Legal

Security

We take the security of your data and API keys seriously. Here's how we protect them.

Last updated: 5 April 2026

Infrastructure

  • All services run on UK-region cloud infrastructure. Data never leaves British jurisdiction.
  • Traffic between clients and our API is encrypted with TLS 1.2 or higher.
  • Internal service-to-service communication is encrypted in transit.
  • Database backups are encrypted at rest with AES-256.
  • Production access is restricted to named engineers via short-lived, audited credentials.

API keys

  • API keys are displayed to you exactly once at creation. We never store the raw key.
  • Keys are hashed with SHA-256 before being written to our database.
  • If a key is compromised, you can revoke it instantly from the dashboard — it becomes unusable within seconds.
  • You can rotate keys without downtime by creating a new key before revoking the old one.
  • Keys take the form mv_live_<random> for production and mv_test_<random> for testing environments.

Authentication

  • Dashboard passwords are hashed with bcrypt (cost factor 12).
  • Sessions use cryptographically signed, server-validated tokens.
  • CSRF protection is applied to all state-changing dashboard actions.
  • We recommend using a strong, unique password and a password manager.

Data handling

  • Email addresses submitted via the API are processed in memory and not written to long-term storage.
  • We do not cache or persist verification results. A short-lived Redis job queue entry exists only until your result is returned to you, then it is cleared.
  • We do not build or sell lists of verified email addresses.
  • Our staff cannot access your API keys — only their hashes are stored.

Monitoring and incident response

  • We run 24/7 automated monitoring with alerting on anomalous traffic patterns.
  • Security incidents are logged and reviewed by our engineering team.
  • In the event of a data breach affecting your personal data, we will notify you within 72 hours in accordance with UK GDPR Article 33.
  • Post-incident reviews are conducted for any significant security events.

Responsible disclosure

We welcome reports from security researchers. If you discover a vulnerability in MailVerify, please report it responsibly to [email protected] before public disclosure. Please include:

  • A description of the vulnerability and potential impact.
  • Steps to reproduce or proof-of-concept (without accessing other users' data).
  • Your preferred contact details.

We will acknowledge your report within 2 business days and aim to resolve confirmed vulnerabilities within 30 days. We operate on a responsible disclosure basis — please give us time to patch before publishing.

We do not operate a formal bug bounty programme at this time, but we will acknowledge researchers publicly (with permission) and consider goodwill gestures for significant findings.

Compliance

  • ICO registered — registration number ZC112021.
  • We act as a UK GDPR data processor for customer email lists and a data controller for account data.
  • Data Processing Agreements (DPA) are available on request for business customers — email [email protected].
  • We are registered with Companies House under number 16061949.

Questions

For security questions or to request our DPA, contact [email protected] or visit our contact page.