Skip to main content

What you’ll get out of this

  • Bank-grade encryption for all your data
  • Privacy-first design that minimizes data collection
  • Configurable security settings for your needs
  • Complete data control with export and deletion options

Encryption

1

AES-256 Encryption

All data is encrypted using industry-standard AES-256 encryption:
  • Data at rest: Encrypted in our secure databases
  • Data in transit: Encrypted during transmission
  • Backup data: Encrypted in secure storage
  • API communications: Encrypted with TLS 1.3
AES-256 is the same encryption standard used by banks and government agencies.
2

Key Management

Your encryption keys are managed securely:
  • Unique keys: Each account has its own encryption keys
  • Key rotation: Keys are rotated regularly for security
  • Secure storage: Keys are stored in secure hardware modules
  • No backdoors: We cannot access your encrypted data
If you lose your password, we cannot recover your encrypted data. Keep your password safe.
3

End-to-End Encryption

For maximum security, enable end-to-end encryption:
  • Client-side encryption: Data is encrypted before leaving your device
  • Zero-knowledge: We cannot see your encrypted data
  • Perfect forward secrecy: Compromised keys don’t affect past data
End-to-end encryption provides the highest level of security but may impact performance.

Data Minimization

1

Configure Data Collection

Choose exactly what data you want to store:
  • Minimal: Just name and contact info
  • Standard: Add payment history and preferences
  • Full: Complete customer profiles with notes
Less data means better privacy. You can always add more information later if needed.
2

Set Retention Periods

Automatically delete old data:
  • Customer data: Keep for specified period
  • Transaction logs: Archive after set time
  • Audit logs: Retain for compliance
  • Backup data: Delete after retention period
Data Retention Settings
3

Enable Data Anonymization

Automatically anonymize sensitive information:
  • Personal identifiers: Replace with anonymous IDs
  • Payment information: Hash credit card numbers
  • Location data: Generalize to city level
  • Contact details: Remove or hash phone numbers
Anonymization helps protect privacy while preserving useful business insights.

Access Controls

1

Role-Based Permissions

Control who can access what data:
  • Admin: Full access to all data and settings
  • Manager: Access to customer and transaction data
  • Staff: Limited access to assigned customers
  • Viewer: Read-only access to specific data
Grant permissions carefully. Users can only access data they need for their role.
2

IP Restrictions

Limit access to specific IP addresses:
  • Office networks: Allow access from office IPs
  • VPN connections: Require VPN for remote access
  • Mobile devices: Allow access from mobile networks
  • Geographic restrictions: Block access from certain countries
IP restrictions add an extra layer of security but may impact mobile access.
3

Time-Based Access

Control when users can access the system:
  • Business hours: Only during work hours
  • Weekdays only: Block weekend access
  • Custom schedules: Set specific time windows
  • Emergency access: Override for urgent situations
Time-based access helps prevent unauthorized access outside business hours.

Audit and Monitoring

1

Enable Audit Logging

Track all access to your data:
  • Login attempts: Successful and failed logins
  • Data access: Who viewed what data
  • Changes made: What data was modified
  • Export activities: When data was downloaded
Audit Log Interface
2

Set Up Alerts

Get notified about suspicious activity:
  • Failed login attempts: Multiple failed attempts
  • Unusual access patterns: Access from new locations
  • Data exports: Large data downloads
  • Permission changes: Modified user permissions
Security alerts help you detect potential security breaches early.
3

Regular Security Reviews

Periodically review your security settings:
  • User permissions: Review who has access to what
  • Active sessions: Check for unauthorized logins
  • Audit logs: Look for suspicious activity
  • Security settings: Ensure they meet your needs
Regular security reviews help maintain a secure environment for your business data.

Compliance

1

GDPR Compliance

Meet European data protection requirements:
  • Right to access: Export all your data
  • Right to rectification: Correct inaccurate data
  • Right to erasure: Delete data when requested
  • Data portability: Move data to other systems
DeelRx CRM is designed to help you comply with GDPR and other privacy regulations.
2

CCPA Compliance

Meet California privacy requirements:
  • Data collection disclosure: Clear information about data use
  • Opt-out rights: Control data sharing
  • Data deletion: Remove data when requested
  • Non-discrimination: Equal service regardless of privacy choices
CCPA compliance helps protect your customers’ privacy rights in California.
3

Industry Standards

Follow security best practices:
  • SOC 2 Type II: Security and availability controls
  • ISO 27001: Information security management
  • PCI DSS: Payment card data security
  • HIPAA: Healthcare data protection (if applicable)
Compliance requirements vary by industry and location. Consult with legal experts for your specific needs.

Data Export and Deletion

1

Export Your Data

Download all your data in standard formats:
  • CSV format: For spreadsheet applications
  • JSON format: For technical integrations
  • PDF reports: For human-readable reports
  • Complete backup: All data in one file
Regular data exports help ensure you always have access to your business information.
2

Selective Deletion

Delete specific data while keeping what you need:
  • Customer data: Remove individual customers
  • Transaction history: Delete old transactions
  • Audit logs: Remove old log entries
  • Backup data: Delete old backups
Data Deletion Interface
3

Account Deletion

Completely remove your account and all data:
  • Immediate deletion: Remove all data immediately
  • Grace period: 30-day grace period for recovery
  • Confirmation required: Multiple confirmations needed
  • Irreversible: Cannot be undone once confirmed
Account deletion is permanent and cannot be undone. Make sure you have exported all important data first.

Security Best Practices

Enable two-factor authentication and use strong, unique passwords for your account.
Keep your devices and browsers updated to protect against security vulnerabilities.
Regularly review your audit logs and active sessions to detect unauthorized access.
Export your data regularly to ensure you always have access to your business information.

Troubleshooting

Check your permissions and contact your administrator. Your access may have been restricted.
Review the alert details and take appropriate action. Contact support if you need help.
Try exporting smaller amounts of data or contact support for assistance with large exports.
Consult with legal experts for specific compliance requirements in your industry and location.