Your data security is our top priority. Text Reload implements industry-leading security measures to ensure your information is protected at all times.
Text Reload is built on Amazon Web Services (AWS), leveraging their world-class security infrastructure and compliance certifications. Our infrastructure is continuously monitored and updated to maintain the highest security standards.
All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.2+. Your sensitive information remains secure throughout its lifecycle.
Multi-factor authentication (MFA), role-based access control, and secure password policies ensure only authorized users can access your data.
All communications are protected with bank-grade SSL/TLS encryption, ensuring secure data transmission between your browser and our servers.
Regular backups, data redundancy, and strict access controls help maintain data integrity and availability at all times.
We adhere to GDPR, CCPA, and other privacy regulations to ensure your data handling complies with global standards.
Continuous security monitoring, automated threat detection, and incident response ensure your data is protected around the clock.
Text Reload maintains a read-only mirror copy of your Xero data. No modifications to your billing, invoicing, or accounting data in Xero can be made through our system - not even by you. This ensures the integrity of your financial records while allowing us to provide automated messaging services.
Our integration with Xero uses official APIs and secure authentication methods. Data synchronization is performed using encrypted connections, ensuring your financial information remains protected at all times.
Text Reload uses Stripe, a PCI Service Provider Level 1, for all payment processing and subscription handling. Your payment information is handled directly by Stripe's secure infrastructure, used by companies like Amazon, Google, and Microsoft. This ensures bank-grade security with features like 3D Secure authentication, real-time fraud detection, and compliance with global payment security standards.
• Regular security audits and penetration testing
• DDoS protection and Web Application Firewall (WAF)
• Secure development practices and code reviews
• Employee security training and background checks
• Incident response and disaster recovery plans