From design to deployment, our systems are crafted to keep your data
safe and accessible only to authorized users. Our security practices include stringent access controls, multi-factor authentication, and regular audits, with SOC 2 certification backing our commitment.
Data is encrypted at every stage. We use SSL/TLS to secure data in transit, while data at rest is protected with robust encryption methods. This ensures that all information remains private, even as it moves across our systems.
Only those who need access get it, and we monitor it closely. Through access control policies, multi-factor authentication, and SSO/SAML support, we ensure your data is managed securely. Logging and monitoring protocols give us insight into access events and any unusual activity.
We collect only what we need, and we keep you informed. Deck’s data practices are transparent, collecting minimal personal information (PII) to improve your experience.
We ensure data is anonymized when possible and processed with your consent.
Your privacy is safeguarded by design.
Our practices align with regulations like GDPR
and CCPA, where applicable. We follow strict access policies so only the right people access
your data. Our SOC 2 certification verifies our dedication to maintaining data privacy standards.
We’re prepared for the unexpected. If an incident or data breach occurs, our team acts quickly and follows a documented response plan. Clients are informed right away, and we work to contain and resolve the issue immediately.
When you’re ready to move on, your data doesn’t stay behind. At the end of service, we ensure all customer data, including backups,
is permanently deleted per our retention policy, with no recoverable copies left behind.
We’re always vigilant. Our systems undergo continuous monitoring, allowing us to proactively detect and prevent security threats. Deck keeps a thorough audit trail for all key actions, ensuring transparency and accountability for every interaction with your data.
Our services are hosted on Microsoft Azure’s reliable infrastructure. We carefully vet all third-party subprocessors to ensure they meet our stringent security standards.