminati uses two methods to ensure that our networks are free from abuse. The first is automated within our systems that detects suspicious behavior and automatically blocks the particular client while notifying the compliance team. The second is constant manual checks done by the compliance officers themselves. These manual checks include conducting random and direct log checks in order to detect any misuse of our network.

Strict no reselling policy

Luminati does not allow the reselling of its networks or services in order to maintain our strict standards and procedures. By forbidding the reselling of our services we can guarantee that all access to the network is by accounts that have successfully passed our compliance check and have been approved by the compliance team and the senior compliance officer. We detect and immediately terminate any accounts that violate this rule.

Empowering researchers

Privacy compliance

Luminati is fully committed to complying with all relevant data protection legal requirements, including the new EU data protection regulatory framework - the GDPR and the and the California Consumer Privacy Act of 2018 - the CCPA. As an enthusiastic advocate of internet security and privacy, Luminati understands the importance of providing data subjects with greater control of their privacy and data. Therefore, we have taken considerable efforts to ensure that our privacy practices comply with data protection laws, including the GDPR and CCPA, and the industry’s best practices regarding, among other things, respecting data subjects’ requests to exercise their rights and more.