Perfect Privacy VPN Privacy Report

Encryption
In Transit | Yes |
At rest? | Yes |
All network communications and capabilities? | Yes |
Security Updates
Automatic, regular software/ firmware updates? | Yes |
Product available to use during updates? | No |
Passwords
Mandatory password? | Yes |
Two-Factor authentication? | No |
Multi-Factor authentication? | No |
Vulnerability Management
Point of contact for reporting vulnerabilities? | No |
Bug bounty program? | No |
Privacy Policy
Link | https://www.perfect-privacy.com/en/privacy-policy |
Specific to device? | No |
Readable? | Yes |
What data they log | Login credentials, expiration date of account, email address, browser type and browser version, operating system used, referrer URL, host name of accessing computer, time of the server request |
What data they don’t log | Payment information, user traffic, IP addresses, access times or duration, bandwidth caused by individual users/td> |
Can you delete your data? | Yes |
Third-party sharing policies | Do not Share |
Surveillance
Log camera device/ app footage | n/a |
Log microphone device/ app | n/a |
Location tracking device/ app | No |
Parental Controls
Are there parental controls? | No |
Company History
Any security breaches/ surveillance issues in past? | Yes |
Did they do anything to fix it? | No |
Additional Security Features
Anything like privacy shutters, privacy zones, etc.? | n/a |