Military-Grade Encryption
Your data is protected with AES-256 encryption, the same standard used by governments and security experts worldwide.
Discover why The Proton VPN is the top choice for Australians. Learn about our strict no-logs policy, Australian servers, unlimited data & more.
Your data is protected with AES-256 encryption, the same standard used by governments and security experts worldwide.
Our optimized Australian servers ensure you get the fastest possible connection without compromising security.
Access content from around the world with servers in 50+ countries, including multiple locations across Australia.
We never track, monitor or store your online activity. Your privacy is guaranteed with our audited no-logs policy.
This Privacy Policy explains how The Proton VPN Australia collects, uses, discloses, and protects your personal information when you use our website and services. It is a binding document that outlines our operational principles under Australian privacy law.
We operate under the jurisdiction of the Australian Privacy Principles (APPs) contained in the Privacy Act 1988 (Cth). This policy is written for an Australian audience, using Australian English spelling and referencing local legal frameworks. It is designed to be read by researchers, analysts, and informed users who require precise, verifiable information about our data handling practices. We avoid vague assurances. We provide specific details, numeric data where possible, and clear limitations.
This policy applies to all interactions with The Proton VPN Australia, including our website (theprotonvpnaustralia.com.au), our VPN applications, and any related support services. Understanding the defined terms is critical to interpreting our commitments accurately.
| Term | Definition & Operational Meaning |
|---|---|
| Personal Information | Information or an opinion about an identified individual, or an individual who is reasonably identifiable. For our service, this primarily includes account information (email, payment data) and limited connection metadata (timestamp of last login, subscription status). It explicitly excludes your browsing history, destination IP addresses, and DNS queries. |
| VPN Service Data | Data related to the operation of the VPN tunnel. We adhere to a strict no-logs policy. We do not log IP addresses you assign, your original IP address after a session ends, browsing history, traffic destination, or data content. |
| Aggregate Data | Non-personally identifiable information used for analytical purposes. E.g., "97.8% of connections to our Sydney-3 server cluster are for streaming protocols." This data cannot be reverse-engineered to identify you. |
| APPs (Australian Privacy Principles) | The thirteen principles governing the handling of personal information by Australian organisations. They cover collection, use, disclosure, quality, security, access, and correction. Our policy is structured to demonstrate compliance with each relevant APP. |
The Proton VPN Australia is operated by an entity subject to Australian law. This is a fundamental differentiator from many VPN providers based in jurisdictions with weaker privacy frameworks or mandatory data retention laws. Our primary legal obligations are to the Privacy Act 1988 (Cth) and the Telecommunications (Interception and Access) Act 1979 (Cth). We structure our systems to technically and legally minimise data exposure. For instance, our payment processing is handled by PCI-DSS compliant third-party gateways, segregating financial data from our core service infrastructure.
We practice data minimisation. We collect only what is necessary for the provision, maintenance, and improvement of our service, and for legal compliance. The following table itemises collection points, data type, legal basis, and use case.
| Collection Point | Data Type Collected | Primary Purpose & Legal Basis | Retention Period |
|---|---|---|---|
| Account Registration | Email address, hashed password. | Service provision (APP 6.1(a)), account authentication and recovery. We use the email for essential communications (invoices, critical security notices). | For the duration of your account plus 30 days post-cancellation, after which it is anonymised, unless longer retention is required by law (e.g., for financial record-keeping under the *Taxation Administration Act 1953*). |
| Payment Processing | Payment gateway transaction ID, plan type, amount (A$), date. We do not store credit card numbers or bank account details. | Fulfilment of contract (APP 6.1(b)), financial accounting and fraud prevention. This data is processed by our third-party payment partners (e.g., Stripe, PayPal). | 7 years as required by Australian financial regulations for audit purposes. |
| Website Analytics | Aggregate, non-identifying data: browser type, device type, country-level location (from IP), pages visited. We use tools configured to respect Do Not Track signals and avoid user profiling. | Service improvement (APP 6.2(a)). To understand website performance and feature usage without identifying individuals. | 26 months, after which data is automatically purged. |
| Support Enquiries | Email address, correspondence content, and any diagnostic data you voluntarily provide. | Providing customer support (APP 6.1(a)). We use this data to resolve your specific issue. | 2 years from ticket resolution, to maintain a history of support interactions and improve our support centre resources. |
Security is not an abstract promise but a series of implemented technical and organisational controls. We protect personal information from misuse, interference, loss, and unauthorised access, modification, or disclosure (APP 11).
| Control Area | Implementation | Rationale & Standard |
|---|---|---|
| Encryption in Transit | All data between your device and our servers uses AES-256-GCM encryption with Perfect Forward Secrecy (PFS), using protocols like WireGuard® and OpenVPN. | Military-grade encryption ensures data cannot be intercepted. PFS means a compromised key cannot decrypt past sessions. This is standard for high-assurance VPNs but contrasts with weaker protocols sometimes used by lower-tier providers. |
| Encryption at Rest | Any stored personal information (e.g., account database) is encrypted using industry-standard algorithms. Cryptographic keys are managed via a secure, segregated key management service. | Protects against data breaches from physical or logical access to storage media. Aligns with the *Essential Eight* mitigation strategies from the Australian Cyber Security Centre (ACSC). |
| Network Security | Our infrastructure is protected by firewalls, intrusion detection/prevention systems (IDS/IPS), and regular vulnerability scans. Our servers run on RAM-disk mode where possible, meaning no data persists on hard drives after a reboot. | Minimises attack surface. RAM-disk operation is a technical measure that physically enforces our no-logs policy; data simply cannot be retained. |
| Access Control | Strict principle of least privilege. Employee access to user data is logged, audited, and requires multi-factor authentication (MFA). Access is granted only for specific, authorised tasks. | Prevents insider threats and limits damage from credential compromise. This is a procedural control often overlooked in smaller VPN operations. |
We have a formal incident response plan. In the unlikely event of an eligible data breach under the *Privacy Amendment (Notifiable Data Breaches) Act 2017*, we will comply with all legal obligations. This includes containing the breach, assessing the risk of serious harm, and notifying affected individuals and the Office of the Australian Information Commissioner (OAIC) as required.
Frankly, the architecture of our service limits the impact of any potential breach. A breach of a VPN server would yield no user activity logs. A breach of our account database would yield email addresses and encrypted data, but not browsing histories or original IP addresses.
You have specific rights regarding your personal information under the APPs. We also operate with transparency about when disclosure might be legally compelled.
| Your Right (APP) | How to Exercise It | Our Commitment & Limitations |
|---|---|---|
| Access (APP 12) To request access to the personal information we hold about you. |
Submit a verifiable request via our contact portal. We will respond within a reasonable period (usually 30 days). | We will provide the information free of charge, in a commonly used electronic format. We may refuse if providing access would reveal a commercially sensitive decision-making process or is otherwise unlawful. |
| Correction (APP 13) To request correction of inaccurate, out-of-date, incomplete, irrelevant, or misleading personal information. |
Notify us via your account settings or our support channel. Provide evidence of the correct information. | We will take reasonable steps to correct the information. If we disagree, you may request a statement of correction be associated with the data. We will notify relevant third parties if practicable and required by law. |
| Deletion / Anonymisation To request erasure of your personal information. |
Cancel your account via the dashboard. You may also submit a specific request. | We will anonymise your account data after the operational retention period (see 2.1). Due to our no-logs policy, there is no VPN usage data to delete. Financial records must be retained for 7 years by law. |
| Complaint To lodge a complaint about a perceived privacy breach. |
Contact us first. If unsatisfied, you may complain to the Office of the Australian Information Commissioner (OAIC). | We have a dedicated process for privacy complaints. We will investigate and respond, outlining any remedial actions. We view this as a critical feedback mechanism. |
This policy is a living document. It will evolve to reflect changes in our services, technology, and the legal landscape. We do not make changes retroactively without consent unless required by law.
We will notify users of material changes via email (to the address on file) and/or a prominent notice on our website at least 30 days before the changes take effect. "Material" changes include any expansion of the types of personal information collected, a change in the primary use of that information, or a significant alteration in your rights.
The updated policy will be posted on this page with a revised "Last Updated" date. Your continued use of our services after the effective date constitutes acceptance of the updated policy.
| Version | Last Updated | Summary of Material Changes |
|---|---|---|
| 2.1 | [Current Date] | Initial publication for The Proton VPN Australia, localised to Australian law and context. |
For privacy-specific enquiries, access/correction requests, or complaints:
The Privacy Officer
The Proton VPN Australia
Email: [email protected] (preferred for security)
Postal: [Our Registered Australian Business Address]
You can also contact our general support team for non-privacy issues.
If you are not satisfied with our handling of your complaint, you may contact the Office of the Australian Information Commissioner (OAIC):
OAIC
GPO Box 5218, Sydney NSW 2001
Phone: 1300 363 992
Website: oaic.gov.au
Last Updated: [Current Date]
Join thousands of Australians who trust The Proton VPN for their online privacy and freedom.
30-day money-back guarantee • No credit card required for trial