
QueryPal
Decagon is the conversational AI platform that transforms customer interactions with AI agents. Seamlessly build, manage, and scale AI agents with Agent Operating Procedures (AOPs).
Compliance
CCPA
SOC 2 Type II
HIPAA
EU AI ACT
GDPR
Resources
Learn More
Compliance
Decagon SOC2 2025-06
Other resources
Decagon Pen Test 2025-05
Controls
View all
Infrastructure security
Unique production database
Encryption key access restricted
Unique account authentication enforced
+ 18 more
Organizational security
Asset disposal procedures utilized
Production inventory maintained
Portable media encrypted
+ 18 more
Product security
Data encryption utilized
Control self-assessments conducted
Penetration testing performed
+ 18 more
Internal security procedures
Continuity and Disaster Recovery plans
Continuity and disaster recovery plans
Cybersecurity insurance maintained
+ 18 more
Data and privacy
Data retention procedures established
Customer data deleted upon leaving
Data classification policy established
+ 18 more
Subprocessors
View all

Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services

OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider

Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services

Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Compliance
Decagon SOC2 2025-06
SOC2 Type II for Decagon, for the Period October 9, 2024 - April 9, 2025
Other resources
Decagon Pen Test 2025-05
Decagon Pentest by the NCC Group
Infrastructure security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Organizational security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Organizational security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Internal security procedures
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Data and privacy
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Subprocessors

Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services

OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider

Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services

Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services

Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services

OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider

Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services

Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Activate your free
6 week trial
& white-glove integration support.
Cut support costs by 60%, slash response & resolution times, improve your customer experiences, & reduce agent burnout. Find some time with us to show you how.
