Trust & Security at DrDispatch
Your freight data is sensitive. Customer relationships, carrier rates, financial records — this is the operational core of your business. We take that seriously.
Your Data Is Encrypted
All data stored in DrDispatch is encrypted at rest using AES-256 encryption. Every connection to DrDispatch — whether you’re logging in, viewing a load, or syncing with QuickBooks — is encrypted in transit using TLS 1.2/1.3. There is no unencrypted path to your data.
Built on Enterprise-Grade Infrastructure
DrDispatch runs on DigitalOcean’s managed cloud platform, which holds SOC 2 Type II and ISO 27001 certifications. That means the data centers housing your information meet the same security standards required by enterprise software companies — audited physical access controls, environmental safeguards, and documented security practices.
We use managed database services, which means:
- Automated security patching — the underlying systems are kept current without relying on manual intervention
- No public internet exposure — your database operates inside a private VPC network, inaccessible from the outside
- Automated daily backups with configurable retention
Backups & Recovery
Your data is backed up automatically every day. Backups are retained with configurable retention windows.
We exceed the industry-standard 3-2-1 backup rule, maintaining multiple redundant copies across geographically separate locations and storage types — including offline storage completely outside our cloud infrastructure. No single failure — hardware, software, or security incident — can result in unrecoverable data loss.
Access Controls
- Database connections are restricted to allowlisted sources — your application servers only, no open ports
- TLS is enforced on all database connections
- DrDispatch staff access to production systems is limited and logged
- API keys and credentials are never stored in plaintext
Application-Level Security
Beyond the infrastructure layer, DrDispatch maintains:
- Immutable audit logging — every significant action in the system is recorded with a timestamp and user identity. You can see who did what and when.
- Role-based access — control what your dispatchers, billing staff, and drivers can see and do
- Secure document handling — PODs, rate cons, and other documents are stored encrypted and accessible only to authorized users in your account
- Tenant isolation — your data is logically separated from other customers at the application and database level
Incident Response
We maintain a documented incident response process. In the event of a security incident affecting your data, we will notify you promptly with details of what happened, what data was affected, and what steps were taken.
Questions
Security questions can be directed to [email protected].