Before using the ProxymaData ("Provider"), please read this End User License Agreement (“Agreement”) carefully and if you do not agree to the terms, do not use the ProxymaData Provider, which includes the website and software.

Definitions

For the purposes of this Agreement and all related documents, the following capitalized terms shall have the meanings set forth below:

  1. "Agreement" means this End User License Agreement (EULA), including all referenced policies, annexes, and future amendments accepted by the Client.
  2. "Client" means any individual or entity that registers an account, accesses, or utilizes the Services provided by the Provider under this Agreement.
  3. "Network Components" means the proprietary software components developed and distributed by the Provider, which are installed on end-user devices to enable their participation as proxy exit nodes within the Provider's proxy network infrastructure.
  4. "Provider" means [Your Legal Entity Name], operating the website and service platform accessible at https://www.proxymadata.com (or successor domains), and offering the Services defined herein.
  5. "Services" means the suite of proxy access services, associated software, control panel, API access, and related functionalities provided by the Provider to the Client under this Agreement.
  6. "Website" means the Provider's online presence located at https://www.proxymadata.com (and associated subdomains), including its user interface, content, and account management systems.
  7. "AUP" means the Acceptable Use Policy set forth in Section [X] of this Agreement, which defines the permitted and prohibited uses of the Services.
  8. "SLA" means the Service Level Agreement provisions outlined in Section [Y], describing availability commitments, support standards, and limited remedies for service interruptions.
  9. "Downtime" means any period, measured in consecutive minutes, during which the Provider's core proxy routing infrastructure is:
    • Unavailable to the Client due to a verified failure of the Provider's systems
    • Such unavailability is not caused by:
      • Scheduled maintenance (with prior notice where feasible),
      • Client's acts/omissions or local connectivity issues,
      • Force Majeure events, or
      • Third-party actions outside the Provider's direct control (e.g., ISP outages).
  10. "Fees" means all charges payable by the Client for access to and use of the Services, as specified in the pricing plan selected during registration or subsequent renewals.
  11. "Confidential Information" means all non-public business, technical, or operational information disclosed by either party, including:
    • Provider's: Network architecture, pricing models, security measures, and proprietary software.
    • Client's: Account credentials, usage patterns, and business applications of the Services.
    • Excludes information that is:
      • Publicly known without breach of confidentiality,
      • Independently developed,
      • Rightfully received from a third party without restriction.
  12. "Effective Date" means the earlier of:
    • The date the Client first clicks "I Accept" to this Agreement, or
    • The date the Client first accesses or uses the Services (whichever occurs first).
  13. "Term" means the duration during which this Agreement remains in force, commencing on the Effective Date and continuing until terminated as per Section.
  14. "Termination" means the cessation of this Agreement and associated Service access, occurring via:
    • Mutual written agreement,
    • Provider-initiated termination for cause (AUP violations, non-payment),
    • Client-initiated closure of their account.
  15. "Force Majeure" means events beyond the reasonable control of a party, including:
    • Natural disasters,
    • War/terrorism,
    • Government actions or internet shutdowns,
    • Infrastructure provider failures,
    • Other catastrophes making performance commercially impracticable.

Provider automatically updates product components (dll, exe, text files, graphic files) by requesting new versions of files from the official Proxymadata server (proxymadata.com and it's sub domains) at certain intervals. After updates are installed automatically without user intervention. No PC administrator rights are required or used for the update. By continuing to use Proxymadata you agree to these updates.

Restrictions

You agree and do not permit others to license, sell, lease, assign, distribute, transfer, host, outsource, disclose or otherwise commercially exploit the Provider or make it available to any third party.

Ethics

Provider places fundamental importance on the ethical sourcing of its proxy network resources. The Provider hereby declares and warrants to the Client adherence to the following principles:

Proxy Sources and Voluntary Participation:

1.1. The proxy servers provided as part of the Provider originate from the internet connections of end-users' personal devices (such as personal computers, mobile phones, smart TVs, and other compatible devices).

1.2. The installation of software components necessary for integrating an end-user's device into the Provider's network ("Network Components") occurs solely upon the explicit, informed, and prior consent of the respective end-user.

1.3. The installation of Network Components is always a transparent process for the end-user and cannot be performed covertly or without the end-user's knowledge.

End-User Control and Compensation:

2.1. The end-user whose device is integrated into the Provider's network retains full and continuous control over the installed Network Components.

2.2. The end-user possesses the absolute right at any time to:

  • Decline the offer to install Network Components; and/or
  • Uninstall (remove) any installed Network Components using the standard, publicly available functionality of the device's operating system.

2.3. As voluntary compensation for providing their device's resources and internet connection, an end-user who has installed Network Components may receive access to specific premium features or services offered by the partner program through which the integration with the Provider's network was initiated. The nature and availability of such compensation are determined solely by the terms and conditions of the respective partner program.

Verification of Ethical Principles:

3.1. The Provider maintains a policy of transparency regarding the stated ethical principles governing network formation.

3.2. A Client interested in obtaining further information or verifying adherence to the ethical principles of sourcing described above shall have the right to submit a relevant request to:

  • The Provider's support service via established contact channels; or
  • The support service of the partner program through which the Client gained access to the Provider's Service (where applicable).

3.3. The Provider undertakes to provide the Client with reasonably available information confirming compliance with the principles of end-user voluntariness, informed consent, and control as set forth in this Section, subject to confidentiality obligations and applicable legal requirements.

Intellectual property

The Provider and all content, including but not limited to text, images, graphics or code, are the property of the Provider and are protected by copyright, trademarks, database and other intellectual property rights. You may display and copy, download or print portions of material from various parts of the Provider for your non-commercial use only. Any other use is strictly prohibited and may violate copyrights, trademarks and other laws.

Refund policies

These policies apply to Provider.

Before purchasing the ProxymaData's services, we recommend that you read the ordering process. Otherwise, this may lead to dissatisfaction with the functioning and/or results of the ProxymaData. After requesting a refund, please wait 4-10 business days for the funds to be returned to your card.

Refund requests

Refund requests will be approved under this warranty under the circumstances listed below.

A refund request may be sent to us if the task was purchased in error or did not meet expectations and was not used. A refund request is made by creating a refund request on the ProxymaData distributor's website (PayPro Global).

The money back guarantee is limited to 45 days from the date of the last payment. Refunds are made only to the bank card with which the Program was purchased. After a refund, the task will be deactivated and will no longer be used.

ProxymaData may consider individual refund requests (refund times for the reporting period) on an individual basis and fulfill them at its sole discretion. In case of problems with the registration of the return through the personal account of the distributor of the Program (PayPro Global), the user can contact ProxymaData via the feedback form.

Additional software and links to other sites

The Provider may publish advertisements and offers of third parties on the Site and in the Software Products of the Provider . However, all business dealings between you and third parties, including without limitation payment and shipping matters, shall be considered solely as between you and third parties. Under no circumstances shall the Provider be liable for damages or losses incurred by you as a result of your business relations with third parties.

The Site may contain links to third party websites. The Provider does not control the websites of third parties, links to which are published on the Website, is not responsible for them and in no way supports the information, advertising, content, products or services on these websites.

We strongly encourage you to review the terms and privacy policies of any third party websites or services you use.

Legislation

This Agreement shall be governed by, interpreted and enforced in accordance with applicable local law.

If any provision of this Agreement is held invalid or unenforceable by a court of competent jurisdiction, then all other provisions of this Agreement will remain in effect. This Agreement constitutes the entire agreement regarding the Provider and supersedes any prior agreements, oral or otherwise, relating to the Provider .

How to delete

How to uninstall ProxymaData/Indexing Manager program and/or additional software?

Use the instructions below to remove the ProxymaData/ Indexing Manager (Hereinafter "Program" ) software.

After installing the Program, you can remove it from your computer at any time using standard Windows deinstallation utilities:

For Windows 8, 8.1 and 10, 11:

  1. Click "Start" - "Control Panel"
  2. Select "Add or Remove Programs" or "Programs and Features"
  3. Select a Program from the list with the appropriate logo and name.
  4. Click on the "Uninstall" button
  5. Wait until the uninstall program dialog box appears, which will help to delete the Program.
  6. Wait until all uninstaller steps are completed.

You may need to restart your computer in order to completely delete Program.

Deleting additional software

During the installation of the ProxymaData/Indexing Manager at certain stages it may be proposed to install recommended, licensed and authorized optional software products or their components. At each stage of the installation, you have the opportunity to agree or refuse to install the recommended programs and components by clicking the "Accept" or "Decline" buttons, as well as selecting components via checkboxes.

In each case of the proposed additional software, we recommend you to read their "Privacy policy" and "User agreements". During the installation process, on each screen are the links to these documents.

If you have agreed to install additional software and/or their components and after some time decided to uninstall these Programs from your computer, you can make easy by using standard Windows deinstallation utilities.

The step-by-step instructions are presented below:

  1. In the lower taskbar, click "Start", then "Settings", then "Control Panel"
  2. Select "Add or Remove Programs" or "Programs and Features"
  3. Select the appropriate additional software or components that you previously installed.
  4. Click on the "Uninstall" button

Acceptable Use Policy

General Principle. The Client shall use the Provider solely for lawful purposes and in strict compliance with this AUP, all applicable laws, regulations, and third-party rights. The Provider reserves the absolute right to determine, in its sole discretion, whether any activity constitutes a violation of this AUP.

2. Strictly Prohibited Activities. The Client is strictly prohibited from using, attempting to use, or permitting others to use the Proxy Provider for any of the following activities:

2.1. Spamming & Unsolicited Communications: Sending, facilitating, or promoting unsolicited bulk or commercial messages ("spam") via any medium, including but not limited to email, SMS, instant messaging, social media comments, or web form submissions.

2.2. Fraud & Deception: Engaging in or facilitating any fraudulent, deceptive, or malicious activity, including but not limited to phishing, scamming, identity theft, credit card fraud ("carding"), impersonation, or pyramid schemes.

2.3. Attacks on Availability & Security: Launching or participating in any activity that disrupts, degrades, damages, or interferes with the availability, security, or integrity of networks, systems, servers, or services. This explicitly includes:

  • Denial-of-Service (DoS/DDoS) attacks.
  • Unauthorized network or vulnerability scanning.
  • Brute-force attacks (e.g., credential stuffing).
  • Distributing malware, ransomware, or viruses.

2.4. Large-Scale Copyright Infringement: Engaging in the systematic, automated, or large-scale unauthorized copying, distribution, or making available of copyrighted works (e.g., software, media piracy).

2.5. Unauthorized Access to Protected Data: Accessing, collecting, processing, or transmitting particularly sensitive personal data (including, but not limited to, medical/health records, financial account details, government-issued identification numbers, or precise geolocation data) without the explicit, verifiable consent of the data subject and where required by law, without prior written authorization from the Provider obtained via a formal request.

2.6. Illegal or Harmful Content: Accessing, distributing, promoting, or facilitating access to content that is illegal or universally condemned, including but not limited to:

  • Child sexual abuse material (CSAM).
  • Non-consensual intimate imagery.
  • Content promoting terrorism or violent extremism.
  • Depictions of extreme violence or cruelty.

2.7. Evasion of KYC/AML Regulations: Using the Provider to intentionally circumvent or violate Know Your Customer (KYC), Customer Due Diligence (CDD), or Anti-Money Laundering (AML) regulations applicable to the Client or any third-party service the Client accesses.

2.8. Botnet Participation: Integrating the Provider into, or using the Provider to control or communicate with, any botnet (a network of compromised devices).

2.9. Excessive Consumption & System Abuse: Generating excessive traffic or load that disrupts or impairs the Provider's infrastructure, network, or Provider , or interferes with other Clients' use and enjoyment of the Provider , as determined solely by the Provider.

2.10. Aggressive Automated Interaction with Government Systems: Using automated means (e.g., scraping bots, scripts) to aggressively extract data from, or submit large volumes of data to, websites, portals, or APIs operated by any governmental body, agency, or entity (local, national, or international) without prior written authorization from the Provider obtained via a formal request AND explicit permission from the relevant governmental entity.

3. Permitted Activities. Subject to strict compliance with this AUP, all applicable laws, and other terms of this Agreement, the Provider may be used for legitimate purposes including, but not limited to:

  • General web browsing.
  • Market research and competitive analysis.
  • Ad verification and brand safety monitoring.
  • SEO monitoring and analytics.
  • Travel fare aggregation.
  • Accessing geographically restricted content for personal use where permitted by the content provider and applicable law.
  • Software testing and development (excluding security testing against unauthorized targets).

4. Activities Requiring Prior Written Authorization. The following activities are prohibited unless the Client obtains explicit prior written authorization from the Provider via a formal request detailing the specific intended use case, scope, targets, and compliance measures:

4.1. Accessing or processing sensitive personal data as defined in Section 2.5.

4.2. Any automated interaction (scraping, data extraction, submission) with websites or APIs of governmental entities as defined in Section 2.10.

4.3. Security testing or vulnerability assessments targeting third-party systems or networks (ethical hacking).

4.4. Any other activity that the Provider reasonably determines carries heightened legal, reputational, or operational risk.

5. Provider's Rights & Enforcement.

5.1. Monitoring & Investigation: The Provider reserves the right, but assumes no obligation, to monitor use of the Provider and investigate any suspected AUP violations. This may include analyzing traffic patterns and logs.

5.2. Consequences of Violation: Violation of this AUP may result in immediate action by the Provider, without prior notice, including but not limited to:

  • Suspension or termination of the Client's access to the Provider .
  • Blocking of specific traffic or activities.
  • Removal of offending content or data.
  • Cooperation with legal authorities.
  • Pursuit of any available legal remedies.

5.3. Reporting: The Client agrees to promptly report any known or suspected violation of this AUP to the Serivce.

Limitation of Liability

1. Service Availability & Best Effort Commitment.

1.1. Provider operates its proxy infrastructure ("Services") utilizing globally distributed third-party data center providers and network operators ("Infrastructure Partners").

1.2. The Provider does not guarantee 100% uninterrupted or error-free availability of the Services. Service availability is inherently subject to the performance, reliability, and uptime commitments (SLAs) of the underlying Infrastructure Partners, over which the Provider has limited direct control.

1.3. The Provider commits to using commercially reasonable best efforts to maintain Service availability and minimize disruptions.

2. Incident Management & Communication.

2.1. The Provider does not currently maintain a formalized procedure for public incident reporting or real-time status updates during service disruptions.

2.2. The Provider operates 24/7 monitoring systems for its core infrastructure components. Upon detection of an issue impacting Services, the Provider's engineering team will prioritize investigation and resolution efforts.

2.3. While proactive incident notifications are not provided, Clients experiencing issues are encouraged to report them via the standard support channels for investigation.

3. Resolution Target.

3.1. The Provider's objective is to resolve identified disruptions to its core infrastructure components ("Downtime") as promptly as technically feasible, leveraging available resources and cooperation from Infrastructure Partners.

4. Limited Downtime Credit.

4.1. In recognition that extended Downtime may occur despite the Provider's best efforts, the Provider offers a limited goodwill credit mechanism:

  • Eligibility: Applies only to Downtime verified by the Provider's monitoring as affecting core routing infrastructure for a specific Client's assigned proxies and lasting more than 24 consecutive hours.
  • Calculation: Credit = (Total Verified Downtime Hours for Eligible Incident / 720 hours) * (Client's Current Monthly Fee) * 20%.
  • Cap: The maximum credit available for any single calendar month is 20% of the Client's monthly fee for the affected service tier.
  • Form: Credit will be applied as a pro-rata extension to the Client's current service term. Cash refunds are not offered under this policy.

Exclusions: Credits are not available for Downtime caused by:

  • Force Majeure events.
  • Scheduled maintenance (with reasonable notice where possible).
  • Client's own acts or omissions, network configuration, or local connectivity issues.
  • Actions of third parties not under the Provider's direct control (including DDoS attacks targeting Infrastructure Partners).
  • Violations of the AUP by the Client.

4.2. Claim Process: Eligible Clients must submit a credit request via the support portal within 7 calendar days following the end of the month in which the Downtime occurred. The request must include relevant details (approximate timeframe, affected proxies/IPs). The Provider's determination of eligibility and credit amount is final.

5. No Additional Warranties.

5.1. THIS SECTION SETS FORTH THE PROVIDER'S SOLE LIABILITY AND THE CLIENT'S EXCLUSIVE REMEDY FOR SERVICE UNAVAILABILITY OR DOWNTIME. THE SERVICES ARE PROVIDED "AS IS" AND "AS AVAILABLE" BASIS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PROVIDER EXPRESSLY DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.

Privacy and Data Handling

1. Collection and Use of Client Registration Data.

1.1. During website registration, the Client provides personal data solely for the purposes of account creation, service provisioning, and payment processing.

1.2. Data Collected & Stored by Provider:

  • Email address
  • Username (nickname)
  • IP address(es) used during registration and account access
  • Messenger ID (e.g., Telegram, Skype) only if voluntarily provided by the Client during registration

1.3. Purpose of Processing: This data is used exclusively for:

  • Client identification and authentication
  • Service delivery and account management
  • Communication regarding the Service
  • Fraud prevention and security

1.4. Payment Data: Payment information (e.g., credit card details) is processed directly by authorized third-party payment gateways. The Provider does not store full payment card information on its systems.

1.5. Access Restriction: Access to stored Client registration data (1.2) is strictly limited to authorized administrative personnel requiring such access for legitimate business purposes outlined in 1.3.

2. Account Access Logging.

2.1. The Provider automatically logs metadata related to Client account access, including:

  • Timestamp of login/logout events
  • IP address used for access
  • User agent/browser type (where available)

2.2. Retention: These access logs are retained for a period of twelve (12) months from the date of generation for security auditing, incident investigation, and compliance purposes.

3. Proxy Traffic Metadata Monitoring.

3.1. To ensure compliance with the Acceptable Use Policy (AUP), prevent abuse, maintain service integrity, and comply with legal obligations, the Provider monitors and logs limited metadata associated with Client proxy traffic.

3.2. Data Logged:

  • Source IP address (assigned proxy IP)
  • Destination IP address and port
  • Timestamp
  • Volume of data transferred (bytes in/out)
  • Protocol (e.g., TCP, UDP, HTTP, HTTPS)

3.3. Data NOT Logged: The Provider does not log, store, or inspect:

  • The full content of network packets or communications (payload data)
  • URLs of HTTPS requests (domain-level only may be inferred from destination IP where possible)
  • HTTP headers (beyond basic protocol identification)
  • DNS query content
  • Information entered into websites or applications by the end-user

3.4. Purpose: This metadata logging is solely for network security, abuse mitigation, capacity planning, and enforcing the terms of this Agreement.

4. Ethical Endpoint Isolation & Security.

4.1. Consistent with the principles of ethical sourcing outlined in Section [Reference Section on Ethical Sourcing], the Provider implements strict technical isolation for proxy endpoints operating on end-user devices.

4.2. Key Security Measures:

  • Isolation: Network Components installed on end-user devices operate within a secured, isolated environment ("sandbox") that prevents access to the local file system, user applications, personal documents, or other private data residing on the end-user's device.
  • Traffic Handling: These components function exclusively as transient routing points for encrypted HTTPS traffic (or other supported protocols). They do not decrypt, inspect, or store the content of the routed communications.
  • No Device Access: The Network Components cannot read keystrokes, capture screens, access device identifiers (IMEI, UDID, etc., beyond basic network interface identification), or otherwise monitor local device activity unrelated to their function as a proxy relay.

5. Data Security. The Provider implements commercially reasonable technical and organizational measures to protect Client data described in this section against unauthorized access, disclosure, alteration, or destruction. These include encryption in transit and at rest (where applicable), access controls, and regular security assessments.

Further details on data handling practices are available in our comprehensive Privacy Policy

Contact us

If you have any questions, you can use our contact form.