Security at DeputyCRM

We prioritize the security and privacy of your data with industry-leading safeguards and practices.

 

Our Security Features

Comprehensive protection at every level

 

Data Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Access Controls

Granular role-based access controls ensure users only see the data they need to do their jobs.

data-base

Secure Infrastructure

Our infrastructure is hosted in SOC 2 compliant data centers with 24/7 physical security.

Regular Audits

We conduct regular security audits and penetration tests to identify and fix vulnerabilities.

Data Backups

Automatic backups are performed daily with point-in-time recovery options.

Compliance

We maintain compliance with industry standards including GDPR, CCPA, HIPAA, and SOC 2.

Our Security Features

Data Protection

Your data is encrypted both in transit and at rest using industry-standard encryption protocols. We use TLS 1.3 for all data in transit, and AES-256 encryption for data at rest.

Our database is backed up daily, with point-in-time recovery options available. We maintain multiple backup locations to ensure data durability and availability.

Access Controls

We implement a least-privilege access model for all systems and data. Our platform offers granular role-based access controls that allow you to determine exactly what each user can see and do.

All access to production systems is logged and monitored, with multi-factor authentication required for all administrative access.

Infrastructure Security

Our application is hosted in SOC 2 compliant data centers with 24/7 physical security, redundant power, and network connectivity. We use cloud providers that maintain the highest standards of physical and network security.

Our network is protected by enterprise-grade firewalls, with regular intrusion detection scanning and DDoS protection.

Application Security

Our development team follows secure coding practices and OWASP guidelines. All code undergoes security review before deployment, and we conduct regular security testing, including penetration testing by third-party security firms.

We maintain a vulnerability management program to identify, classify, and remediate security issues quickly

Compliance

DeputyCRM maintains compliance with industry standards and regulations including:

  • SOC 2 Type II
  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • HIPAA (for customers in healthcare)

Incident Response

We maintain a comprehensive incident response plan that outlines procedures for identifying, containing, and resolving security incidents. Our security team is available 24/7 to respond to security alerts.

In the event of a security incident that affects your data, we are committed to timely notification and transparent communication.

We maintain a comprehensive incident response plan that outlines procedures for identifying, containing, and resolving security incidents. Our security team is available 24/7 to respond to security alerts.

In the event of a security incident that affects your data, we are committed to timely notification and transparent communication.

Our Security Certifications

SOC 2 Type II

GDPR Compliant

HIPAA Compliant

ISO 27001

Questions about our security?

Our security team is available to address any concerns or questions you may have about how we protect your data.