How we keep your financial data safe and private
Your uploaded documents often contain sensitive financial information. We treat that responsibility seriously.
DealSheets.ai is built to meet the standards expected by private equity, investment banking, and corporate finance professionals.
All file uploads and downloads use HTTPS/TLS 1.3 encryption. Your PDFs and Excel files are encrypted before they leave your browser and remain encrypted throughout transmission.
Files stored temporarily during processing are encrypted using AES-256 encryption within isolated storage containers.
Each processing job operates in its own secure environment with no shared memory or file paths.
We retain files only as long as necessary to complete processing or allow re-downloads.
Once deleted, files are unrecoverable, even by our internal team.
No backups or archives are maintained.
Your financial data is never used for model training or third-party research.
DealSheets.ai relies on deterministic parsing and validation methods, not probabilistic language models, to ensure zero hallucination and complete data privacy.
Each uploaded file is processed in a dedicated, isolated environment.
All automation runs under controlled service accounts with minimal privileges.
We believe in strict data isolation and least-privilege access.
| Role | Access Level |
|---|---|
| You | Full access to your uploaded and generated files |
| Our Systems | Automated processing only, no human access |
| Our Team | No access unless you explicitly request support through the contact form |
| Third Parties | Zero access — we do not share, sell, or transfer your files |
DealSheets.ai operates on enterprise-grade infrastructure with layered protection.
We design with data protection regulations in mind.
Enterprise customers may request documentation under NDA.
If you discover a potential security vulnerability, please report it responsibly.
To submit a report, use the contact form and select Security Issue as your message type.
Your submission will be routed directly to our internal security team.
We typically respond within 24 hours and work promptly to validate and address reported issues.
We believe security is built on trust and openness.
Enterprise clients can request additional documentation, including:
Use the contact form and mention Enterprise Security Documentation in your message to request these materials.