Your Data’s Security
is at the Heart of What We Do
Enterprise-grade security built into every layer of our platform. From zero-trust architecture to continuous compliance validation, we maintain the security controls that Fortune 500 companies demand.
Our security practices include stringent access controls, multi-factor authentication, and regular audits, with a SOC 2 Type II report backing our commitment.

Data Encryption
Data is encrypted at every stage. We use SSL/TLS to secure data in transit, while data at rest is protected with robust encryption methods. This ensures that all information remains private, even as it moves across our systems.
Limited Access & Control
Only those who need access get it, and we monitor it closely. Through access control policies, multi-factor authentication, and SSO/SAML support, we ensure your data is managed securely. Logging and monitoring protocols give us insight into access events and any unusual activity.
Transparent Data Usage
We collect only what we need, and we keep you informed. Deck’s data practices are transparent, collecting minimal personal information (PII) to improve your experience. We ensure data is anonymized when possible and processed with your consent.
Privacy Protections
Your privacy is safeguarded by design. Our practices align with regulations like GDPR and CCPA, where applicable. We follow strict access policies so only the right people access your data. Our SOC 2 Type II compliance verifies our dedication to maintaining data privacy standards.
Rapid Incident Response
We’re prepared for the unexpected. If an incident or data breach occurs, our team acts quickly and follows a documented response plan. Clients are informed right away, and we work to contain and resolve the issue immediately.
End-of-Service Data Handling
When you’re ready to move on, your data doesn’t stay behind. At the end of service, we ensure all customer data, including backups, is permanently deleted per our retention policy, with no recoverable copies left behind.
Constant Monitoring & Auditing
We’re always vigilant. Our systems undergo continuous monitoring, allowing us to proactively detect and prevent security threats. Deck keeps a thorough audit trail for all key actions, ensuring transparency and accountability for every interaction with your data.
Hosting Provider
Our services are hosted on Microsoft Azure’s reliable infrastructure. We carefully vet all third-party subprocessors to ensure they meet our stringent security standards.
For Security Teams
We make security evaluations straightforward and transparent. For immediate access to our SOC 2 reports, security policies, and compliance documentation, visit our Trust Center. We maintain a coordinated vulnerability disclosure program at security@deck.co for reporting security concerns.