Privacy Policy

At TextInvoice, we are committed to protecting your privacy and ensuring the security of your personal and business information. This Privacy Policy outlines our practices concerning the collection, use, and protection of data.


Data Collection

User Data

We collect and store the following information from our users:

  • Name
  • Email address
  • Business name
  • Business address
  • Phone number
  • EIN (Employer Identification Number)
  • Stripe account information (for payment processing)

This information is necessary for account creation, authentication, and to facilitate our invoicing services.

Client Data

We collect and store the following information about our users' clients:

  • Client name
  • Client phone number
  • Client email address (if provided)

This information is used solely for the purpose of creating and sending invoices on behalf of our users.

Invoice Data

We store the following information related to invoices:

  • Invoice details (amount, items, description)
  • Payment status
  • Transaction records

Use of Data

User Data Usage
  • To provide and maintain our service
  • To notify you about changes to our service
  • To allow you to participate in interactive features of our service
  • To provide customer support
  • To gather analysis or valuable information to improve our service
  • To monitor the usage of our service
  • To detect, prevent and address technical issues
Client Data Usage
  • To generate and send invoices on behalf of our users
  • To process payments through our integrated payment system
Invoice Data Usage
  • To maintain records of transactions
  • To provide analytics and reporting features to our users
  • To comply with legal and financial regulations

Data Protection

We implement a variety of security measures to maintain the safety of your personal information:

  • All data is encrypted in transit and at rest using industry-standard encryption protocols
  • We use secure cloud storage providers that comply with SOC 2 and ISO 27001 standards
  • Access to data is strictly limited to authorized personnel only
  • Regular security audits and penetration testing are conducted to ensure the integrity of our systems