Security
Droposal safeguards your privacy, keeps your documents secure, and makes them accessible wherever you are. Learn how we ensure the security of your data.
GDPR Compliance
Droposal takes personal data protection seriously, making GDPR compliance a top priority. To understand how this affects your account security, we have prepared an article detailing how we handle your data.
Certified Data Centers
Droposal utilizes Amazon AWS data centers for its services. Their infrastructure is ISO27001 and SOCII certified, making it the most reliable and secure cloud platform globally.
Third-Party Subprocessors
We carefully select third-party subprocessors at Droposal. Before partnering with them, we ensure they meet acceptable security standards.
Servers
Droposal follows industry best practices, keeping our services up to date with the latest security enhancements. We use a secure and reliable AWS cloud-based platform to store our software.
Data Storage
We store user data in separate databases. Continuous backups are made and stored in multiple locations to ensure maximum security during data handling.
Employee Access
Our environment is secured with 2FA access. Our employees only have access to the information necessary for their efficient work.
Payment Processing
To protect our customers' privacy, Droposal uses third-party payment processing (Stripe). We do not store, transmit, or process any payment information.
System Monitoring
We continuously monitor Droposal's performance metrics and availability. Critical alerts are immediately forwarded to our development and cybersecurity teams.
Coding and Testing Standards
Our primary focus is to ensure our software meets security requirements. To align our programming methods with industry best practices, we have documented our development and quality assurance procedures.
Isolated Environments
Droposal's network segments are logically isolated. This means that processes such as feature development and other testing take place on a server isolated from the main platform.
Vulnerability Testing
During development and testing, our team continuously monitors the application's security, identifying potential errors before they become public. Additionally, we conduct regular penetration tests with specialized partners for this purpose.