When you are working with a VPN solution, you need to identify what it is that you are trying to protect. Are you trying to hide your traffic? Are you trying to appear as through you're working from a different part of the planet? Are you trying to protect data transmissions? There are many reasons to use a VPN, but there is a bit of a gotcha.
VPN tunneling is a great method to ensure that your traffic from point a to point be is encrypted. This is really what it was designed do to. This allows an end user on an encrypted network (like a coffee shop) to connect to a remote location, secure that connection and send only encrypted data. It's a great way to ensure that your local packet sniffer is unable to retrieve any of your transmitted data.
On the other hand, VPN tunneling is not meant to be a disguise for who you are or the activity you make. There are multiple ISPs involved, local host logs, remote host logs, and connection logs on your final destination as well. If we have learned anything from the many security leaks about the NSAs surveillance networks, it's that just knowing source and destination and frequency can be enough to spark interest.
Insult to injury, services like this cannot really guarantee that there are no logs. They probably can't even guarantee that they don't have a connection with a government to turn over access to systems if a warrant is served. There have been many precedents in fact when VPN services have provided logs to local authorities for review. It's just how the system works.
As a result, I don't buy in to the VPN/proxy solution for personal use. The only reason I could really think of having one is if I was forced to work out of coffee shops regularly and wanted to ensure the data I was transmitting couldn't be sniffed. You have to trust, but can't verify. It doesn't really protect your identity, and is only secure from your machine to the service. What they do beyond that is out of your control.