Del Security

Data Handling

Effective: February 2026

Del Security uses a need-to-know model for submission and engagement data. This document is a general operational statement.

Collection

We collect the minimum technical and contact information required for triage, validation, and coordination.

Access control

Access is restricted by role and engagement context. Sensitive artifacts are handled through controlled channels.

Retention and deletion

Retention windows are configurable and determined case-by-case, including contractual terms, operational need, and compliance constraints.

Compliance screening

Engagements may include provenance checks, KYC review, and sanctions or export-control screening before proceeding.