Trust Center
How senderZ stays trustworthy
Messaging platforms have to earn their keep on trust first and features second. These pages document how senderZ handles the parts that matter most to enterprise and technical buyers.
Topics
Five pages.
No marketing fluff.
Each page documents what runs today, what is planned, and what stays the customer's responsibility.
Security
API key hashing, AES-256-GCM encryption, tenant isolation, and our vulnerability disclosure process.
ReadCompliance
TCPA and CTIA obligations, STOP keyword handling, quiet hours, and consent logging.
ReadPrivacy
Data categories, sub-processors, retention, and how we handle GDPR and CCPA requests.
ReadArchitecture
System topology, queue semantics, tenant isolation enforcement, and recovery time objectives.
ReadLimits
Per-plan caps, per-phone throughput, warming behavior, and the ceiling-increase process.
ReadRequest access
Need something formal?
We share our DPA, SOC 2 status, security questionnaire responses, and other formal materials under NDA. Email us or request access below.