(1) To provide our customers with efficient and secure VPN services, we meticulously collect various technical information. This includes, but is not limited to, users' IP addresses, the models of devices used, and the types and versions of operating systems installed. This data collection effort is dedicated to ensuring the high availability and security of the services we offer. (2) We use cookies and other similar technologies on our website and applications with the aim of personalizing the user experience and improving the running speed of our applications, allowing users to use our services more smoothly. (3) Utilizing automated technologies to collect various types of data enables us to monitor the usage of VPN services in real-time. This helps us not only to improve the quality of service connections but also to promptly identify and resolve potential security issues. (4) All data collection is based on explicit user consent and strictly follows relevant laws and regulations to protect users' privacy and security. We are committed to leveraging this data to optimize our services and drive technological innovation. (5) Specifically, we deliberately avoid collecting personal information from children under the age of 13 and emphasize the supervisory role of parents, which is an important measure we take to protect the privacy and safety of minors. (6) The collected data will be used to improve service quality, personalize user services, and solve technical problems, and we firmly refuse to compromise user privacy. (7) We guarantee that users' personal information will only be retained when necessary during the service provision process and will be properly handled when no longer needed. (8) We also place a high priority on the security of data, safeguarding it against loss or leakage due to technical failures through data backups and robust encryption methods. Data Protection: (9) We extensively apply encryption technologies and advanced security protocols to ensure personal data is protected from unauthorized access, thereby safeguarding users' data security. (10) We have established clear response mechanisms to address potential security vulnerabilities, aiming to minimize potential negative impacts as quickly as possible.