Security

Last updated: April 4, 2026

How Deckary Works

Deckary is a PowerPoint add‑in that runs inside Microsoft 365. Your slide content stays within your Microsoft environment — we don't access or store it.

The add‑in only communicates with Deckary services for:

What We Collect

DataPurposeRetention
Email addressAccount identificationDuration of account
Subscription statusFeature accessDuration of account
Basic usage analyticsProduct improvement2 years
Saved slides (optional)Slide library for reuse across presentationsDuration of account
Excel link data (optional)Sync charts between Excel and PowerPoint24 hours (auto‑deleted)
AI promptsGenerate or edit slide contentNot stored by Deckary. 30‑day retention by Anthropic

AI Features

If you use AI features (Slide Builder, Text Rewrite), your prompts are sent to Anthropic (Claude) via encrypted connection. We don't store prompts or responses.

Image Generation

If you use AI image generation, your text prompt is sent to Google (Gemini) via encrypted connection. No slide content or presentation data is sent — only the text description you provide. Google does not use API data to train models.

Excel Linking (Optional)

If you use Excel‑to‑PowerPoint chart linking:

If your data policies prohibit this, you can use Deckary without Excel linking — charts can be created with manual data entry instead.

Slide Library (Optional)

Users can save slides to a personal library for reuse across presentations. If you use this feature:

If your data policies prohibit this, the slide library feature can be disabled. All other Deckary features work without it.

Offline License

Deckary offers an offline license for organisations that prohibit external AI processing or require minimal data transmission. With an offline license:

This makes the offline license suitable for air‑gapped environments, regulated industries, or any organisation where data leaving the Microsoft 365 environment is not permitted.

Infrastructure

Deckary relies on SOC 2 certified infrastructure providers for all data processing and storage.

ProviderPurposeCertification
Auth0 (Okta)AuthenticationSOC 2 Type II
SupabaseDatabase and file storageSOC 2 Type II
VercelAPI hostingSOC 2 Type II
StripePaymentsPCI DSS Level 1
AnthropicAI processingSOC 2 Type II, ISO 27001
Google (Gemini)Image generationSOC 2 Type II, ISO 27001
RailwayWebSocket relaySOC 2 Type II
BrevoTransactional emailGDPR compliant

Security Measures

Incident Response

In the event of a confirmed data breach, we will notify affected customers within 72 hours.

Access Controls

Access to production systems and customer data is limited to founding engineers. We follow the principle of least privilege — team members only have access to the systems required for their role.

Data Protection

We are designed to align with GDPR data protection requirements:

Contact

For security questions, DPA requests, or to discuss your organisation's requirements: [email protected]

Security | Deckary