DekkoSecure enforces regional data residency by operating DekkoCORE in Australia, the United States, Canada, and Switzerland, while hosting DekkoDEMS solely in the US to support encrypted and jurisdiction-aligned workflows.
Compliance
DekkoSecure is designed for high-assurance environments where confidentiality, integrity, and jurisdictional control are mandatory. The platform aligns with key government and industry requirements across Australia, Canada, the United States, and Europe, supporting agencies that handle sensitive information, regulated data, and digital evidence.
DekkoCORE, our secure collaboration solution, applies these controls across multi-agency file sharing, messaging, eSignatures, video meetings, and Hub-based workflows. Compliance is enforced across all features, with region-specific hosting and full end-to-end encryption ensuring data remains jurisdiction-bound and visible only to authorised users.
DekkoDEMS, our digital evidence management system, applies the same security and compliance foundations while adding specialised chain-of-custody protections, auditability, and evidence-handling safeguards. Hosted solely in the United States, it supports encrypted evidence workflows, tamper-evident logging, and integration with CJIS-aligned controls.
DekkoSecure’s Australian environment is independently assessed against the ISM at PROTECTED level under IRAP, delivering secure, compliant foundations for government collaboration and digital evidence workflows.
DekkoSecure aligns with the FBI CJIS Security Policy by using FIPS 140-validated cryptographic modules and enforcing strict authentication, access controls, and encrypted evidence workflows across justice-sector users.
DekkoSecure meets Ontario GO-ITS 25.21 requirements by following ITSG-33 security controls and ensuring Ontario-based data residency, encrypted collaboration, and auditable workflows for justice and public-sector agencies.
DekkoSecure supports privacy requirements under HIPAA, GDPR, and the Australian Privacy Principles by enforcing strict access controls, regional data residency, and full end-to-end encryption to ensure sensitive personal information remains protected.
DekkoSecure protects all content with strong end-to-end encryption using AES-256 for symmetric file and message keys and ECC-384 for user key pairs, ensuring robust confidentiality, integrity, and cryptographic assurance across every collaborative workflow.
DekkoSecure applies a full Zero Trust model across all collaboration features by enforcing continuous authentication, granular Hub-based permissions, and strict SSO-driven identity controls to ensure that only verified users can access specific data and actions.
DekkoSecure enforces full end-to-end encryption and a zero-knowledge model, ensuring that files, messages, and meetings remain visible only to authorised users and never to DekkoSecure personnel or cloud-infrastructure operators.
DekkoSecure undergoes regular independent penetration testing and security assessments to validate platform resilience, confirm control effectiveness, and ensure strong protection against emerging threats and attack techniques.
Ready to reach out?
If you’d like to learn more about DekkoSecure's compliance status or discuss your requirements, our team is ready to assist.











