Release note (legal finalization required)
This page includes placeholders for legal entity details, mailing address, and/or governing law venue that must be finalized before public release.
Effective date: February 23, 2026 • Last updated: February 23, 2026
This page provides a high-level overview of DoSurely security practices and how customers can request a DPA or security review materials.
This page includes placeholders for legal entity details, mailing address, and/or governing law venue that must be finalized before public release.
DoSurely is designed for operational accountability workflows and includes controls intended to support secure access, auditable activity, and reliable service delivery for customer organizations.
We use authentication and authorization controls to restrict access to customer accounts and administrative functionality. Access is managed according to user roles and operational needs.
We use service architectures and providers that support encryption in transit and storage protections where applicable. Exact implementation details may vary by environment, provider, and deployment configuration.
We maintain operational logs and monitoring signals intended to support troubleshooting, reliability, and security response. If we identify a security incident affecting customer data, we will take response actions consistent with applicable law and contractual commitments.
We maintain and update software components and infrastructure over time, including security patches and reliability improvements. We may also evaluate issues identified through internal review, customer reports, or vendor advisories.
DoSurely uses operational practices intended to support service continuity and data durability. Specific retention, recovery timing, and backup designs may vary by environment and are not guaranteed unless agreed in a separate written contract.
Eligible customers may request a Data Processing Agreement (DPA), subprocessor information, or security review materials by contacting contact@dosurely.com.
Please include your organization name, deployment environment (if applicable), and the documents you are requesting to help us route your request efficiently.
See our Privacy Policy and Subprocessors page for additional information.