Know Your Customer (KYC) Policy

Effective Date: January 1, 2026

1. Introduction and Purpose

WATTENNE INTERNATIONAL LLC ("Company," "we," "us," or "our") is a US-based entity organized under the laws of Wyoming. While we are committed to user privacy and data minimization, we are equally committed to preventing our services—including our proxy networks and API infrastructure—from being used for illicit purposes such as identity theft, financial fraud, money laundering, or sanctions evasion.


This KYC Policy outlines our "Risk-Based Approach" to identity verification. Unlike traditional financial institutions, we do not require identity verification for every user. Instead, we employ a tiered system that triggers verification requests only when necessary based on transaction volume, payment method risk, or behavioral patterns.

2. Tiered Verification Levels

We categorize users into tiers based on the risk profile associated with their payment method and usage volume.


2.1. Standard Users (Unverified)

By default, users may register and purchase services without submitting identity documents, provided they remain below specific risk thresholds.

  • Eligibility: Users paying via cryptocurrency or standard volume credit card transactions.
  • Requirements: Valid email address and successful payment authorization.
  • Limitations: May be subject to daily/monthly spending limits or bandwidth caps to mitigate risk.

2.2. Verified Users

KYC verification becomes mandatory for users who wish to unlock higher operational limits or who trigger our risk thresholds.

  • Triggers: High-volume purchasing, requests for higher concurrent connection limits, or specific enterprise/reseller agreements.

3. The "Right to Demand" (Mandatory Triggers)

To ensure the security of our network and compliance with US law, we reserve the right to trigger a mandatory KYC check on ANY user at any time, regardless of payment method (including Cryptocurrency).


We may suspend services and demand identity verification if our automated systems or compliance team detect:

  • High-Risk Traffic: Traffic targeting financial institutions, government portals, or known carding/fraud endpoints.
  • Abnormal Usage: Bandwidth consumption or concurrency levels inconsistent with the purchased plan or typical human behavior.
  • Geographic Risk: Connections originating from or routing to high-risk jurisdictions as defined by the FATF or internal risk assessments.
  • Payment Irregularities: Multiple failed payment attempts, mismatched billing details (AVS errors), or use of prepaid/virtual cards often associated with fraud.

Failure to comply with a KYC demand within the specified timeframe will result in immediate account termination and forfeiture of any remaining balance, in accordance with our Terms of Service.

4. Verification Procedures and Third-Party Reliance

4.1. Information Collected

When KYC is triggered, we may request the following:

  • Full Legal Name.
  • Date of Birth.
  • Physical Residential Address (PO Boxes are not accepted).
  • Government-issued Photo ID (Passport, Driver’s License, or National ID).
  • Live "Selfie" or biometric check to verify liveness and document ownership.

4.2. Trusted Third-Party Provider (Persona Identities, Inc.)

We partner with Persona Identities, Inc. (or similar industry-leading identity verification vendors) to process document verifications.

  • Data Security: WATTENNE INTERNATIONAL LLC does not store your raw ID files (e.g., images of your passport) on our own servers. These documents are processed securely by our third-party provider via API.
  • Privacy: We only retain the status of the verification (e.g., "Verified" or "Rejected") and the metadata necessary for audit trails, in compliance with our Privacy Policy.

5. Sanctions and OFAC Compliance

As a United States company, WATTENNE INTERNATIONAL LLC strictly adheres to the economic sanctions programs administered by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC).


5.1. Prohibited Jurisdictions

We do not service users located in, ordinarily resident in, or organized under the laws of countries or regions subject to comprehensive US sanctions. This includes, but is not limited to:

  • Iran
  • North Korea (DPRK)
  • Cuba
  • Syria
  • Russia and Belarus
  • The Crimea, Donetsk, and Luhansk regions of Ukraine

5.2. Specially Designated Nationals (SDN)

We screen users against the Specially Designated Nationals and Blocked Persons List (SDN List). Any account identified as being owned or controlled by an individual or entity on the SDN list will be immediately terminated, and funds may be frozen or blocked as required by US law.

6. Integration with Terms of Service

This KYC Policy is incorporated by reference into the WATTENNE INTERNATIONAL LLC Terms of Service.

  • Data Handling: All personal data collected during the verification process is handled in strict accordance with our Privacy Policy.
  • Enforcement: Providing false, manipulated, or stolen documents is a material breach of our Terms of Service. Such actions will result in a permanent ban and may be reported to relevant law enforcement agencies.

7. Contact Information

If you have questions regarding this policy or a pending verification request, please contact our Compliance Team:


WATTENNE INTERNATIONAL LLC
Compliance Department
30 N Gould St Ste N, Sheridan, WY 82801, USA
Email: [email protected]

Databay X Incogniton

Databay X Incogniton

We're excited to announce a transformative partnership between Databay, offering over 23M+ real-device residential proxies, and Incogniton, the pioneering anti-detect browser. This...

Read now
How to Use Proxies for Web Scraping

How to Use Proxies for Web Scraping

Residential proxies can be used to conduct effective web scraping activities, providing businesses with valuable data for market research and lead generation. By using residential ...

Read now
How Proxies Can Help You Bypass Firewalls?

How Proxies Can Help You Bypass Firewalls?

Residential proxies allow businesses to bypass firewalls and filters, access online resources, and conduct data scraping and online advertising. By masking users' real IP addresses...

Read now

Get Started with Databay Today

Our services provide you with secure and reliable internet access no matter where you are. We do this by acting like a bridge — called a proxy — that helps you connect with over 23 million devices worldwide. This means you can browse the web, access geo-restricted content, and more, all while keeping your connection secure.