Owned infrastructure
Mumara's production application runs on infrastructure we own and operate. Owned servers, owned IPs, our own colocation and cloud — not on a third-party public cloud. Less moving parts, fewer hops, full control.
Security & Trust
Operating since 2012. 21,000+ businesses send through Mumara today. This page is the single reference for how we protect your data, your sender reputation, and your customers' privacy.
Trust pillars
Mumara's production application runs on infrastructure we own and operate. Owned servers, owned IPs, our own colocation and cloud — not on a third-party public cloud. Less moving parts, fewer hops, full control.
We don't use your AI prompts or generated outputs to train any model exposed outside your account. We don't sell or share customer data. Tracking on our marketing site is opt-in.
GDPR, UK GDPR, Swiss revFADP, CCPA / CPRA, LGPD, CAN-SPAM, CASL, PECR, and TCPA built into how the product behaves and how our team responds.
Operating since 2012. 21,000+ businesses sending through Mumara today. Incident response, audit logging, vendor due diligence, and documented runbooks behind every product surface.
Infrastructure security
The application that processes your campaigns and Contacts is not hosted on a third-party public cloud. We deliberately built this way so that, for the data most of you care about, there is no upstream cloud-hosting sub-processor in the chain.
Production runs on our own hardware in our colocation and cloud. Sending IPs are owned and operated directly by Mumara — your sender reputation is built on infrastructure we control.
Production, staging, and corporate networks are isolated. Production access requires VPN + multi-factor authentication; default-deny firewalls; least-privilege ACLs.
Mumara's marketing surfaces are fronted by Cloudflare for DDoS mitigation, bot management, and TLS termination. The application itself enforces its own rate limits independently.
Redundant power, networking, and storage. Production data is replicated and backed up; backups are encrypted and tested. Disaster-recovery runbooks are exercised periodically.
Decommissioned drives are wiped and destroyed in line with NIST 800-88 guidance. No production drive leaves our facilities intact.
Application & data security
TLS 1.2+ on every public-facing endpoint with modern cipher suites. HSTS in force on the marketing site.
Production databases, backups, and stored credentials (e.g. Bridge connection secrets) are encrypted with industry-standard algorithms (AES-256 or equivalent).
Passwords are hashed and salted using a memory-hard algorithm. Two-factor authentication is available on all accounts. SSO available on enterprise plans.
Role-based access control with least-privilege defaults. Customer data access by Mumara personnel is gated, time-bound, and audited.
Peer code review for every change. Dependency scanning. Static and dynamic analysis. Secrets are kept out of source code; configuration secrets rotate on a schedule.
SPF, DKIM, DMARC, and BIMI workflows built into the product so customers can authenticate every domain they send from. Auto DNS addon automates the records on supported registrars.
Operational security
Administrative actions, sign-ins, configuration changes, and data exports are logged centrally with anomaly detection. Logs are immutable and retained per policy.
Production health, latency, error rates, queue depth, deliverability metrics, and abuse signals are monitored 24/7. Alerts page on-call.
Documented playbook covering detection, containment, eradication, recovery, and post-incident review. Customers affected by a personal-data breach are notified per our DPA timelines.
Automated abuse scoring throttles, queues, or pauses sending when patterns suggest compromise or non-compliant use — protecting deliverability for the wider customer base.
Background screening proportionate to role. Confidentiality obligations in employment terms. Security awareness training. Access revoked on role change or departure.
Sub-processors pass a documented due-diligence review (security posture, privacy program, attestations) before they handle personal data. Material changes are notified to Members 30 days in advance.
Privacy by design
Mumara does not use your AI prompts or generated outputs to train any model exposed outside your account. Mumara AI does not consume your full subscriber lists, behavioural data, or full campaign archives — only the prompt content you generate.
We do not sell personal information for money. We do not "share" personal information for cross-context behavioural advertising as those terms are defined under the CPRA. We do not rent Member or Contact data.
Cookies on this site are off by default. Analytics, marketing pixels, and live chat load only after you opt in. Third-party scripts are offloaded to a web worker so they cannot block page rendering.
Compliance & legal
Compliance is not a checkbox; it is how the product behaves and how our team responds.
Controller and processor obligations, SCCs / UK addendum / Swiss adaptation built into our DPA.
California consumer rights, no sale or share for cross-context advertising, sensitive-data limits.
Brazilian data-subject rights mapped into our privacy program.
Sender identification, postal address, and unsubscribe enforcement built into the product.
Consent capture, soft-opt-in handling, and opt-out across Canadian recipients.
Cookie consent gating on the marketing site and B2C marketing rules supported.
SMS consent, quiet hours, mandatory keywords, and opt-out enforcement for US SMS.
Carrier-side rules for US SMS — registration, brand verification, sample messages, throughput tiers.
Customer security responsibilities
Mumara secures the platform; you secure your account, your sender domains, and the consent behind every campaign.
Use a strong, unique password. Turn on two-factor authentication. Review team-member access regularly. Revoke unused API tokens.
Publish SPF, DKIM, and DMARC for every sending domain. Consider BIMI when ready. Use our Auto DNS addon to automate the records on supported registrars.
Capture explicit consent at sign-up and store the proof. Honour unsubscribes promptly. Don't reuse old lists for new programs without re-consenting.
Tell your subscribers what you do with their data via a current privacy notice. Sign our DPA. Respond to data-subject requests.
Trust documents
Detailed write-up of technical and organisational measures, available to enterprise customers and prospects under NDA.
RequestMumara-signed DPA that pre-incorporates the 2021 EU SCCs, UK ICO addendum, and Swiss adaptations. Counter-sign and return.
RequestThe third parties we engage and the marketing-site analytics tags. Public, with 30-day change-notification.
OpenHow we collect, use, share, and retain personal information across the marketing site and the products.
OpenPermission requirements, prohibited content, restricted industries, SMS rules, AI safeguards, enforcement.
OpenCoordinated disclosure: send your report to our security team and we acknowledge within one business day.
ReportCoordinated vulnerability disclosure
We welcome reports from security researchers, customers, and the public. Send your report via the contact form with subject line "Security report". Include a clear description, reproduction steps, affected URLs or endpoints, and any proof-of-concept.
01
A real human from our security team confirms receipt and starts triage.
02
We keep you posted on progress. Severe issues are handled out of hours; lower-severity issues follow our normal release cadence.
03
Researchers who follow coordinated disclosure get our public thanks. We do not pursue legal action against good-faith research that respects this process.
Enterprise prospects: we'll send our full security overview, sample DPA, and answer your security questionnaire under NDA.