YOUR PROTECTION

About the T-Mobile Trust Center.

Time to read: 5 minutes

Person typing on phone.

At a glance

Safeguarding your information is the primary focus of our dedicated cybersecurity team.

We undergo annual risk assessments and audits to help make sure we’re protecting data.

Visit the T-Mobile Trust Center to see how our cybersecurity program is getting better all the time.

Committed to cybersecurity

T-Mobile collects and uses some personal information to improve your experience as a customer. Protecting that data is a responsibility we take seriously. Today, we use increasingly sophisticated cybersecurity measures to help protect our systems from digital attacks and better protect your information.

Taking the right steps

It’s easy to say we’re doing all we can to safeguard your data. But how can we show you?

Just as there are safety and reliability ratings for cars—there are also security ratings for companies that handle personal information. To earn a favorable rating, companies must adhere to standards or best practices set by state, national, and international organizations.

We work diligently to meet or exceed the strict guidelines created by these independent organizations. And we’re sharing the results with you. 

Ratings and reviews 

T-Mobile pursues outside reviews and accreditations to validate our cybersecurity progress. These certifications, audits, and grades include many original reports provided by credible third parties. By reading them, you’ll gain an understanding of our cybersecurity approach, alignment, and best practices. They’re all gathered in the T-Mobile Trust Center.

Key certifications

While every cybersecurity assessment serves as a valuable tool for improvement, industry experts pay special attention to the highly respected certifications described below. Achieving these benchmarks truly demonstrates that an organization is committed to data security and privacy. You can find out more in the Trust Center.

  • Developed by the International Organization for Standardization (ISO)

    Demonstrates long-term commitment to a comprehensive information security program. It’s one of the most well-known cybersecurity certifications in the world. This in-depth audit shows that a company has processes in place to continuously improve their cybersecurity program.

  • Developed by the American Institute of Certified Public Accountants (AICPA)

    Demonstrates how a company is storing and processing customer data securely based on the stringent requirements of the AICPA. This evaluation analyzes the security, availability, processing integrity, confidentiality, and privacy of key systems and data over 12 months. 

  • Developed by the American Institute of Certified Public Accountants (AICPA)

    Provides a high-level overview of a company’s security practices based on their comprehensive SOC 2 Type 2 audit.

  • Performed by independent technology research companies

    Tests a company’s network using a planned security exercise or mock cyberattack. Weak spots can be immediately corrected by the security team before bad actors can infiltrate their defenses. 

Stay informed

You can visit the T-Mobile Trust Center any time to check the results of our independent audits. Or you can subscribe to our Trust Center updates. We’ll deliver important information right to your inbox about our security successes—and challenges.

Join our team

If you’re a cyber sleuth, we’d love to have you as a partner in the fight against information crimes.

Bug Bounty icon

Sign up for Bug Bounty 

This public program is open to ethical hackers and cybersecurity professionals who want to stop criminals before they act. Use your skills to help us search for “bugs” or vulnerabilities in our systems and applications. You could earn a digital badge of honor—plus a bounty payout.

T-Mobile icon

Apply for a cybersecurity position 

We’re always looking for experts with the skills and passion to make our cybersecurity team even stronger. If you’re ready to make a difference, explore our
full-time openings.

Related links