We are dedicated to keeping your data private, safe, and secure.
Marq Security
Privacy
Marq claims no ownership over any document data. You retain all intellectual property and other rights to your documents and the information contained therein. We respect your privacy and will never make your documents publicly available without permission.
Compliance certifications
Marq complies with applicable local and international requirements and maintains compliance certifications.
Security and availability
Security for your data is one of our top priorities, and we have a team dedicated to securing Marqโs systems, processes, and controls. Marq products are powered by Amazon Web Services (AWS), the industryโs leading provider of secure computing infrastructure. We choose AWS because of their stringent security measures, which include the following certifications:
- SOC 2ย auditsย ย
- Level 1ย service provider under the Payment Card Industry (PCI) Data Security Standard (DSS)
- ISO 27001ย certification
- U.S. General Services Administrationย FISMA-Moderate level operation authorization
To learn more about the security procedures employed by AWS, please review theirย security documentationย andย compliance documentation.
You can securely access Marq at any time and from any device or location, and we offer a 99.9% uptime guarantee to enterprise customers. Documents, account information, access control lists, and other persistent data is replicated across multiple availability zones using industry-standard database management systems, replication, and failover solutions.
Visibility and control
Marqย enterprise features allow you to maintain governance of your accounts so you can better adhere to compliance requirements. These features include document sharing restrictions, allowed IP restrictions, and allowed domains. We offer Key Management Service (KMS), which allows customers to control their own unique encryption keys to add an additional level of security.
We follow security best practices and protect your data by using the principle of least privilege access. A simple role-based permissions system allows administrators to manage access to documents owned by the account. The account management tools allow account and team admins to integrate with their identity management platform and control collaboration settings.