Data Handling
Effective: February 2026
Del Security uses a need-to-know model for submission and engagement data. This document is a general operational statement.
Collection
We collect the minimum technical and contact information required for triage, validation, and coordination.
Access control
Access is restricted by role and engagement context. Sensitive artifacts are handled through controlled channels.
Retention and deletion
Retention windows are configurable and determined case-by-case, including contractual terms, operational need, and compliance constraints.
Compliance screening
Engagements may include provenance checks, KYC review, and sanctions or export-control screening before proceeding.