Restricted Access Policy
To ensure service compliance and prevent abuse and fraud, we will verify user identities in accordance with relevant international Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations.
We offer four types of access policies:
Block Policy: In accordance with Thordata Compliance Norms, direct access to certain domain names is currently unavailable.
Verification Policy: Short KYC (Know Your Customer) verification is required for specific domain names, and normal access will be granted upon successful verification.
Application Policy: An access application must be submitted, and access permissions will be unlocked upon approval of the application.
Trusted Domain Access Policy: The system grants unrestricted access to whitelisted trusted domains.
Prevention of Improper Activities
Thordata has a built-in list of restricted access domain names, including but not limited to the following categories:
Category
Description
Government
Domain names of government agencies and public administration platforms worldwide
Military
Domain names related to military institutions and national defense
Finance
Domain names of financial institutions such as banks, payment and securities institutions
Communication
Domain names of mainstream international instant messaging tools
High-Risk Domains
Domains containing malware, phishing content and non-compliant information
KYC Verification Process
Submit identity information (personal/enterprise qualification certificates);
The system automatically verifies basic information (completed within 10 minutes);
Manual review will be initiated if the system verification fails;
Access permissions to the domain name will be granted upon successful verification.
Contact & Support
24/7 Live Chat: www.thordata.com
Email: [email protected]
FAQ
Why is identity proof required?
To ensure service compliance and prevent abuse and fraud, we need to verify user identities in accordance with international Anti-Money Laundering (AML) and Know Your Customer (KYC) regulatory requirements.
Who is required to complete the KYC process?
All individual and enterprise users who need to use proxy services must complete KYC verification.
What information do I need to provide?
Generally including:
Individual users: ID card, facial recognition verification, etc.;
Enterprise users: company business license, corporate account information, etc.
How long does it take for my KYC review to be approved?
Under normal circumstances, the review will be completed within 1-2 working days after you submit the complete information. Processing time may be slightly extended during peak periods, please wait patiently.
Last updated