Security at DeputyCRM
We prioritize the security and privacy of your data with industry-leading safeguards and practices.
Our Security Features
Comprehensive protection at every level
Data Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Access Controls
Granular role-based access controls ensure users only see the data they need to do their jobs.
Secure Infrastructure
Our infrastructure is hosted in SOC 2 compliant data centers with 24/7 physical security.
Regular Audits
We conduct regular security audits and penetration tests to identify and fix vulnerabilities.
Data Backups
Automatic backups are performed daily with point-in-time recovery options.
Compliance
We maintain compliance with industry standards including GDPR, CCPA, HIPAA, and SOC 2.
Our Security Features
Data Protection
Your data is encrypted both in transit and at rest using industry-standard encryption protocols. We use TLS 1.3 for all data in transit, and AES-256 encryption for data at rest.
Our database is backed up daily, with point-in-time recovery options available. We maintain multiple backup locations to ensure data durability and availability.
Access Controls
We implement a least-privilege access model for all systems and data. Our platform offers granular role-based access controls that allow you to determine exactly what each user can see and do.
All access to production systems is logged and monitored, with multi-factor authentication required for all administrative access.
Infrastructure Security
Our application is hosted in SOC 2 compliant data centers with 24/7 physical security, redundant power, and network connectivity. We use cloud providers that maintain the highest standards of physical and network security.
Our network is protected by enterprise-grade firewalls, with regular intrusion detection scanning and DDoS protection.
Application Security
Our development team follows secure coding practices and OWASP guidelines. All code undergoes security review before deployment, and we conduct regular security testing, including penetration testing by third-party security firms.
We maintain a vulnerability management program to identify, classify, and remediate security issues quickly
Compliance
DeputyCRM maintains compliance with industry standards and regulations including:
- SOC 2 Type II
- GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- HIPAA (for customers in healthcare)
Incident Response
We maintain a comprehensive incident response plan that outlines procedures for identifying, containing, and resolving security incidents. Our security team is available 24/7 to respond to security alerts.
In the event of a security incident that affects your data, we are committed to timely notification and transparent communication.
We maintain a comprehensive incident response plan that outlines procedures for identifying, containing, and resolving security incidents. Our security team is available 24/7 to respond to security alerts.
In the event of a security incident that affects your data, we are committed to timely notification and transparent communication.
Our Security Certifications
SOC 2 Type II
GDPR Compliant
HIPAA Compliant
ISO 27001
Questions about our security?
Our security team is available to address any concerns or questions you may have about how we protect your data.