<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=347757937314506&amp;ev=PageView&amp;noscript=1">

SECURITY AND COMPLIANCE

Zeck Keeps Your Board Data  Compliant and Secure.

Zeck’s best-in-class security capabilities ensures that you keep your sensitive data private. Built on Amazon Web Services' most advanced security protections.

AWS-1

Secured with AWS

AWS is architected to be the most secure global cloud infrastructure and is, by far, the largest vendor of data storage. AWS is responsible for securing Zeck's physical hosting facilities and physical infrastructure.

 

Secure-1

Access Controls

Customize user access and data permissions down to the last detail. Zeck's multi-tier permissions system gives you the power to manage access at all levels, maintaining a secure board meeting environment.

 

badges-2

Certified and Monitored

Zeck is Soc 2 Type II certified, meets GDPR requirements, and our security, controls, data retention, and data recovery practices are audited by third-party firms.

 

Secure by Design.

Data Encryption

Strong encryption is used to protect all data in transit and at rest using the industry-standard TLS (Transport Layer Security) protocol and AES (Advanced Encryption Standard) 256-bit key lengths.

Audited Policies & Controls

Zeck maintains robust security and operational policies, has third-party monitored platform security controls, and has audits performed by accredited firms.

Event Monitoring

All product systems are monitored for security and availability. If any security or availability event were to occur, alerts are delivered to our engineering and product team via realtime messaging services, text messages, and email alerts.

Privileged Access

Zeck follows the principle of least privilege for administration and data access, meaning that engineers only are given access by security group to the precise data they need to perform their jobs.

Secure Development

At Zeck, all secured coding best practices (SSDLC) are followed. All code changes must move through lower environments, are reviewed and approved, and must go through User Acceptance Testing (UAT) testing prior to production deployment.

Penetration Testing

In addition to internal security testing, Zeck uses third-party independent penetration testing to check for security vulnerabilities.

Data Backup

Zeck backs up customer data to several alternate regions in case any issues arise in a primary region. We have a robust disaster recovery plan that is tested and reviewed by third-parties.

Data Privacy

Customer data is considered confidential and is handled as such. Customer data is never stored outside the production environment. All Zeck employees sign confidentiality agreements and are trained on our confidential data policies.

AI-stars-1 AI without the risk.

Zeck AI will keep everything secure.

Security is table stakes at Zeck. Zeck AI does not feed any of your content to the LLM to be trained on. We’ve built Zeck AI so that your data is never mixed with any other Zeck customer, or anyone else.

 

Zeck Trust Center.

Get access to our security policies, standards, and monitored controls.


Request Access to the Trust Center

Chat With Us

Speak to a Zeck expert to learn more about saving time and money by ending the misery of the board meeting.

quote

Zeck is light speed faster for me as CEO, more readable for my board, and the comments feature dramatically improves the substance of our meetings.

- Josh Trautwein, Co-Founder and CEO, About Fresh

aboutfresh-transparent