Skip to content

Privacy & COmpliance

Committed To Data Security
Because You Expect Nothing Less

Security at code42

We are committed to the security of your data.

The strongest encryption of data, both in transit and at rest, is what to expect from our services.

You also expect to be in compliance with government regulations, that your data is safe no matter which storage location you choose, and that your vendors follow the strictest security policies for their own data.

We’ve been meeting expectations since 2001. That’s why more than 50,000 businesses trust us with their data. Our customers include 7 of the world’s 10 largest technology companies and government agencies held to the highest standard of information privacy.

A Code42 guiding principle

Security is a guiding principle here at Code42. Utilizing industry standards and verification by independent auditors, we take a comprehensive approach to secure our products and solutions. As a Code42 customer, here’s what you can expect:

  • Code42 maintains end-to-end control of cloud stack software, server, storage, network, monitoring and security components
  • Rigorous quality testing of platform and product code that follow industry security best practices
  • Data encrypted in transit and at rest
  • Decryption of file contents only happens through the Code42 application – not a human being
  • Strong authentication protocols ensure only authorized customer access
  • Ongoing vulnerability tests by professional third party and internal teams
  • Full time monitoring of Code42 cloud environment with a dedicated response team
  • Comprehensive security awareness training program for all Code42 personnel

Code42 maintains compliance certifications and attestations on our product and infrastructure to validate our robust security program. Additionally, Code42 ensures and monitors appropriate security assurance obligations (SOC 1, SOC2, ISO27001) for its cloud data centers. Learn more about our compliance certifications and standards below.

*Other organizations, such as managed service providers and resellers, may provide cloud storage using Code42 cloud hardware and software. The information on this page may not apply to the cloud data centers managed by those organizations. Please contact those organizations for information about the features of their cloud solutions.

Privacy at code42

We are committed to the privacy and protection
of our customer’s data.

Keeping your data secure and private is paramount to our success as a business. We follow global privacy principles to design practices and products that safeguard your data and enable your organization to meet its own privacy obligations.

Transparency

Code42 values trust. Whether you are a prospective or existing customer, it’s important to us that we’re clear about our data practices.

The data collected by Code42 through our products is customer data that is owned and controlled by the customer. Code42 will only process that data in order to provide our services as described in our agreements and product documentation. In addition, Code42 processes and controls other information about potential and existing customers, including account-related information. For more details on how Code42 processes this data, please review ourPrivacy Statement.

Code42 does not and will not sell our customers’ data.

To provide our services, Code42 may engage and use other companies to process certain customer data. Code42 has a mature vendor assessment process to ensure your data remains secure and protected. We validate that these subprocessors have the appropriate privacy and security safeguards and that they are contractually obligated to protect your data.

View ourauthorized subprocessors.

Protecting your data

You control your data. Code42 provides flexible configurations and the ability to specify which data Code42 collects to limit unwanted data storage.

Code42’s commitment to protecting customer data is built into our agreements. A Data Processing Addendum (“DPA”) is automatically incorporated into our Master Services Agreements. The DPA is based upon globally recognized privacy standards, including the GDPR and CCPA.

Code42 supports international data transfers by executing standard contractual clauses through our updated DPA, which is available to all customers and can be viewedhere.

We use industry best security practices that are regularly verified by internal safeguards and external auditors. This includes end-to-end encryption of your files, customer-controlled access, controls to ensure file integrity, and deletion of your files after your subscription ends.

Privacy in our product

Access controls.Code42 provides a variety of role-based access and permissions controls within the product which allow manual or automated (via an external Identity Provider) access delegation.

Audit logs.Code42 maintains both customer-facing and internal audit-logging to ensure proper monitoring of privileged accounts.

Data encryption.Code42 leverages independently tested industry best practices and protocols to ensure that all data is encrypted when in transit and at rest.

Retention and storage.Code42 allows you to control how and when preservation operations take place, what files to include and exclude from preservation, the frequency and how long file versions should be retained.

Breach investigation and response.With Code42, you have visibility into files and events that allow for quicker breach investigation and response. Our built-inreporting featurescan be utilized as a part of your analysis and reporting in the event of a data breach.

Learn more about Code42 Incydr’s privacy best practices inthis white paper.

Frequently asked privacy questions

Compliance at code42

遵从性是建立在我们所做的一切。

Whether you’re protecting the data of patients, cardholders, or employees, you expect it to be easy and cost effective to comply with ever-changing requirements.

Compliance regulations abound across industries and geographies. Our platform helps you comply with regulations governing where and how your data is stored, who can access it, and who can decrypt it.Here is a guideon how Code42 Incydr™ prevents data leaks while also meeting compliance.

All our deployment options provide:

  • Centralized policy management
  • Enterprise-wide administration with complete visibility of data and users
  • Tamper-proof audit trails
  • Compliance with data export laws
  • Data access strictly via strongly authenticated customer credentials
  • Permanent data deletion after your subscription ends
  • Single-click Compliance Settings to automatically restrict data access based on your regulations

Endpoint protection is a key component of most security and privacy regulations. Code42 helps customers meet their applicable compliance and risk management requirements.

Resources

Compliance & privacy documents for Incydr

Incydr empowers your compliance & privacy to the highest degree. Dig in to these resources to see how.

Privacy & data requirement documents for Code42

Resources to prove how our company complies with customer privacy and data requirements.

Didn’t find what you were looking for?

Contact our Insider Risk experts to learn more about why our customers benefit from cloud solutions without comprising their data security, regulatory or privacy requirements.

Contact Us