A business built on trust
Trust is the foundation of our brand. Daltrey was founded with security, regulatory compliance and privacy at its core and protecting your data is at the heart of every decision we make.
Secure by design
We pride ourselves on having a robust information security management framework, with strict checkpoints governing each step of our development lifecycle, internal processes and culture.
Our platform is designed with multiple layers of protection, including secure file data transfer, industry-leading encryption and application-level controls that are distributed across a scalable infrastructure. We ensure all our service providers meet strict data protection standards and have selected a market-leading cloud service to create a sophisticated infrastructure that protects data while being transferred, stored and processed.
Transparency and control
Daltrey’s solution empowers you to customise your controls according to your organisation’s specific security and compliance requirements. We’ll work with you to create seamless partner product integrations and allow you to configure your settings.
A culture of security
We continually assess risks, proactively reviewing and improving our security infrastructure and policies. Our expert security team performs application and network security testing, conducts risk assessments, monitors compliance and limits the amount of employees and contractors who have access to systems.
Validate trust & compliance
We champion the zero trust model. This means we fully encourage and expect you to verify and validate our own trustworthiness.
We use independent third-party auditors to review our systems against the strictest and most-accepted international standards and regulations. We share audit reports wherever possible, so you can review exactly how we’re keeping your data secure.
Our commitment to privacy
You own your data – and we’re fully committed to keeping it private. We are GDPR and CCPA compliant and follow best practices at all times.
- What kind of data we collect and why
- How we protect this data and how long we retain it
- Where we keep and transmit your data
- What happens if the policy changes