Skip to main content
How it works Integrations Pricing Blog Sign in Start free trial

Security and Trust

Last updated: 2026-04-28. Effective from: 2026-04-25.

Operator. The Service is operated by ФОП Даценко А.В. (A.V. Datsenko, sole proprietor registered in Ukraine), РНОКПП 3339403456 ("CallPing", "we", "us"). Mailing address: Plytkova str. 65/106, Kharkiv, Kharkivska oblast, 61047, Ukraine. Security reports: [email protected]. For everything else, see the Contact page.


Our Approach

CallPing places phone calls on your behalf when something goes wrong with a system you operate. That means we sit on the alerting path between your monitoring and the people you trust to respond. We take the responsibility seriously.

This page is a plain-English summary of how we protect your data and account. It is not an exhaustive technical specification.

Encryption

Authentication

Infrastructure

CallPing runs on Cloudflare's global edge network:

Cloudflare provides global DDoS protection and runs the network on which our application executes. We additionally apply Content Security Policy (CSP) headers, restrictive CORS defaults, and security headers across all responses.

Multi-Region SIP Failover

Phone calls are placed via a fleet of self-hosted Asterisk PBX servers, geographically and providerwise diverse:

A health-aware registry routes each call to a healthy PBX in round-robin order. If a SIP trunk fails, the call is automatically retried on a different PBX with a different trunk. This is intended to reduce the impact of any single provider or region outage on alerting.

SLA framing.

We operate the Service on a commercially reasonable best-effort basis. No specific uptime target is guaranteed and no service credits are issued for downtime on the Solo or Team self-serve plans, consistent with Terms of Service §7a. A commercial SLA with service credits and a defined uptime target is available for Enterprise tier customers — contact us to discuss.

Public uptime data is available at status.callping.app.

Audit Logging

User-facing actions that affect account or organization state are recorded in an audit_log table:

Rows are retained for 90 days, then deleted by an automated cron job.

Network and PBX Hardening

Vulnerability Disclosure

We welcome responsible disclosure of security issues from researchers and users.

Reporting. Send vulnerability reports to [email protected]. The mailbox is provisioned via Cloudflare Email Routing and routed to a monitored support workflow. We acknowledge security reports within two (2) business days and aim to provide an initial assessment within five (5) business days for credible reports. We do not currently publish a PGP key.

In scope:

Out of scope (these are operated by third parties; please report directly to them):

When you report:

Safe-harbor commitment. When you act in good faith and within this policy, we will not pursue legal action, civil claims, or law-enforcement referral against you for your research. We treat your good-faith research as authorised access for the purposes of computer-misuse laws in the jurisdictions in which we operate (including, without limitation, the Law of Ukraine on Information Protection in Information and Telecommunications Systems and equivalent rules in EU member states and the UK). If you are uncertain whether a particular activity is authorised, ask first via [email protected].

We do not currently operate a paid bug-bounty program. We may launch a coordinated program (HackerOne, Intigriti, or equivalent) once paid plans are stable; until then, public credit and a thank-you in our security acknowledgements page are the recognition we offer for substantive reports.

Payment Data Security

Paid Plans are processed by Paddle.com Inc. ("Paddle") as the merchant of record. The security boundary for payment data is the same as the data boundary described in the Privacy Policy §2.3:

Compliance and Certifications

CallPing does not currently hold any external compliance certifications (such as SOC 2 or ISO 27001). Because Paddle handles the PCI-DSS-protected card data, CallPing remains out of scope for PCI DSS. We will revisit a SOC 2 readiness program once Enterprise-tier demand justifies the investment; Enterprise customers requiring attestation should contact us to scope timing.

Data Privacy

Security is one part of how we protect your data. The other part — what we collect, why, and how it can be deleted — is covered in the Privacy Policy.

Updates to This Page

We will update this page as our security posture evolves and as new controls or certifications are added. The "Last updated" date at the top of this page reflects the most recent revision.