ZeroBounce is a leading online email validation system created to ensure that companies sending complex and high volume emails avoid deliverability issues. The system works by reducing and eliminating invalid, abuse, complaint, inactive, and spam-trap email addresses. These are email addresses that will either bounce or contribute to ruining your sending reputation. ZeroBounce also provides IP address validation and verification of key recipient demographics and has the ability to add missing information on certain emails, such as the name, gender and location of the owner.
We created a guide to help you navigate everything you need to be aware of when sending emails. It's the most comprehensive guide you'll find on the internet and we offer it for free, without any restrictions. You can read it here: THE COMPLETE GUIDE TO IMPROVE INBOX AND DELIVERABILITY
ZeroBounce is the most secure email validation system you can find. For us, the protection of your data comes first, so we don't cut cost in keeping it safe. We are registered with the BBB and approved for the EU Privacy Shield. We maintain enterprise contracts with all of our vendors, we operate our own data center and own our servers and hardware. We don't use third-party services, like Amazon, Azure, and other cloud services providers, to store your data.
We'll get you up and validating with us really fast! Simply click this link for a walk-through on our validation service: Validation Process
- Florida : 1489 W Palmetto Park Rd, 5th Floor, Boca Raton, Florida, 33486, US.
- California : 10 E Yanonali St, Santa Barbara, CA, 93101, US
- Sales : 1-888-500-9521 (9-5 PST)
- Email : email@example.com
- Technical Support 24/7 (only via email) : firstname.lastname@example.org
Support Options: /contact-us.html
At ZeroBounce, we take data protection very seriously and we are committed to keep your information safe from harm. We are using one of the most efficient content delivery network systems in the world, supported by CloudFlare. This system ensures additional defense against cyber attacks and data breaches, thanks to the Advanced Firewall. Furthermore, we are one of the few email verification services that use a military grade encryption algorithm to safeguard your files and personal information. Whenever you upload a file on our server, we encrypt it using a unique key. Once our email verifier validates that file, we re-encrypt it and protect it with a password that only you have access to. This additional step keeps your data secure during the process of email validation.
At ZeroBounce we go out of our way to protect your data and we developed advanced defense mechanisms against misuse, loss, unauthorized access and improper disclosure. We want to provide the same security that we would want for ourselves. Our customers feel safe knowing that the best email verification services is also the most secure.
You can find the official policy here: /privacy-policy.html
You can find the official Terms and Conditions here: /terms-of-use.html
Acceptable Use and Anti-Abuse Policy
Zerobounce is committed to protecting consumer privacy while recognizing the importance of the open internet and free flow of information and data. Zerobounce provides various tools to validate data (the “Services”) and expects that those Services will only be used for lawful and legitimate purposes.
The purpose of this Acceptable Use and Anti-Abuse Policy is to outline the acceptable use of the Zerobounce Services. This policy applies to all uses of the Services and any interaction with Zerobounce’s systems, interface, network and database.
The following activities are, in general, prohibited. Under no circumstances are any customers of Zerobounce authorized to use the Services to:
- engage in any activity that is illegal under local, state, federal or international law;
- send unsolicited email messages in violation of applicable law, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material (email spam);
- engage in any form of harassment, discrimination or other abusive behavior;
- breach or invade the privacy rights of any natural person;
- engage in phishing (any activity designed to trick persons into divulging sensitive data such as usernames, passwords, or financial data); or
- engage in any other activity generally deemed to be internet abuse.
Zerobounce reserves the right to refuse service to any person or company, for any reason, including but not limited to, any customer or potential customer that Zerobounce suspects will use or has used the Services in violation of this policy and may terminate your access to the Services at any time in its sole discretion. In the event Zerobounce suspects its Services have been, or will be, used for any purpose that is in violation of the law or this policy, Zerobounce reserves the right to disclose all available information to law enforcement or government officials.
Reports of abuse should be sent to email@example.com.
PDF Version: Data Processing Agreement
Data Processing Agreement
The company whose information has been provided as part of the registration process and who will electronically sign this DataProcessing Agreement (hereinafter to be referred to as: the “Data Controller”),
Hertza, L.L.C., a Nevada limited liability company, doing business as “ZeroBounce”, and having its principal place of business at 10 E. Yanonali St., Santa Barbara, California 93101 (hereinafter to be referred to as: the “Data Processor”).
HEREBY AGREE AS FOLLOWS:
1. Subject matter of this Data Processing Agreement
This Data Processing Agreement applies exclusively to the processing of personal data that is subject to EU Data Protection Law in the scope of the Terms and Conditions of Use Agreement of even date hereof between the parties for the provision of the ZeroBounce services (“Services”) (hereinafter to be referred to as: the“Service Agreement”).
The term EU Data Protection Law shall mean Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
Terms such as “Processing”, “Personal Data”, “Data Controller” and “Processor” shall have the meaning ascribed to them in the EU Data Protection Law.
Insofar as the Data Processor will be processing Personal Data subject to EU Data Protection Law on behalf of the Data Controller in the course of the performance of the Service Agreement with the Data Controller the terms of this Data Processing Agreement shall apply. The categories of Personal Data to be processed includes: first name; last name; gender; city; state; country; Internet Protocol (IP) Address information; and email addresses. The types of data subjects whose information will be processed are individuals. The purposes for which the personal data will be processed include: validation of email lists for deliverability; and removal of known email complainers, abusers and spam traps from email address lists.
2. The Data Controller and the Data Processor
The Data Controller will determine the scope, purposes, and manner by which the Personal Data may be accessed or processed by the Data Processor. The Data Processor will process the Personal Data only as set forth in Data Controller’s written instructions.
The Data Processor will only process the Personal Data on documented instructions of the Data Controller in such manner as – and to the extent that – this is appropriate for the provision of the Services, except as required to comply with a legal obligation to which the Data Processor is subject. In such a case, the Data Processor shall inform the Data Controller of that legal obligation before processing, unless that law explicitly prohibits the furnishing of such information to the Data Controller. The Data Processor shall never process the Personal Data in a manner inconsistent with the Data Controller’s documented instructions. The Data Processor shall immediately inform the Data Controller if, in its opinion, an instruction infringes this Regulation or other Union or Member State data protection provisions.
The Parties have entered into a Service Agreement in order to benefit from the expertise of the Processor in securing and processing the Personal Data for the purposes set out in Section 1.4. The Data Processor shall be allowed to exercise its own discretion in the selection and use of such means as it considers necessary to pursue those purposes, subject to the requirements of this Data Processing Agreement.
Data Controller warrants that it has all necessary rights to provide the Personal Data to Data Processor for the Processing to be performed in relation to the Services. To the extent required by EU Data Protection Law, Data Controller is responsible for ensuring that any necessary data subject consents to this Processing are obtained, and for ensuring that a record of such consents is maintained. Should such a consent be revoked by the data subject, Data Controller is responsible for communicating the fact of such revocation to the Data Processor, and Data Processor remains responsible for implementing any Data Controller instruction with respect to the further processing of that Personal Data.
Without prejudice to any existing contractual arrangements between the Parties, the Data Processor shall treat all Personal Data as strictly confidential and it shall inform all its employees, agents and/or approved sub- processors engaged in processing the Personal Data of the confidential nature of the Personal Data. The Data Processor shall ensure that all such persons or parties have signed an appropriate confidentiality agreement, are otherwise bound to a duty of confidentiality, or are under an appropriate statutory obligation of confidentiality.
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, without prejudice to any other security standards agreed upon by the Parties, the Data Controller and Data Processor shall implement appropriate technical and organizational measures to ensure a level of security of the processing of Personal Data appropriate to the risk. These measures shall include as appropriate:
- measures to ensure that the Personal Data can be accessed only by authorized personnel for the purposes set forth in Section 1.4 of this Data Processing Agreement;
- in assessing the appropriate level of security account shall be taken in particular of all the risks that are presented by processing, for example from accidental or unlawful destruction, loss, or alteration, unauthorized or unlawful storage, processing, access or disclosure of Personal Data;
- the pseudonymization and encryption of personal data;
- the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- the ability to restore the availability and access to personal data in a timely manner in the event of physical or technical incident;
- a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing of Personal Data;
- measures to identify vulnerabilities with regard to the processing of Personal Data in systems used to provide services to the Data Controller; or
- ZeroBounce takes the following security measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access:
- All Personal Data received hereunder will be stored and processed in the EU;
- In addition to the above, ZeroBounce is an active participant in the EU-US and Swiss-US Privacy Shield Programs;
- ZeroBounce has restricted access to four personnel members with the ability to directly access files containing personal information on ZeroBounce servers, each of whom have agreed to maintain the confidentiality of any personal information;
- All data uploads and downloads sent between ZeroBounce and its customers flow through third party CloudFlare’s servers in the EU;
- In addition to the above, CloudFlare is an active participant in the EU-US Privacy Shield Program;
- The ZeroBounce support team does not have access to CloudFlare;
- CloudFlare maintains its own security protections to block threats and limit abusive bots and crawlers. See https://support.cloudflare.com/hc/en-us/articles/205177068-Step-1-How-does-Cloudflare-work-
- Any information that is uploaded by a ZeroBounce customer to ZeroBounce.net is transmitted via SSL through CloudFlare, and all files are stored in an encrypted file using a standard algorithm for protection of stored data defined by IEEE P1619 on ZeroBounce servers in the EU; and
- If customer elects to receive files via email, such files shall be sent encrypted, with a password via a separate email.
The Data Processor shall at all times have in place an appropriate written security policy with respect to the processing of Personal Data, outlining in any case the measures set forth in Article 4.1.
At the request of the Data Controller, the Data Processor, shall demonstrate the measures it has taken pursuant to this Article 4 shall allow the Data Controller to audit and test such measures. The Data Controller shall be entitled on giving at least 14 days’ notice to the Data Processor to carry out, or have carried out by a third party who has entered into a confidentiality agreement with the Data Processor, audits of the Data Processor’s premises and operations as these relate to the Personal Data. The Data Processor shall cooperate with such audits carried out by or on behalf of the Data Controller and shall grant the Data Controller’s auditors reasonable access to any premises and devices involved with the Processing of the Personal Data. The Data Processor shall provide the Data Controller and/or the Data Controller’s auditors with access to any information relating to the Processing of the Personal Data as may be reasonably required by the Data Controller to ascertain the Data Processor’s compliance with this Data Processing Agreement.
5. Improvements to Security
The Parties acknowledge that security requirements are constantly changing and that effective security requires frequent evaluation and regular improvements of outdated security measures. The Data Processor will therefore evaluate the measures as implemented in accordance with Article 4 on an on-going basis and will tighten, supplement and improve these measures in order to maintain compliance with the requirements set out in Article 4. The Parties will negotiate in good faith the cost, if any, to implement material changes required by specific updated security requirements set forth in the EU Data Protection Law or by data protection authorities of competent jurisdiction.
Where an amendment to the Service Agreement is necessary in order to execute a Data Controller instruction to the Data Processor to improve security measures as may be required by changes in applicable data protection law from time to time, the Parties shall negotiate an amendment to the Service Agreement in good faith.
6. Data Transfers
The Data Processor shall not disclose Personal Data received hereunder to a third party or transfer it to a non- EU/European Economic Area (EEA) country without Data Controller’s authorization. The Data Processor shall immediately notify the Data Controller of any (planned) permanent or temporary transfers of Personal Data to a country outside of the EU/EAA without an adequate level of protection and shall only perform such a (planned) transfer after obtaining authorization from the Data Controller, which may be refused at its own discretion.
To the extent that the Data Controller or the Data Processor are relying on a specific statutory mechanism to normalize international data transfers that is subsequently modified, revoke, or held in a court of competent jurisdiction to be invalid, the Data Controller and the Data Processor agree to cooperate in good faith to promptly terminate the transfer or to pursue a suitable alternate mechanism that can lawfully support the transfer.
7. Information Obligations and Incident Management
When the Data Processor becomes aware of an incident that impacts the Processing of the Personal Data that is the subject of the Service Agreement, it shall promptly notify the Data Controller about the incident, shall at all times cooperate with the Data Controller, and shall follow the Data Controller’s instructions with regard to such incidents, in order to enable the Data Controller to perform a thorough investigation into the incident, to formulate a correct response, and to take suitable further steps in respect of the incident.
The term “incident” used in Article 7.1 shall be understood to mean in any case:
- a complaint or a request with respect to the exercise of a data subject’s rights under EU Data ProtectionLaw;
- an investigation into or seizure of the Personal Data by government officials, or a specific indication that such an investigation or seizure is imminent;
- any unauthorized or accidental access, processing, deletion, loss or any form of unlawful processing of the Personal Data;
- any breach of the security and/or confidentiality as set out in Articles 3 and 4 of this Data Processing Agreement leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, the Personal Data, or any indication of such breach having taken place or being about to take place;
- where, in the opinion of the Data Processor, implementing an instruction received from the Data Controller would violate applicable laws to which the Data Controller or the Data Processor are subject.
The Data Processor shall at all times have in place written procedures which enable it to promptly respond to the Data Controller about an incident. Where an incident is reasonably likely to require a data breach notification by the Data Controller under the EU Data Protection Law, the Data Processor shall implement its written procedures in such a way that it is in a position to notify the Data Controller no later than 24 hours of having become aware of such an incident.
Any notifications made to the Data Controller pursuant to this Article 7 shall be addressed to the Data Protection Officer or other employee of the Data Controller whose contact details are provided during the registration process, and shall contain:
- a description of the nature of the incident, including where possible the categories and approximate number of data subjects concerned and the categories and approximate number of Personal Data records concerned;
- the name and contact details of the Data Processor’s data protection officer or another contact point where more information can be obtained;
- a description of the likely consequences of the incident; and
- a description of the measures taken or proposed to be taken by the Data Processor to address the incident including, where appropriate, measures to mitigate its possible adverse effects.
8. Contracting with Sub-Processors
The Data Controller authorizes the Data Processor to engage the sub-processors in the country locations for the Service-related activities specified as described in Section 1.4. Data Processor shall inform the Data Controller of any addition or replacement of such sub-processors giving the Data Controller an opportunity to object to such changes.
Notwithstanding any authorization by the Data Controller with the meaning of the preceding paragraph, the Data Processor shall remain fully liable vis-à-vis the Data Controller for the performance of any such sub- processor that fails to fulfill its data protection obligations.
The consent of the Data Controller pursuant to Article 8.1 shall not alter the fact that consent is required under Article 6 for the engagement of sub-processors in a country outside the European Economic Area without a suitable level of protection.
The Data Processor shall ensure that the sub-processor is bound by the same data protection obligations of the Data Processor under this Data Processing Agreement, shall supervise compliance thereof, and must in particular impose on its sub-processors the obligation to implement appropriate technical and organizational measures in such a manner that the processing will meet the requirements of EU Data Protection Law.
The Data Controller may request that the Data Processor audit a sub-processor or provide confirmation that such an audit has occurred (or, where available, obtain or assist customer in obtaining a third-party audit report concerning the sub-processor’s operations) to ensure compliance with its obligations imposed by the Data Processor in conforming with this Data Processing Agreement.
9. Returning or Destruction of Personal Data
Upon termination of this Data Processing Agreement, upon the Data Controller’s written request, or upon fulfillment of all purposes agreed in the context of the Services whereby no further processing is required, the Data Processor shall, at the discretion of the Data Controller, either delete, destroy, or return all Personal Data to the Data Controller and destroy or return any existing copies.
The Data Processor shall notify all third parties supporting its own processing of the Personal Data of the termination of the Data Processing Agreement and shall ensure that all such third parties shall either destroy the Personal Data or return the Personal Data to the Data Controller, at the discretion of the Data Controller.
10. Assistance to Data Controller
The Data Processor shall assist the Data Controller by appropriate technical and organizational measures, insofar as this is possible, for the fulfilment of the Data Controller’s obligation to respond to request for exercising the data subject’s rights under the GDPR.
The Data Processor shall assist the Data Controller in ensuring compliance with the obligations pursuant to Section 4 (Security) and prior consultations with supervisory authorities required under Article 36 of the GDPR taking into account the nature of processing and the information available to the Data Processor.
The Data Processor shall make available to the Data Controller all information necessary to demonstrate compliance with the Data Processor’s obligations and to allow for and contribute to audits, including inspections, conducted by the Data Controller or another auditor mandated by the Data Controller.
11. Liability and Indemnity
The Data Processor indemnifies the Data Controller and holds the Data Controller harmless against all claims, actions, third party claims, losses, damages and expenses incurred by the Data Controller and arising directly or indirectly out of or in connection with a breach of this Data Processing Agreement and/or the EU Data Protection Law by the Data Processor. The Data Controller indemnifies the Data Processor and holds the Data Processor harmless against all claims, actions, third party claims, losses, damages and expenses incurred by the Data Processor and arising directly or indirectly out of or in connection with a breach of this Data Processing Agreement and/or the EU Data Protection Law by the Data Controller.
12. Duration and Termination
This Data Processing Agreement shall come into effect on the date the Data Controller signs this Data Processing Agreement, which may be through electronic means.
Termination or expiration of this Data Processing Agreement shall not discharge the Data Processor from its confidentiality obligations pursuant to Article 3.
The Data Processor shall process Personal Data until the date of termination of the Service Agreement, unless instructed otherwise by the Data Controller, or until such data is returned or destroyed on instruction of the Data Controller.
In the event of any inconsistency between the provisions of this Data Processing Agreement and the provisions of the Service Agreement, the provisions of this Data Processing Agreement shall prevail.
This Data Processing Agreement is governed by the laws of the state of Nevada in the United States. Any disputes arising from or in connection with this Data Processing Agreement shall be brought exclusively before the competent court in Las Vegas, Nevada.
As your company grows, so does your need for powerful tools that can support your expansion. Our Enterprise plans offer you just the perfect mix of capacity, simplicity, and automation – so you can save resources and thrive.
Enterprise Plans: what’s in it for you
There are many things you need to juggle when running a large company, and we understand time is of the essence. One thing you won’t need to worry about is keeping your email databases up-to-date.
To accommodate our larger partners, we put together a set of exclusive benefits to help you scale and evolve with ease. Take a look at what you get access to once you activate your Enterprise Plans.
Designated Account Manager
When validating large batches of email addresses, you may need some guidance as to how you can make the most of our service. As soon as your Enterprise plan starts, we’ll assign one of our email validation experts to assist you. From discussing your technical needs to advising you on the ins and outs of the email verification process, your Account Manager will always be there for you.
Customer Solution Engineer
We strive to make email verification easy for you, and our platform allows you to clean your list in three easy steps: upload – validate – download. Should any complex issues arise, your Customer Solution engineer is hands-on. He or she knows our system in and out and is ready to troubleshoot any glitch. You’ll be up and running in no time.
Dedicated Customer Success Engineer
Let’s say you’ve validated your email list, got your results, and are ready to import your results back into your email service provider. Before you send a new email, take some time to understand your ZeroBounce report. If you’re not sure whether certain contacts are safe to use, your Customer Success engineer is there to answer any questions. He gathers feedback, shares it with the team, and together they offer the insight you need. Plus, you can reach out to your Customer Success engineer anytime to adjust your email verification strategy for the best results.
The more email addresses you verify, the less your pay for each validation – this is our overall pricing principle at ZeroBounce. However, companies that choose the Enterprise Plans receive unique pricing benefits. You validate a high number of contacts. Not only do we want you to enjoy your bonus services, but we work with you to find the most advantageous pricing plan for your business.
We know how important is it for you to feel safe and protected while validating your email list with ZeroBounce. That’s why we take this mission seriously. Thanks to our custom agreements, you can rest assured that we protect your confidentiality.
SLA: 99.99% guaranteed uptime
When you have so many daily tasks to complete and goals to fulfill, you want to know you’re using the most reliable tools. With the ZeroBounce Service Level Agreement (SLA), you get 99.99% uptime on our email verification platform. You can count on us.
24/7 technical support
What customers love the most about ZeroBounce is the accuracy we guarantee on email validation. Their second favorite thing is that we offer 24/7 customer support. With the Enterprise Plans, all of your perks are accessible 24/7. Need your Account Manager or your Customer Success engineer? You can talk to them anytime and find a solution to any issue you may encounter while – or after – cleaning your list.
Email validation coaching
When it comes to email validation, even the savviest of email marketers run into unknown territory sometimes. Maybe you’re not sure what to do about the catch- all emails we discover in your list. Or perhaps you get some soft bounces and don’t know how to interpret the codes and how to handle them. Such situations can occur, and it gives you peace of mind knowing you have someone who will shed some light on these dilemmas. The Enterprise Plans come with free email validation coaching – just reach out and ask, we’ve got you covered.
Early BETA access to all new features
Just like you and your business, ZeroBounce is constantly evolving. We’re on a mission to perfect our service and offer you the best email validation and email deliverability platform. And you get to be a part of the journey.
Our developers and engineers are always working on a new product. As part of the Enterprise Plans, you get to test the BETA versions, share your feedback, and help us make ZeroBounce better for you. We grow together like we’ve been doing from day one.
Apart from all the above benefits, you have access to the features that make ZeroBounce a favorite of thousands of customers worldwide:
- global content delivery network
- unsurpassed data protection, with military-grade encryption on your files
- our innovative A.I. email scoring and catch-all validation service
- a powerful and reliable API that you can use either in bulk or in real time, for both email validation and email scoring
- free deduplication: we remove duplicate email addresses from your database at no charge
- email data appending: get missing information added to your list, such as your subscribers’ name, gender, and location.
Why should I get the Enterprise Plans?
If you’re on the fence about getting the Enterprise Plans, think about it this way: you could sign up for any of our subscriptions and enjoy all the great features ZeroBounce offers, at a set retail price. Or you could opt for a plan that gives you just what you need – and a bit more – at rates that are exclusive to you.
The Enterprise Plans are custom-made to provide you with all the tools and assistance you need, 365 days a year. Also, the enterprise-level features save you resources, allow you to delegate and automate, and help you increase productivity within your team. Finally, we can adjust your plan anytime to continuously support your growth.
What are the requirements for Enterprise Plans?
If you’re ready to start an Enterprise account, or switch from your existing subscription, reach out to us today. An account manager will meet with you and discuss your monthly service expectations.
From the time ZeroBounce was only a business idea, security was at the top of our minds. We wanted to create an accurate email verification service that would operate safely and fulfill the most advanced data protection standards.
Today, it gives our customers great peace of mind knowing that their data is in good hands while they can focus on restoring the quality of their email lists.
Take a look at the list of certifications and accreditations ZeroBounce received. They all confirm our dedication to protecting your files while you enjoy using our email verifier.
SOC 2 is a report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy
These reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization relevant to security, availability, and processing integrity of the systems the service organization uses to process users’ data and the confidentiality and privacy of the information processed by these systems. These reports can play an important role in:
- Oversight of the organization
- Vendor management programs
- Internal corporate governance and risk management processes
- Regulatory oversight
Zerobounce was audited by a certified auditing firm and is proud to have successfully met the criteria of SOC 2 compliance effective March 31st, 2020.SOC2 Certification: https://assureprofessional.com/certs/20596030.html
Cyber Smart Defence
ZeroBounce received a Cyber Smart Defence (CSD) certification in 2018 to safeguard our system from any potential security breaches. Created by world-class experts in cybersecurity, CSD ensures our email verification platform remains a safe space for partners and customers worldwide.
CSD mitigates cybersecurity issues for corporations such as Emirates Airlines and Carrefour. At ZeroBounce, CSD specialists run periodical IT security audits, penetration tests, and vulnerability assessments. Furthermore, our team participates in periodic training sessions with the CSD team to stay on top of the latest cybersecurity developments.
PCI stands for Payment Card Industry, which is a set of standards that ensures all online transactions involving credit cards are made safely. ZeroBounce adheres to PCI standards to protect customers’ data during the payment process on zerobounce.net.
We partner with world-class, well-respected cybersecurity companies to assess our systems on a monthly basis. These comprehensive tests focus on all aspects of our application. Ensuring all transactions take place safely and responsibly is paramount to us.
EU GDPR Compliance
The General Data Protection Regulation (GDPR) aims to improve data privacy laws across Europe and create a safer online environment for consumers worldwide. ZeroBounce became EU GDPR Compliant a few months before the new regulations came into force on May 25, 2018.
Our email list verification platform abides by all GDPR requirements, established by the European Parliament and the Council of the European Union. Following GDPR protocols ensures your data is safeguarded while you validate your email lists and make payments on our platform. ZeroBounce is committed to processing personal data that is subject to the GDPR in a lawful, fair, and transparent manner.
Our Data Protection Officer conducts regular assessments on ZeroBounce’s GDPR compliance. Moreover, a third-party security company runs monthly audits to confirm our ongoing commitment to your data privacy.
Privacy Shield Framework
The EU-U.S. and Swiss-U.S. Privacy Shield Frameworks are sets of regulations that provide companies with the mechanisms to transfer personal data securely during transatlantic commerce. The EU-US and Swiss-US Privacy Shield Programs require annual registration and re-certification.
ZeroBounce joined the Privacy Shield voluntarily and complies with the Framework’s requirements. These requirements revolve around privacy principles such as notice, access, choice, and accountability for onward transfer. As a data processor, ZeroBounce provides users with a secure upload mechanism and uses encryption ciphers for the email databases download process.
Since December 2017, our company has been an active participant in the EU-U.S. and Swiss-U.S. Privacy Shield Programs.
BBB Accredited Business
The Better Business Bureau (BBB) is an organization whose mission is to foster trust between businesses and consumers and to support best practices in the marketplace. The BBB sets standards that maintain and encourage good marketplace behavior and helps build a more transparent business community.
After careful evaluation by the BBB Board of Directors, the organization established that ZeroBounce meets BBB accreditation standards. Some of these standards include a positive track record in the marketplace, adherence to fair advertising and selling, and the honest representation of products and services.
Our company became a BBB Accredited Business in September 2017.
ZeroBounce has taken all necessary steps to renew each of these certifications and accreditations. Our team is collaborating with third-party experts who help us periodically assess our status and undertake thorough compliance measures.https://www.zerobounce.net/images/pdf/BBBCertification.pdf