Del Security

Trust & Compliance

Del Security operates with legal authorization, confidentiality safeguards, and responsible coordination practices.

Legal & ethical commitment

We support responsible security collaboration only. We decline work involving unauthorized intrusion, abusive exploitation, stolen data, or requests that conflict with legal and ethical standards.

Vetting (KYC) & engagement rules

Engagements require defined authorization, clear scope boundaries, and purpose limitation. KYC and provenance checks may be applied before active work. Testing safeguards are set to limit operational risk.

Confidentiality

NDA-first onboarding is available. Access is restricted by least-privilege principles with controlled participant lists and need-to-know communication channels.

Data handling

Retention and deletion windows are configurable and case-by-case. Data is handled according to engagement requirements, sensitivity, and applicable compliance constraints.

Coordination principles

We coordinate with partners and support timeline or embargo alignment where appropriate.