How We Protect Your Data
When you upload your email list to Valid Email Checker, you're trusting us with valuable data.
We don't take that lightly.
This page explains exactly how we protect your information—no vague promises, no marketing fluff. Just the facts about our security practices.
Enterprise-Grade Infrastructure
Valid Email Checker is built on world-class cloud infrastructure.
Our platform runs on a combination of Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—the same providers trusted by banks, governments, and Fortune 500 companies.
Global Network
Our infrastructure spans:
- 126 Points of Presence worldwide
- 94 cities across 51 countries
- 19 compute-capable regions for fast, reliable performance
What does this mean for you? Your verification requests are processed quickly, reliably, and securely—no matter where you're located.
Why This Matters
When you hear "cloud hosting," you might wonder if that's really secure. Here's the thing: AWS, Azure, and GCP invest billions of dollars in security every year. They employ thousands of security engineers. They maintain certifications that would be impossible for any single company to achieve on its own.
By building on their infrastructure, we inherit world-class physical security, network security, and operational security—without cutting corners.
Data Encryption
Your email lists are encrypted both when they're moving and when they're stored.
Encryption in Transit (SSL/TLS)
Every connection to Valid Email Checker is protected by SSL/TLS encryption.
You'll notice the padlock icon in your browser when you visit our site. That's not just for show—it means all data traveling between your computer and our servers is encrypted. No one can intercept or read your information while it's in transit.
This applies to:
- File uploads
- API requests
- Dashboard access
- Account information
If anyone tried to eavesdrop on your connection, they'd see nothing but scrambled data.
Encryption at Rest (AES-256)
When your data is stored on our servers, it's protected by AES-256 encryption—the same standard used by banks, military organizations, and government agencies worldwide.
AES-256 is considered unbreakable with current technology. To put it in perspective: there are more possible AES-256 keys than there are atoms in the observable universe.
Your email lists don't sit on our servers in plain text. They're encrypted the moment they arrive and stay encrypted until they're deleted.
Automatic Data Deletion
We don't keep your data any longer than necessary.
15-Day Retention Policy
All uploaded files and verification results are automatically deleted after 15 days.
This gives you plenty of time to:
- Review your results
- Download your cleaned list
- Re-download if needed
After 15 days, the data is gone. Not archived. Not moved to backup storage. Permanently deleted.
Manual Deletion Anytime
Don't want to wait 15 days? You can delete your files immediately.
- Go to Uploads & Results in your dashboard
- Find the file you want to remove
- Click the Delete button
That's it. Your data is erased instantly and permanently.
Why We Do This
Some services keep your data indefinitely. We think that's unnecessary and risky.
The longer data exists, the greater the chance something could go wrong—a breach, a leak, an unauthorized access. By automatically deleting data after 15 days, we minimize risk for both you and us.
You uploaded your list to verify it, not to store it with us forever. Once you've got your results, there's no reason for us to keep your data.
We Never Share or Sell Your Data
Let's be absolutely clear: we will never sell, share, rent, or trade your email lists with anyone.
Not with marketing companies. Not with data brokers. Not with "partners." Not with anyone.
Your data is yours. We verify it and give you the results. That's the extent of our relationship with your information.
No Third-Party Access
We don't give third parties access to your email lists. The only people who can see your data are you (through your account) and our verification systems (to process your request).
No Data Mining
We don't analyze your lists for marketing purposes. We don't build profiles based on your contacts. We don't use your data for anything other than verification.
We Never Email Your Contacts
Some verification services send test emails to addresses on your list. We think that's invasive and potentially harmful.
Valid Email Checker never sends a single email to any address you upload.
Our verification process uses:
- SMTP handshakes
- Server checks
- Domain verification
- MX record analysis
These techniques verify email addresses without actually sending anything. Your contacts will never know they were verified, and your sender reputation stays intact.
Account Security Features
Beyond protecting your data, we also help you protect your account.
Two-Factor Authentication (2FA)
Add an extra layer of security to your account with two-factor authentication.
When enabled, you'll need both your password and a verification code to log in. Even if someone gets your password, they can't access your account without the second factor.
We support:
- Google Authenticator – App-based codes
- Email verification – Codes sent to your email
→ Enable 2FA in Account Settings
Session Management
You can view and manage all active sessions on your account.
See something suspicious? You can log out of any session remotely. This is especially useful if you:
- Forgot to log out on a shared computer
- Lost a device
- Notice unfamiliar login activity
Secure Password Requirements
We enforce strong password requirements to keep your account safe:
- Minimum length requirements
- Complexity recommendations
- Secure password hashing (we never store your password in plain text)
Full Account Deletion
Want to leave? You can delete your account yourself—no need to contact support.
How to Delete Your Account
- Go to Account Settings → Profile
- Scroll to the bottom of the page
- Click the red Delete My Account button
- A confirmation popup will appear
- Type DELETE to confirm
- Click the Delete button
That's it. Your account is permanently deleted.
What Gets Deleted
When you delete your account, everything is erased:
- Your profile information
- Your verification history
- Your uploaded files and results
- Your credits (unused credits are forfeited)
- Your billing records (except what we're legally required to retain)
Once you delete your account, there is no going back. All your data, credits, and verification history will be permanently deleted. Make sure you've downloaded any results you need before deleting.
This isn't a "soft delete" where your data sits in a hidden archive. It's complete, permanent erasure.
Security Certifications
Our infrastructure providers maintain rigorous security certifications:
| Certification | What It Means |
|---|---|
| ISO 27001 | International standard for information security management |
| SOC 2 Type 2 | Independent audit of security, availability, and confidentiality controls |
| PCI DSS | Payment Card Industry Data Security Standard compliance |
| GDPR | European Union data protection regulation compliance |
These certifications require regular audits, documented procedures, and continuous monitoring. They're not self-declared—they're verified by independent third parties.
DDoS Protection & Firewall
Our platform includes built-in protection against attacks:
DDoS Mitigation
Distributed Denial of Service (DDoS) attacks try to overwhelm websites with traffic. Our infrastructure automatically detects and blocks these attacks, keeping the service available for legitimate users.
Web Application Firewall (WAF)
Our firewall protects against common web attacks like:
- SQL injection
- Cross-site scripting (XSS)
- Malicious bot traffic
These protections run automatically—you don't need to configure anything.
Privacy-First Approach
We follow data protection best practices aligned with major privacy regulations:
Data Minimization
We only collect what's necessary to provide our service. We don't ask for information we don't need, and we don't keep data longer than required.
Purpose Limitation
Your email lists are used for one purpose: verification. We don't repurpose your data for marketing, analytics, or anything else.
Transparency
We're upfront about our practices. This page exists because we believe you have the right to know exactly how your data is handled.
User Rights
You have control over your data:
- Access – View what data we have about you
- Correction – Update inaccurate information
- Deletion – Remove your data anytime
- Portability – Download your verification results
What About the Emails Themselves?
You might wonder: do we actually look at the email addresses you upload?
Our systems process your email addresses automatically to verify them. This is necessary—we can't verify an email without knowing what it is.
However:
- No human reviews your lists manually
- We don't analyze the content of your lists
- We don't build databases from your contacts
- Everything is deleted after 15 days (or sooner if you delete it)
The verification process is automated, and your data is treated as confidential throughout.
The Bottom Line
Here's a summary of how we protect your data:
| Protection | How We Do It |
|---|---|
| Infrastructure | AWS, Azure, GCP – enterprise-grade cloud providers |
| Encryption in Transit | SSL/TLS on all connections |
| Encryption at Rest | AES-256 – military-grade encryption |
| Data Retention | 15 days, then automatic deletion |
| Manual Deletion | Delete your files anytime, instantly |
| Data Sharing | Never – we don't sell or share your lists |
| Email to Contacts | Never – we verify without sending |
| Account Security | 2FA, session management, secure passwords |
| Account Deletion | Full erasure available on request |
| Attack Protection | DDoS mitigation, Web Application Firewall |
We've built Valid Email Checker with security as a foundation, not an afterthought. Your data is protected at every step.
Questions?
If you have questions about our security practices or data handling, we're happy to answer them.