Effective Date: January 1, 2025
Last Updated: August 27, 2025
Wired Tech LLC ("Company," "we," "us," or "our") operates WiredSMS and provides SMS forwarding, virtual phone numbers, and telecommunications infrastructure services (collectively, the "Services"). This Privacy Policy explains how we collect, use, disclose, and safeguard information when you use our website www.wiredsms.com (the "Site") and our telecommunications Services.
This Privacy Policy applies to all information collected through our Services, whether accessed via our Site, API, third-party platforms (Discord, Telegram, WhatsApp), or through direct business relationships. By using our Services, you consent to the data practices described in this Privacy Policy. If you do not agree with our practices, you must not use our Services.
The telecommunications industry is subject to specific privacy regulations and requirements. This Privacy Policy describes not only our general privacy practices but also how we comply with telecommunications-specific privacy obligations under federal and state law, including regulations enforced by the Federal Communications Commission (FCC) and requirements under the Telecommunications Act.
As a provider of telecommunications infrastructure services, we necessarily collect certain information to facilitate message transmission and comply with legal requirements:
Message Metadata: For every message processed through our Services, we collect routing information including sender and recipient phone numbers, message timestamps and datestamps, message direction (inbound/outbound), message delivery status and carrier responses, message segments and concatenation data, character encoding and message format, and carrier routing information. This metadata is essential for message delivery and required for regulatory compliance.
Message Content: While we act as a neutral transmission platform and do not actively monitor message content, message content necessarily passes through our systems for transmission. We may access message content only when necessary to investigate technical issues or service failures, respond to legal process or regulatory requirements, investigate suspected violations of our Terms of Service, or prevent harm to our Services or others. Message content remains your responsibility and property.
Phone Number Information: For virtual number services, we maintain records of number assignments and porting history, number capabilities (SMS, MMS, voice), carrier information and rate centers, geographic information associated with numbers, usage patterns and traffic volumes, and compliance with number pooling and conservation requirements.
We collect information necessary to establish and maintain your account:
Registration Information: When you create an account, we collect your name and contact information, company name and business details, email address and phone numbers, billing and shipping addresses, tax identification numbers (for business accounts), and authorized user information.
Verification Documents: To comply with Know Your Customer (KYC) requirements and prevent fraud, we may collect government-issued identification, business registration documents, proof of address, FCC registration numbers (if applicable), and other verification materials required by law or our policies.
Payment Information: We collect payment method details, billing history and transaction records, credit assessments (for post-paid accounts), and financial institution information for ACH payments. Payment card details are processed by PCI DSS-compliant payment processors.
We automatically collect information about how you interact with our Services:
API and Platform Usage: We log all API calls including endpoints, parameters, and responses; authentication attempts and session management; rate limiting and throttling events; error codes and debugging information; bandwidth consumption and request volumes; and integration methods and connected systems.
Device and Connection Data: We collect IP addresses (for both access and API calls), browser type and version, operating system information, device identifiers and characteristics, network provider information, time zone and locale settings, and referring URLs and navigation paths.
To meet telecommunications regulatory requirements, we collect and maintain:
TCPA Compliance Records: For customers sending marketing or automated messages, we may collect consent records and opt-out lists, campaign registration information, attestation of compliance with TCPA requirements, and do-not-call list verification records.
Carrier Compliance Data: We maintain records required by carriers including business verification information, use case descriptions and categorizations, throughput and volume commitments, trust scores and reputation metrics, and complaint and incident histories.
We use collected information primarily to provide and maintain our telecommunications Services:
Message Processing: We use information to route messages through appropriate carrier networks; ensure proper message formatting and encoding; manage message queuing and retry logic; provide delivery receipts and status updates; handle number pooling and assignment; and maintain network interconnection agreements.
Service Functionality: Your information enables us to provision and manage virtual phone numbers; maintain SMS and MMS forwarding rules; provide API access and integration support; manage account permissions and access controls; process billing and payment transactions; and deliver customer support and technical assistance.
The telecommunications industry is heavily regulated, and we use information to comply with applicable laws including:
FCC Requirements: We maintain records and reports required by FCC regulations including CPNI (Customer Proprietary Network Information) protections, number portability and pooling requirements, rural call completion reporting (where applicable), accessibility requirements under the CVAA, and emergency services obligations.
Consumer Protection Compliance: We use information to comply with the Telephone Consumer Protection Act (TCPA), CAN-SPAM Act requirements for SMS, state-specific telecommunications and privacy laws, Do-Not-Call registry requirements, and anti-fraud and anti-abuse regulations.
Law Enforcement and Legal Process: We respond to lawful requests from law enforcement, including subpoenas, court orders, and warrants; emergency requests involving danger of death or serious injury; national security letters and FISA orders (as applicable); and regulatory inquiries from the FCC and state utilities commissions.
We analyze information to protect our Services and users:
Abuse Prevention: We monitor for patterns indicating spam or abuse; unauthorized use or access attempts; violation of carrier acceptable use policies; fraudulent payment activities; and attempts to circumvent security measures.
Network Security: We use information to detect and prevent security threats; investigate incidents and breaches; maintain system integrity and availability; prevent unauthorized number porting; and protect against telecommunications fraud.
We analyze usage data to understand service performance and reliability; optimize message routing and delivery rates; identify and resolve technical issues; develop new features and capabilities; evaluate carrier performance and costs; and make informed business decisions.
As a telecommunications service provider, we must share certain information with carriers and partners to facilitate service delivery:
Carrier Networks: We share message data with wireless carriers (AT&T, Verizon, T-Mobile, etc.) and their subsidiaries; aggregators and wholesale providers; international carriers for global message delivery; and messaging platforms and gateways. This sharing is necessary for message transmission and includes phone numbers, message content, and routing information.
Interconnection Partners: We share technical information with peering partners and interconnection providers; number portability administrators; industry databases (NPAC, LERG); and emergency services providers (where applicable).
We engage third-party service providers who process information on our behalf:
Infrastructure Providers: Cloud hosting and content delivery networks; DDoS protection and security services; backup and disaster recovery services; and monitoring and alerting platforms.
Business Services: Payment processors and financial institutions; customer relationship management platforms; support ticketing systems; accounting and tax preparation services; and legal and compliance consultants.
These providers are contractually bound to protect your information and use it only as directed by us.
We disclose information when required by law or legal process:
Mandatory Disclosures: We respond to valid legal process including subpoenas and court orders; FCC inquiries and enforcement actions; state regulatory commission requests; emergency requests from law enforcement; and national security demands.
Voluntary Disclosures: We may disclose information to protect our rights, property, or safety; prevent fraud or abuse of Services; enforce our Terms of Service; investigate security incidents; or protect against legal liability.
We share information for telecommunications industry compliance:
Industry Databases: We contribute to shared industry resources including spam and fraud prevention databases; number portability databases; caller ID/CNAM databases; and carrier routing tables.
Regulatory Reporting: We provide required reports to the FCC on service outages and disruptions; number utilization and exhaust reports; consumer complaint data; and accessibility compliance metrics.
If we are involved in a merger, acquisition, asset sale, or bankruptcy, your information may be transferred to the acquiring entity. We will provide notice before your information becomes subject to a different privacy policy.
We retain telecommunications records in compliance with FCC regulations and industry requirements:
Call Detail Records: Message metadata including numbers, timestamps, and routing information is retained for a minimum of eighteen (18) months as required by telecommunications regulations, though we may retain it longer for business purposes.
CPNI Records: Customer Proprietary Network Information is retained in accordance with FCC rules, including two-year retention of CPNI usage approvals and one-year retention of marketing campaign records.
Billing Records: Financial and billing records are retained for seven (7) years to comply with tax and accounting requirements and to resolve billing disputes.
Consent Records: TCPA consent records, opt-out requests, and Do-Not-Call compliance records are retained for five (5) years from the date of last contact or as required by applicable law.
Security Logs: Security events, access logs, and authentication records are retained for a minimum of twelve (12) months for security investigation and compliance purposes.
Legal Process Records: Information preserved for legal proceedings is retained until the matter is fully resolved, including appeals.
When retention periods expire, we securely delete or anonymize information using industry-standard methods. However, we may retain anonymized or aggregated data indefinitely for analytical purposes. Backup systems may retain copies for limited periods according to our backup rotation schedule.
You have the right to request access to the personal information we maintain about you, including account information and settings; message logs and history (subject to retention periods); billing and payment records; and API usage statistics.
To request your information, contact us using the methods described below. We may require identity verification before providing access to prevent unauthorized disclosure.
You can update your account information through your dashboard or by contacting support. You may request deletion of your personal information, though we may retain certain information as required by law or for legitimate business purposes, including completing transactions; complying with legal obligations; resolving disputes; enforcing agreements; and maintaining records required by telecommunications regulations.
Marketing Communications: You can opt out of promotional emails and marketing messages through your account settings or unsubscribe links. Service-related communications necessary for your use of Services cannot be opted out of while maintaining an account.
Information Sharing: You may request that we limit sharing of your information for marketing purposes. Note that we cannot limit sharing required for service delivery or legal compliance.
Under FCC regulations, you have specific rights regarding your Customer Proprietary Network Information (CPNI):
You may restrict our use of CPNI for marketing purposes; request access to your CPNI records; and report unauthorized disclosure of CPNI. We will notify you of any breaches involving CPNI as required by FCC rules.
California Residents: Under the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), you have additional rights including the right to know what personal information we collect, use, and disclose; the right to delete personal information (subject to exceptions); the right to opt-out of "sales" of personal information (we do not sell personal information); the right to correct inaccurate information; and the right to limit use of sensitive personal information.
European Residents: If you are located in the European Economic Area or United Kingdom, you have rights under the General Data Protection Regulation (GDPR) including access, rectification, erasure, restriction, portability, and objection rights. Our legal bases for processing include consent, contract performance, legal obligations, and legitimate interests.
Other Jurisdictions: Residents of other states or countries may have additional rights under applicable privacy laws. Contact us to exercise any rights available to you under applicable law.
We implement comprehensive security measures to protect telecommunications data:
Encryption: All data transmissions are encrypted using TLS 1.2 or higher; message content is encrypted in transit between our systems and carriers; API communications require encrypted connections; stored sensitive data is encrypted at rest; and encryption keys are managed using industry best practices.
Access Controls: We enforce role-based access control (RBAC) for all systems; multi-factor authentication for administrative access; API authentication using secure tokens; regular access reviews and de-provisioning; and detailed audit logging of all access attempts.
Network Security: Our infrastructure includes firewalls and intrusion detection/prevention systems; DDoS protection and traffic filtering; network segmentation and isolation; regular security scanning and penetration testing; and 24/7 security monitoring and incident response.
Personnel Security: All employees undergo background checks; sign confidentiality and security agreements; receive regular security and privacy training; and are subject to access restrictions based on job requirements.
Vendor Security: Third-party providers are assessed for security practices; bound by contractual security obligations; subject to regular security reviews; and required to maintain appropriate certifications.
Incident Response: We maintain a documented incident response plan; security incident response team; breach notification procedures; and regular incident response drills and updates.
We maintain compliance with industry standards including SOC 2 Type II certification (in progress); PCI DSS compliance for payment processing; FCC regulatory requirements; and state telecommunications privacy laws.
Regular third-party security assessments ensure our controls remain effective and current with evolving threats.
Customer Proprietary Network Information (CPNI) includes information about your telecommunications services that we obtain solely through our relationship with you. We protect CPNI in accordance with FCC regulations by:
Limiting access to employees with a legitimate business need; requiring opt-in consent for certain marketing uses; implementing authentication procedures for account access; notifying you of any unauthorized CPNI disclosure; and maintaining required records of CPNI access and use.
If you port numbers to or from our service, we will share information necessary to complete the port with the gaining or losing carrier; verify your authorization for the port; and maintain records of the porting transaction as required by FCC rules.
For SMS/MMS services, we maintain records to demonstrate compliance with TCPA requirements; carrier acceptable use policies; A2P 10DLC registration requirements; and international messaging regulations.
We may share compliance information with carriers and aggregators as necessary to maintain service delivery and prevent filtering or blocking.
While our Services are not intended to support emergency calling, if emergency services capabilities are added in the future, we will collect and maintain location information as required; provide required disclosures about emergency service limitations; and share information with emergency service providers as necessary.
Our Services are operated from the United States. If you use our Services from outside the United States, you understand that your information will be transferred to, stored, and processed in the United States, where data protection laws may differ from your jurisdiction.
For international message delivery, your data may be transmitted through carriers and networks in multiple countries. These international transfers are necessary for service delivery and are governed by international telecommunications agreements and regulations.
We implement appropriate safeguards for international data transfers including standard contractual clauses where required; data processing agreements with international partners; and compliance with applicable cross-border data transfer regulations.
Our Services are not intended for use by individuals under eighteen (18) years of age. We do not knowingly collect personal information from children. If we learn that we have collected information from a child under 18, we will delete that information promptly.
The transmission of messages to or from minors through our Services is the responsibility of our customers, who must ensure compliance with applicable laws regarding communications with minors.
Our Services may integrate with or link to third-party services including payment processors, identity verification providers, carrier platforms, and business tools. These third parties have their own privacy policies governing their collection and use of your information.
When you use virtual numbers for third-party services (such as verification codes or account registration), those services may collect information about the phone number and associated communications according to their own privacy policies.
We are not responsible for the privacy practices of third parties. We encourage you to review the privacy policies of any third-party services you interact with through our Services.
We may update this Privacy Policy to reflect changes in our practices, legal requirements, or industry standards. When we make changes, we will update the "Last Updated" date and, for material changes, provide notice through your account dashboard, email, or prominent notice on our Site.
Your continued use of our Services after changes to this Privacy Policy constitutes acceptance of the updated policy. If you do not agree with changes, you must discontinue use of our Services.
Given the evolving nature of telecommunications regulations and privacy laws, we encourage you to review this Privacy Policy regularly.
For questions about this Privacy Policy or our privacy practices, please contact
us:
General Support: help@wiredproxies.com
When contacting us about privacy matters, please provide sufficient information to identify your account and verify your identity. We may require additional verification before processing certain requests.
Regulatory Agencies: You may also contact regulatory authorities with privacy concerns:
Law enforcement agencies requesting information should contact help@wiredproxies.com and provide valid legal process. We require a subpoena for basic subscriber information; court order for transactional records; and search warrant for message content (where stored).
Emergency requests involving imminent danger should be clearly marked and include sufficient information to evaluate the emergency.
We may publish transparency reports detailing the number and types of legal requests received; percentage of requests where data was provided; and aggregate statistics about content removal or account actions.
By using our Services, you acknowledge that you have read and understood this Privacy Policy; consent to our collection and use of information as described; understand the telecommunications-specific privacy requirements; and agree to the international transfer of your information.
END OF PRIVACY POLICY
© 2025 Wired Tech LLC. All
rights reserved.
Last reviewed by legal counsel: August 27, 2025