Your data’s security is at the heart of what we do

From design to deployment, our systems are crafted to keep your data
safe and accessible only to authorized users. Our security practices include stringent access controls, multi-factor authentication, and regular audits, with SOC 2 certification backing our commitment.

Data Encryption

Data is encrypted at every stage. We use SSL/TLS to secure data in transit, while data at rest is protected with robust encryption methods. This ensures that all information remains private, even as it moves across our systems.

Limited Access & Control

Only those who need access get it, and we monitor it closely. Through access control policies, multi-factor authentication, and SSO/SAML support, we ensure your data is managed securely. Logging and monitoring protocols give us insight into access events and any unusual activity.

Transparent Data Usage

We collect only what we need, and we keep you informed. Deck’s data practices are transparent, collecting minimal personal information (PII) to improve your experience.
We ensure data is anonymized when possible and processed with your consent.

Privacy Protections

Your privacy is safeguarded by design.
Our practices align with regulations like GDPR
and CCPA, where applicable. We follow strict access policies so only the right people access
your data. Our SOC 2 certification verifies our dedication to maintaining data privacy standards.

Rapid Incident Response

We’re prepared for the unexpected. If an incident or data breach occurs, our team acts quickly and follows a documented response plan. Clients are informed right away, and we work to contain and resolve the issue immediately.

End-of-Service Data Handling

When you’re ready to move on, your data doesn’t stay behind. At the end of service, we ensure all customer data, including backups,
is permanently deleted per our retention policy, with no recoverable copies left behind.

Constant Monitoring & Auditing

We’re always vigilant. Our systems undergo continuous monitoring, allowing us to proactively detect and prevent security threats. Deck keeps a thorough audit trail for all key actions, ensuring transparency and accountability for every interaction with your data.

Hosting Provider

Our services are hosted on Microsoft Azure’s reliable infrastructure. We carefully vet all third-party subprocessors to ensure they meet our stringent security standards.