Security

Security & Data Protection

Last updated: February 6, 2026

We built every platform in our production stack. That means we control the entire security surface — from the moment a presenter uploads a file to the moment your event recording is delivered. No third-party black boxes, no vendor trust assumptions.

1. Our Approach to Security

We are an AV production company built by developers. That means security is not an afterthought bolted onto event operations — it is engineered into every platform we build and every system we deploy. We design for redundancy, encrypt by default, and control our own infrastructure because we built it ourselves.

2. Infrastructure & Hosting

All DCAV Pro platforms — DCAVQ, Dictatio, MXWANI, Red Button, and our registration and polling systems — run on enterprise-grade cloud infrastructure with physically secured data centers, network-level isolation, and redundant storage.

Our production systems are hosted in the United States. We maintain high-availability configurations so your event data is accessible when you need it and protected when you do not.

3. Encryption

Data in transit is protected with TLS encryption across all platforms and communications. Data at rest is encrypted using industry-standard encryption on all storage systems.

Presentation files uploaded through DCAVQ, video content processed through Dictatio, and captioning data from MXWANI are all encrypted throughout their lifecycle — from upload to delivery to deletion.

4. Access Control

Access to client data is restricted to the DCAV Pro team members directly involved in your event engagement. We do not have shared logins, open-access file servers, or uncontrolled admin credentials.

Our platforms support authentication through established identity providers. Internal access is protected by multi-factor authentication and role-based permissions.

5. On-Site Event Security

Live events introduce a physical dimension to data security. Our production crews follow established protocols for securing equipment, networks, and content at every venue.

Dedicated production networks are isolated from venue Wi-Fi. Presentation files are transmitted over secured connections. Livestream feeds are encrypted end-to-end. At load-out, all local copies of event content are wiped from production equipment.

6. Platform-Specific Safeguards

6.1 DCAVQ — Presentation Pipeline

Presenter uploads are sandboxed, processed in isolated environments, and stored encrypted. Only authorized team members and designated client contacts can access files for a given event.

6.2 Dictatio — Video Intelligence

Video content is encrypted at rest and in transit. Transcription and AI processing occur in secure, isolated compute environments. Access is controlled per-organization. For more detail, see dictatio.com/security.

6.3 MXWANI — Live Captioning

Caption streams are delivered over encrypted connections directly to attendee devices. No captioning data is stored beyond the live session unless the client requests archival.

6.4 Red Button — On-Site Support

Support requests contain only the information needed for technician dispatch — room, issue type, and priority. No sensitive event content is transmitted through the support channel.

7. Data Retention & Deletion

Event production data is retained as long as necessary to support deliverables, future engagements, and ongoing client relationships. Retention periods vary based on the nature of the data and the client's needs.

Clients may request deletion of specific event data at any time by contacting our team.

8. Healthcare & Regulated Events

DCAV Pro regularly produces events for healthcare organizations — medical conferences, CME broadcasts, and clinical symposia. For engagements involving protected health information or content subject to regulatory requirements, we execute appropriate agreements (BAA, DPA) and apply additional safeguards as needed. Contact us to discuss compliance requirements for your event.

9. Incident Response

In the event of a security incident affecting client data, we will notify affected clients within 72 hours, provide a clear description of the incident and data involved, and implement corrective measures. Our technical team investigates and responds to security events directly — no third-party call centers or abstraction layers.

10. Continuous Improvement

Security is not a checkbox — it is an ongoing practice. We regularly review our systems, update our platforms, and adapt to emerging threats. Because we build and maintain our own tools, we can respond to vulnerabilities and deploy fixes without waiting on third-party vendors.

11. Contact

For security questions, concerns, or to report a vulnerability, contact us at [email protected] or call (202) 688-7PRO.