Announcing Deposely Essentials - free AI tools to level up your depos. Try it now.

Security & Privacy at Deposely

Deposely employs the latest security and privacy industry best practices to ensure your data is safe and secure.

security

Explore our Trust Center

Industry Standards

Deposely's security and privacy practices meet the highest industry standards.

  • SOC 2

    SOC 2

    SOC 2 is a widely recognized security compliance certification that demonstrates that an organization has implemented an effective security program. Deposely has obtained SOC 2 Type II certification, demonstrating that we have implemented an effective security program.

  • HIPAA

    HIPAA

    HIPAA is a federal law that requires healthcare providers and health plans to protect certain health information. While Deposely is not typically a business associate under these regulations, we have audited our security practices to ensure that we are compliant with HIPAA.

Security Practices

Deposely maintains a robust security and privacy program to protect your data. From software to governance and compliance, we take many measures to ensure your data is safe and secure.

  • Encryption at Rest

    All data stored in Deposely is encrypted at rest using industry-standard encryption algorithms. This helps protect your data from unauthorized access and ensures that your data is secure.

  • Encryption in Transit

    Deposely requires TLS encryption alongside HSTS to protect data in transit. This ensures that your data is secure when it is being transmitted between your device and our servers.

  • Access Control

    We implement strong access controls to ensure that only authorized users can access your data. Even Deposely personnel can only access your private data when necessary and with your permission (note that Deposely personnel may access generalized metrics about your account).

  • Penetration Testing

    Deposely conducts regular penetration tests by third-party security experts. This helps ensure that our security controls are effective and that your data is safe and secure.

  • Software Supply Chain Security

    We regularly scan our software supply chain for vulnerabilities and security issues.

  • Two-Factor Authentication

    We require all users to enable two-factor authentication to protect their account. This adds an extra layer of security to your account and helps prevent unauthorized access.