Security at 10-DLC.com

Your business data powers your 10DLC registration. We treat its protection as a core responsibility — not an afterthought. Here is exactly how we keep it safe.

Our Security Commitment

Security is built into every layer of our platform. From the moment you create an account to the second your campaign goes live, your data is protected by industry-standard safeguards designed for enterprise workloads.

We follow the principle of least privilege, encrypt everything we can, and continuously monitor our systems for threats. Our goal is simple: you should never have to worry about the safety of the information you entrust to us.

Data Encryption

In Transit

Every connection to our platform uses TLS 1.2 or higher. Whether you are accessing the dashboard, submitting a brand registration, or receiving webhook callbacks, your data is encrypted end-to-end.

At Rest

All stored data — including databases, backups, and uploaded documents — is encrypted with AES-256 encryption. Sensitive credentials such as API keys and OAuth tokens receive an additional layer of application-level encryption.

Infrastructure Security

Our platform runs on Amazon Web Services (AWS), leveraging their world-class physical security, redundancy, and compliance certifications. Key infrastructure practices include:

  • Isolated environments — Production, staging, and development systems are fully separated with independent credentials.
  • Network segmentation — Databases and internal services are not accessible from the public internet. Only authorized application servers can reach them.
  • Automated patching — Operating systems and dependencies are kept up to date with security patches applied regularly.
  • DDoS protection — Our infrastructure includes built-in protection against distributed denial-of-service attacks.

Access Controls

We enforce strict access controls so that only the right people can see the right data:

  • Role-based access (RBAC) — Every user is assigned a role with specific permissions. Brand users can only see their own data; administrators have defined, auditable access levels.
  • Audit logging — All significant actions — logins, data changes, permission updates — are recorded in an immutable audit log for review and compliance.
  • Session management — Sessions expire after a period of inactivity, and tokens are rotated regularly to limit the window of exposure.
  • Multi-factor authentication — MFA is available for all accounts and recommended for administrators and users handling sensitive data.

Compliance

We maintain policies and controls aligned with recognized security frameworks:

  • SOC 2 readiness — Our controls are designed around the SOC 2 Trust Services Criteria for security, availability, and confidentiality.
  • Data handling policies — We maintain documented policies for data classification, handling, and disposal that cover every stage of the data lifecycle.
  • Vendor security reviews — Third-party services we integrate with are evaluated for their security posture before adoption and reviewed regularly.

Data Retention & Deletion

We retain your data only as long as it is needed to provide our services or as required by law:

  • Active account data is retained for the duration of your subscription.
  • After account deletion, personal data is purged from production systems within 30 days.
  • Backups containing deleted data are rotated out within 90 days.
  • Audit logs are retained for a minimum of 12 months for compliance purposes.
  • You can request a full data export or deletion at any time by contacting our support team.

Incident Response

Despite our best efforts, no system is immune to every threat. We maintain a documented incident response plan so that if something does happen, we act quickly and transparently:

  1. Detection — Automated monitoring and alerting detect anomalies in real time.
  2. Containment — Affected systems are isolated immediately to prevent further impact.
  3. Investigation — Our team determines the scope, root cause, and impact of the incident.
  4. Notification — Affected customers are notified promptly with clear details about what happened and what we are doing about it.
  5. Remediation — We fix the root cause, harden our defenses, and publish a post-incident review when appropriate.

Contact Us About Security

If you have questions about our security practices or need to report a vulnerability, we want to hear from you:

Security inquiries: security@10-dlc.com

General support: support@10-dlc.com

We acknowledge all security reports within 24 hours and provide regular updates until the issue is resolved.

Frequently Asked Questions

Related Resources

Your Data Is Safe With Us

Register your brand and campaigns with confidence. Enterprise-grade security from day one.

Start Your Registration

Transparent pricing — no hidden fees. See the full process before you commit.