We follow the leading industry standards to protect your data. We continually add new security measures as they become available to ensure the highest standards of security.
Our data protection policy is available in our Terms & Conditions and reads as follows:
smrtPhone will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality, and integrity of your data.
The Services may be provided using equipment or facilities located in the European Union or the United States. The Supplier’s US service providers are either Privacy Shield compliant or have executed Standard Contractual Clauses (as approved by the European Commission) that provide legal grounds for assuring that, when processed in the United States, the personal data of EU citizens that are processed when using the Service will receive an adequate level of protection within the meaning of Article 46 of Regulation (EU) 2016/679 (General Data Protection Regulation).
By agreeing to these Terms, You grant smrtPhone a general authorization in the meaning of Article 28 (2) of Regulation (EU) 2016/679 to engage processors for the purposes of providing the Services. We will inform You of changes in such processors in accordance with the procedure of modifying these Terms.
List of Processors:
Amazon Web Services: Hosting services in the US and Germany (Privacy Shield certified).
Intercom: Support Chat, Sales Chat and transactional email automation (Privacy Shield certified).
Stripe: Payment gateway (PCI compliant and Privacy Shield certified).
Podio: Sales CRM tool (Privacy Shield certified).
Salesforce: MFA - multi-factor authentication requirement.
Twilio: VoIP provider that provides phone numbers and powers our calling, texting and Fax services. (Privacy Shield certified)
Trust Hub Business Profile Information
To gain access to verified voice and verified text services, we must collect business profile information. smrtPhone collects your business profile information for verification purposes only. We do not collect, share, or use the data for any other reason other than what is required to access telecom verification products and services.