The security, integrity, and availability of Deeploop’s systems and customer information are our highest priority. They are ensured via a strategic combination of industry best practices, deep industry experience, and partnership with best-in-class providers such as Google Cloud Platform (GCP). This document will provide a high-level overview of this security posture.
Application security is managed by Deeploop and includes the following controls:
Production resources are hosted by Google Cloud Platform (GCP provides a wide range of information regarding its IT control environment to customers through white papers, reports, certifications, accreditations, and other third-party attestations. More information is available in the Risk and Compliance whitepaper available on their website.
This includes the following controls:
Network access is managed by Deeploop and includes the following controls:
Security monitoring is managed by gcp and includes the following controls:
Security regulatory compliance is managed by GCP and includes the following controls:
The IT infrastructure that GCP provides is designed and managed in alignment with best security practices and a variety of IT security standards, including:*
Business regulatory compliance is managed by Deeploop and includes:
When used as directed (specifically only with inbound leads, i.e. people who have already by definition opted in to being contacted), the Deeploop service is exempt from the CAN-SPAM Act and the Canada Anti-Spam Law (CASL), which establish requirements for commercial messages.
Access and authorization to production resources include the following controls:
Security Policies include:
Service Availability is managed by Deeploop and includes the following controls:
Critical systems have multiple failover systems implemented.