Segurança
Os Planos de Arranjo Geral contêm a estrutura do seu navio. É informação técnica sensível. Aqui está uma explicação clara de como a protegemos.
Última atualização: 23 de março de 2026
TLS 1.2+
Encrypted in transit
AES-256
Encrypted at rest
EU data residency
Servers hosted in the EU
Row-level isolation
Per-org data separation
MFA supported
Authenticator app or email
Audit logs
All access and changes recorded
72 h breach notice
GDPR Art. 33 compliant
DPA available
SCCs in place for EU customers
Decktrace runs on managed cloud infrastructure hosted in the European Union (EU). We use established providers rather than self-hosting critical components:
Where sub-processors are located outside the EU (for example, Stripe in the United States), we rely on Standard Contractual Clauses (SCCs) adopted by the European Commission, or the EU-US Data Protection Framework where applicable, to ensure an equivalent level of protection. You may request copies of the SCCs we have in place by contacting hello@decktrace.io.
All connections to Decktrace — the web application, API, and embeddable viewer — are served exclusively over HTTPS using TLS 1.2 or higher. HTTP requests are automatically redirected to HTTPS. Older protocols (TLS 1.0, 1.1, SSLv3) are disabled. HTTP Strict Transport Security (HSTS) headers enforce HTTPS for all subsequent visits.
Database records and uploaded GA plan files are encrypted at rest using AES-256. Encryption keys are managed by the infrastructure provider's key management service and are not accessible to application-level code.
Service API keys and credentials are stored as encrypted environment variables, never in source code or version control. Credentials are rotated when team members with access leave the organization.
Account access is protected by the following controls:
Each organization on Decktrace sees only its own data. Isolation is enforced at the database level using Row Level Security (RLS) policies — not only at the application layer. Even in the presence of an application bug, database queries cannot return records belonging to another organization.
Within an organization, access is role-based. Roles determine who can upload GA plans, edit catalogs, manage API keys, invite members, and administer billing.
Our team accesses production data only when necessary to resolve a confirmed support issue, and only with audit logging active. We do not have standing read access to your vessel catalog content or uploaded files.
Our development practices follow the OWASP Top 10 as a baseline:
GA plan files (PDFs and images) are processed in an isolated server environment. Before any processing occurs:
The embeddable viewer renders catalog geometry from structured API data, not from the raw uploaded file. Your GA plan files are never exposed through the viewer.
We maintain two distinct categories of logs with different retention policies:
Web server access logs (IP address, request path, timestamp, browser) are retained for a maximum of 30 days, after which IP addresses are anonymized and logs are aggregated for infrastructure diagnostics only. These logs are never used for marketing or profiling purposes. Legal basis: Art. 6(1)(f) GDPR — legitimate interest in maintaining technically secure and error-free operation.
Security-relevant events — sign-ins, catalog edits, file uploads, API key changes, role modifications — are retained for 12 months and are available for export by organization owners. These logs support accountability, incident investigation, and your own compliance requirements.
Application audit logs capture:
Organization owners can request an audit log export. Logs are retained for 12 months.
We test recovery procedures periodically to confirm backups are functional and restoration times are within stated targets.
GA plans describe the physical layout of vessels — structural compartments, safety equipment locations, access routes, and tank configurations. We treat this information accordingly:
Customers with specific ISPS Code compliance requirements or vessels with sensitive classifications should contact us to discuss appropriate data handling arrangements.
If you believe Decktrace has not addressed a privacy concern adequately, you have the right to lodge a complaint with the supervisory authority in your EU member state. A list of EU data protection authorities is maintained at edpb.europa.eu.
We conduct internal security reviews on a quarterly basis covering dependency vulnerabilities, infrastructure configuration, and access control policies. We intend to commission independent third-party penetration testing and will make a summary of findings and remediation status available to customers on request under NDA.
We are evaluating SOC 2 Type II certification as we scale. Enterprise customers with specific compliance requirements are welcome to contact us to discuss assessments, questionnaires, or custom DPAs.
In the event of a confirmed security incident affecting customer data:
When you delete your account or your subscription ends and the 30-day export window closes, your active data — GA plan files, vessel catalog records, and user profiles — is permanently deleted. Encrypted backups are purged within a further 30 days. Deletion is irreversible.
We welcome reports from security researchers. If you discover a vulnerability in Decktrace, please report it to hello@decktrace.io with the subject line "Security Disclosure." We commit to:
We ask that you avoid accessing data belonging to other organizations, do not disrupt service availability, and allow us reasonable time to address the issue before public disclosure.
If your organization processes personal data of EU residents through Decktrace, you may require a Data Processing Agreement (DPA) under GDPR Article 28. Contact hello@decktrace.io to request a DPA. We will also provide copies of the Standard Contractual Clauses in place with our US-based sub-processors on request.
Security questions and vulnerability reports: hello@decktrace.io
Legal, DPA, and SCC requests: hello@decktrace.io