Effective Date: 12/1/2025
Last Updated 1/23/2026
• Passkey-based authentication
• Biometric confirmation performed locally on the user’s device
• Device-binding and cryptographic challenge/response
• Customers (organizations) that license, integrate, or administer SendAuth
• End-users who perform authentication through SendAuth on behalf of a Customer
• A Service Provider / Data Processor for Customer data
• A Controller only for limited operational and service-level metadata, as described in this Privacy Policy
• Customers must be authorized business entities capable of entering legally binding agreements.
• End-users must be authorized by the Customer and meet minimum age requirements defined by applicable law (typically 13+ in the U.S., 16+ in the EU).
• Use the Service only for lawful identity-verification purposes.
• Configure authentication workflows accurately and maintain secure integrations.
• Obtain all legally required end-user consents for identity verification.
• Not use SendAuth for surveillance, monitoring, harassment, or other improper purposes.
• Notify SendAuth immediately of any suspected misuse or account compromise.
• Use accurate information during authentication.
• Maintain the security of their mobile device and passkey or biometric credentials.
• Avoid attempting to bypass, interfere with, or manipulate the authentication process.
• Conduct identity theft, impersonation, or fraudulent verification.
• Target individuals based on protected characteristics.
• Break encryption, interfere with network security, or attempt to reverse-engineer the Service.
• Send spam, phishing content, or unauthorized communications.
• Collect or process biometric data outside the user’s device (SendAuth never receives it).
SendAuth reserves the right to suspend or terminate accounts violating these rules.
• End-user identifiers provided by the Customer
• Authentication results (success/failure, risk flags)
• Metadata necessary for the Customer’s workflow
• Device model, OS data, and integrity signals
• IP-based region data, fraud indicators, and telemetry
• Logs required for security, troubleshooting, and compliance
• Maintenance
• Security events
• Emergencies
• Circumstances beyond our control
• Charges are invoiced per the Customer’s subscription plan.
• Fees are non-refundable unless otherwise stated.
• Overages may apply if usage limits are exceeded.
• Failure to pay may result in account suspension.
• Customer integration details
• Authentication logs
• Security practices
• Proprietary technology
• End-to-end encryption
• Strong key management
• Zero-password storage
• Hardware-backed passkey verification where available
• Incident response procedures
• Merchantability
• Fitness for a particular purpose
• Non-infringement
• Error-free or uninterrupted operation
• Indirect, incidental, special, or consequential damages
• Lost profits, lost business, or data loss
• Damages exceeding the total amount the Customer paid in the prior 12 months
• Customer misuse of the Service
• Customer’s failure to comply with applicable laws or obtain required end-user consent
• Unauthorized access or security breaches attributable to Customer systems
• With notice
• Immediately upon breach
• As required by law
• Customer access and API keys will be disabled
• SendAuth may delete Customer Data in accordance with its retention policies
• Logs required for legal, security, or audit purposes may be retained
• These Terms are governed by the laws of the State of Texas, without regard to conflict-of-law rules.
• Any disputes will be resolved in courts located in Travis County, Texas.
12710 Research Blvd Suite 365 Austin, Texas 78759 | 833-614-0160 | [email protected]
Privacy Policy | Terms of Service