Security

Last Updated: April 23, 2026

Phone-Check.app is built to protect account data, API credentials, billing workflows, and phone validation requests. This page summarizes the security practices we use without making extra audit-status claims that are not shown on the site.

Transport and infrastructure security

We use HTTPS for website and API traffic, apply security updates, monitor infrastructure health, and separate production systems from development workflows. Infrastructure changes are reviewed and managed through versioned configuration where practical.

API credentials

API keys should be treated like passwords. Store them in server-side environment variables or a secrets manager, rotate keys when team members change, and remove keys that are no longer used. Account owners can revoke compromised keys from the dashboard or by contacting support.

Access controls and monitoring

  • Administrative access is limited to authorized personnel with a business need.
  • Authentication, billing, and API systems are monitored for abuse and abnormal usage patterns.
  • Code changes are reviewed before deployment.
  • Dependencies and application surfaces are checked for known vulnerabilities.

Phone validation data

Phone numbers submitted for validation are processed to return validation results and operate the service. We design the product to avoid turning submitted validation lists into a customer database. Operational logs, aggregated metrics, billing records, and fraud-prevention records may be retained as described in the Privacy Policy.

Deleting account and removing data

You can request account deletion or personal data deletion from the settings area or by contacting support. Learn more here.

Security contact

Please send any security related information or inquiries (including vulnerability disclosures) tosecurity@phone-check.app