SECURITY AND COMPLIANCE
Zeck Keeps Your Board Data Compliant and Secure.
Zeck’s best-in-class security capabilities ensures that you keep your sensitive data private. Built on Amazon Web Services' most advanced security protections.
Secured with AWS
AWS is architected to be the most secure global cloud infrastructure and is, by far, the largest vendor of data storage. AWS is responsible for securing Zeck's physical hosting facilities and physical infrastructure.
Access Controls
Customize user access and data permissions down to the last detail. Zeck's multi-tier permissions system gives you the power to manage access at all levels, maintaining a secure board meeting environment.
Certified and Monitored
Zeck is Soc 2 Type II certified, meets GDPR requirements, and our security, controls, data retention, and data recovery practices are audited by third-party firms.
Secure by Design.
Data Encryption
Strong encryption is used to protect all data in transit and at rest using the industry-standard TLS (Transport Layer Security) protocol and AES (Advanced Encryption Standard) 256-bit key lengths.
Audited Policies & Controls
Zeck maintains robust security and operational policies, has third-party monitored platform security controls, and has audits performed by accredited firms.
Event Monitoring
All product systems are monitored for security and availability. If any security or availability event were to occur, alerts are delivered to our engineering and product team via realtime messaging services, text messages, and email alerts.
Privileged Access
Zeck follows the principle of least privilege for administration and data access, meaning that engineers only are given access by security group to the precise data they need to perform their jobs.
Secure Development
At Zeck, all secured coding best practices (SSDLC) are followed. All code changes must move through lower environments, are reviewed and approved, and must go through User Acceptance Testing (UAT) testing prior to production deployment.
Penetration Testing
In addition to internal security testing, Zeck uses third-party independent penetration testing to check for security vulnerabilities.
Data Backup
Zeck backs up customer data to several alternate regions in case any issues arise in a primary region. We have a robust disaster recovery plan that is tested and reviewed by third-parties.
Data Privacy
Customer data is considered confidential and is handled as such. Customer data is never stored outside the production environment. All Zeck employees sign confidentiality agreements and are trained on our confidential data policies.
AI without the risk.
Zeck AI will keep everything secure.
Security is table stakes at Zeck. Zeck AI does not feed any of your content to the LLM to be trained on. We’ve built Zeck AI so that your data is never mixed with any other Zeck customer, or anyone else.
Zeck Trust Center.
Get access to our security policies, standards, and monitored controls.
Request Access to the Trust Center
Learn More About Securing Your Most Sensitive Board Data.
Speak to a Zeck expert.
Zeck is light speed faster for me as CEO, more readable for my board, and the comments feature dramatically improves the substance of our meetings.
- Josh Trautwein, Co-Founder and CEO, About Fresh