Ethically-sourced proxies: Learn More External link arrow

Infatica SDK and Data Privacy

A Transparent Approach to App Monetization

The Infatica SDK provides application developers with a secure and transparent way to monetize their apps by allowing users to voluntarily contribute a small portion of their device’s internet bandwidth. This participation connects devices to the Infatica peer-to-business (P2B) network, enabling companies to access the web from diverse locations for legitimate business and research purposes.

Infatica’s approach is built around transparency, security, and respect for user privacy. Our SDK is developed and operated in accordance with internationally recognized standards and is part of Infatica’s broader compliance and ethical governance framework.

How the Infatica SDK Works

The Infatica SDK is a lightweight software library that developers can integrate into their applications. Once implemented, the SDK enables participating devices to become part of Infatica’s distributed network infrastructure, provided that users have given clear consent.

Organizations that access the network are able to view publicly available information across the web from different geographic locations. This capability supports many legitimate business functions, including building price aggregation platforms, conducting SEO research, monitoring brand presence online, and analyzing publicly accessible web content.

Access to the network is not open to anonymous or unverified users. Companies must undergo verification procedures before they are allowed to connect to the platform, helping ensure that the infrastructure is used responsibly.

User Consent and Participation

Participation in the Infatica network is always voluntary. Applications integrating the SDK must clearly disclose its presence and explain how participation works so that users can make an informed decision.

Users retain full control over their participation and can opt out at any time. The SDK is designed to operate in a way that does not interfere with the normal performance of a device or the primary function of the host application. Maintaining user autonomy and transparency is an essential part of Infatica’s ethical framework.

Protecting User Privacy

Respect for privacy is fundamental to the design of the Infatica SDK. The software does not collect personal user data, and its role is limited to enabling secure routing of network requests through participating devices.

Infatica’s policies and internal processes are aligned with global privacy regulations, including the General Data Protection Regulation (GDPR). The company’s compliance framework is designed to ensure that users’ rights are respected and that participation in the network does not compromise personal information.

Security and Threat Protection

Maintaining a safe environment for users and developers is a core priority. To strengthen the security of applications integrating the SDK, Infatica partners with Bitdefender, a global cybersecurity leader.

This collaboration helps identify and block potential threats that may appear in online traffic, including phishing attempts, malicious or unsafe websites, and other fraudulent activity. Combined with Infatica’s internal monitoring and security procedures, this partnership contributes to a safer browsing environment for network participants.

Compliance and Certification

The Infatica SDK is developed and operated within a governance framework that follows internationally recognized standards for security, privacy, and service management. Infatica holds multiple ISO certifications, including ISO/IEC 27001 for information security management, ISO/IEC 27701 for privacy information management, ISO 22301 for business continuity, and ISO/IEC 20000-1 for IT service management.

These certifications demonstrate that Infatica maintains structured processes for protecting information, managing operational risks, and ensuring reliable service delivery.

Responsible Network Governance

Infatica operates its peer-to-business network under a strict ethical code designed to prevent misuse and protect all participants. Customers seeking access to the network must first complete identity verification and provide details about their intended use cases.

Once access is granted, activity on the network is monitored for signs of suspicious or abusive behavior. If violations are detected, Infatica may investigate the activity and take appropriate action, including restricting or suspending access. These safeguards help maintain a network that is both reliable and ethically operated.