Enterprise-Grade Security & Privacy

Your data security and privacy are our highest priorities. Text Reload Limited implements industry-leading security measures and maintains strict data protection standards to ensure your information remains secure, private, and always under your control.

Important Note About Data Access

Text Reload maintains strictly read-only access to your accounting package data. We cannot modify any financial records, invoices, or customer information in your accounting system. This read-only limitation is enforced at the API level, ensuring the complete integrity of your financial data.

Your Data is Always Yours

Complete Data Ownership

Your data belongs to you, not us. We never claim ownership of your information and act solely as a secure custodian while providing our services.

No Data Sharing or Selling

We never share, sell, or monetize your data with third parties. Your information is used exclusively to provide you with our SMS automation services.

AI Model Protection

We do not use your data to train our AI models or improve our algorithms. Your business information remains private and is never used for machine learning purposes.

Instant Data Deletion

When you delete your account, all data we hold on your behalf is immediately and permanently deleted from our systems. No exceptions, no retention periods.

Infrastructure Security & Isolation

Text Reload Limited is built on Amazon Web Services (AWS), leveraging their world-class security infrastructure and compliance certifications. Our infrastructure is continuously monitored and updated to maintain the highest security standards.

Account Sandboxing

Every customer account operates in its own secure sandbox environment, ensuring complete isolation from other users' data and processes.

Virtual Network Segmentation

Our servers use advanced virtual segmentation technology to create isolated network zones, preventing any cross-contamination between customer environments.

New Zealand Data Protection Compliance

Privacy Act 2020 Compliance

As a New Zealand-based company, Text Reload Limited operates under the Privacy Act 2020, one of the world's most comprehensive privacy protection frameworks. This means we're legally bound to protect your personal information and give you control over how it's used.

Your Privacy Rights

Under New Zealand law, you have the right to access, correct, or delete your personal information at any time. We make exercising these rights simple and straightforward - just contact our support team.

Transparent Data Handling

We take data privacy very seriously and believe in complete transparency. We clearly explain what data we collect, how we use it, and who has access to it. There are no hidden practices or unclear terms.

Data Encryption

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.2+. Your sensitive information remains secure throughout its lifecycle.

Secure Access

Multi-factor authentication (MFA), role-based access control, and secure password policies ensure only authorized users can access your data.

SSL/TLS Security

All communications are protected with bank-grade SSL/TLS encryption, ensuring secure data transmission between your browser and our servers.

Data Protection

Regular backups, data redundancy, and strict access controls help maintain data integrity and availability at all times.

Privacy Compliance

We adhere to New Zealand's Privacy Act 2020 and international privacy standards to ensure your data handling meets the highest regulatory requirements.

24/7 Monitoring

Continuous security monitoring, automated threat detection, and incident response ensure your data is protected around the clock.

Integration Data Protection

Read-Only Access to Your Data

Text Reload maintains a read-only mirror copy of your integration data from Xero, XPM, and other connected systems. No modifications to your billing, invoicing, or accounting data can be made through our system - not even by you. This ensures the integrity of your financial records while allowing us to provide automated messaging services.

Secure Data Synchronization

Our integrations with Xero, XPM, and other platforms use official APIs and secure authentication methods. Data synchronization is performed using encrypted connections, ensuring your financial information remains protected at all times.

Zero Retention Policy

Integration Disconnection

When you disconnect any integration (Xero, XPM, or other platforms), all data from that integration is immediately and permanently deleted from our systems. We maintain a strict zero-retention policy - no data is kept, archived, or backed up after disconnection.

Complete Data Purge

This includes all customer records, invoices, contacts, and any other information that was synchronized from your disconnected integration. Once disconnected, it's as if that data was never in our system.

Immediate Action

This deletion happens instantly upon disconnection - not after 30 days, not after a grace period. Your data is removed immediately and permanently, giving you complete control over your information.

Secure Payment Processing

Bank-Grade Payment Security

Text Reload Limited uses Stripe, a PCI Service Provider Level 1, for all payment processing and subscription handling. Your payment information is handled directly by Stripe's secure infrastructure - the same technology trusted by companies like Amazon, Google, and Microsoft. This ensures bank-grade security with features like 3D Secure authentication, real-time fraud detection, and compliance with global payment security standards.

We Never Store Your Payment Details

Your credit card information never touches our servers. All payment data is securely handled by Stripe's encrypted infrastructure, meaning we never see, store, or have access to your financial information.

Additional Security Measures

• Regular security audits and penetration testing

• DDoS protection and Web Application Firewall (WAF)

• Secure development practices and code reviews

• Employee security training and background checks

• Incident response and disaster recovery plans