Announcing Deposely Essentials - free AI tools to level up your depos. Try it now.

Security & Privacy at Deposely

Deposely employs the latest security and privacy industry best practices to ensure your data is safe and secure.

security

Explore our Trust Center

Industry Standards

Deposely aligns its security and privacy practices with the highest industry standards and regulations. Note that Deposely is currently in the process of obtaining certifications for the listed frameworks.

  • SOC 2

    SOC 2 is a widely recognized security compliance certification that demonstrates that an organization has implemented an effective security program. Deposely is in the process of obtaining certification through the audit process.

  • HIPAA

    HIPAA is a federal law that requires healthcare providers and health plans to protect certain health information. Deposely is in the process of obtaining certification.

Security Practices

Deposely maintains a robust security and privacy program to protect your data. From software to governance and compliance, we take many measures to ensure your data is safe and secure.

  • Encryption at Rest

    All data stored in Deposely is encrypted at rest using industry-standard encryption algorithms. This helps protect your data from unauthorized access and ensures that your data is secure.

  • Encryption in Transit

    Deposely requires TLS encryption alongside HSTS to protect data in transit. This ensures that your data is secure when it is being transmitted between your device and our servers.

  • Access Control

    We implement strong access controls to ensure that only authorized users can access your data. Even Deposely personnel can only access your private data when necessary and with your permission (note that Deposely personnel may access generalized metrics about your account).

  • Penetration Testing

    Deposely conducts regular penetration tests by third-party security experts. This helps ensure that our security controls are effective and that your data is safe and secure.

  • Software Supply Chain Security

    We regularly scan our software supply chain for vulnerabilities and security issues.

  • Two-Factor Authentication

    We require all users to enable two-factor authentication to protect their account. This adds an extra layer of security to your account and helps prevent unauthorized access.