database Information Collection
We collect information necessary to provide professional lead management and inspection architecture. This includes:
Direct Identification
Name, corporate email, professional title, and organization billing information.
Technical Metadata
IP addresses, browser configurations, and interaction logs within the Inspecta environment.
analytics Data Usage
-
check_circle
Operational Integrity Using data to maintain the performance and security of the Inspecta processing engines.
-
check_circle
Professional Communication Sending critical system updates, architectural changes, and administrative notices.
chat SMS/TCPA & WhatsApp Business API
Inspecta adheres to strict TCPA (Telephone Consumer Protection Act) compliance for all SMS communications, WhatsApp Business API integrations, and AI-powered voice communications. All messaging campaigns are registered under the A2P 10DLC framework through The Campaign Registry (TCR).
Explicit Opt-In Consent
We only transmit messages to individuals who have provided verifiable, affirmative, individual consent in compliance with the FCC One-to-One consent rule (effective January 27, 2026). Consent is collected via web forms with unchecked checkboxes, verbal confirmation via IVR, or written/QR-based opt-in. Consent cannot be a condition of purchase and must be granted individually for each brand.
Immediate Opt-Out
Users may reply "STOP" to any SMS to immediately terminate messaging services. WhatsApp users may use the "Unsubscribe" action. All opt-out requests are processed immediately and automatically. In compliance with Virginia SB 1339, opt-out records are retained for a minimum of 10 years.
Mobile Data Collection
When you opt in to receive communications, we collect: your phone number, the date and method of consent (web form, verbal, or written), your opt-in/opt-out status, and message delivery timestamps. This data is used exclusively to deliver requested communications and maintain compliance records.
Message Frequency & Charges
Message frequency varies based on your interactions and the services you have opted into. Inspecta does not charge for SMS messages; however, standard message and data rates from your mobile carrier may apply. Reply HELP to any message for assistance.
gavel SMS Data Non-Sharing Clause
We will not share your personal information, including SMS opt-in consent data and phone number, with any third parties or affiliates for marketing or promotional purposes. All categories of data shared with service providers explicitly exclude SMS consent data and phone numbers collected for messaging purposes. This information will not be sold, rented, leased, or disclosed to any third party under any circumstances. This policy applies to all communication channels including SMS, MMS, RCS, WhatsApp, and AI-powered voice calls.
cookie Cookies
We use "First-Party Structural Cookies" to maintain session state and user preferences. These are essential for the operation of the Inspecta dashboard. Third-party analytical cookies are utilized exclusively to optimize platform performance.
share Third-Party Sharing
Inspecta does not sell, rent, or trade your personal data. We only share information with vetted service providers who facilitate our technical operations (e.g., cloud hosting, payment processing, telecommunications providers) under strict data processing agreements that prohibit any secondary use of your data.
Specifically regarding SMS and messaging data: We will not share personal information, including SMS/MMS opt-in consent and phone numbers, with any third parties or affiliates for marketing or promotional purposes. SMS consent data and originating opt-in information will not be shared with any third parties under any circumstances.
Service providers who process messaging on our behalf (e.g., Twilio) are bound by data processing agreements and are prohibited from using your data for any purpose other than delivering messages on behalf of Inspecta.
shield_locked Security Measures
"Architecture is security. Security is architecture."
We utilize SOC 2 Type II compliant data centers, end-to-end encryption for data in transit and at rest, and rigorous quarterly penetration testing to ensure the bastion of your data remains unbreached.