Obsessive data security. Because you expect nothing less.
We're obsessed with the security of your data. The strongest encryption of data, both in transit and at rest, is what to expect from our services.
You also expect to be in compliance with government regulations, that your data is safe no matter which storage location you choose, and that your vendors follow the strictest security policies for their own data.
We’ve been meeting expectations since 2001. That’s why more than 50,000 businesses trust us with their data. Our customers include 7 of the world’s 10 largest technology companies and government agencies held to the highest standard of information privacy.
A Code42 guiding principle
Security is a guiding principle here at Code42. Utilizing industry standards and verification by independent auditors, we take a comprehensive approach to secure our products and solutions. As a Code42 customer, here’s what you can expect:
- Code42 maintains end-to-end control of cloud stack software, server, storage, network, monitoring and security components
- Rigorous quality testing of platform and product code that follow industry security best practices
- Data encrypted in transit and at rest
- Decryption of file contents only happens through the Code42 application – not a human being
- Strong authentication protocols ensure only authorized customer access
- Ongoing vulnerability tests by professional third party and internal teams
- Full time monitoring of Code42 cloud environment with a dedicated response team
- Comprehensive security awareness training program for all Code42 personnel
Code42 maintains compliance certifications and attestations on our product and infrastructure to validate our robust security program. Additionally, Code42 ensures and monitors appropriate security assurance obligations (SOC 1, SOC2, ISO27001) for its cloud data centers. Learn more about our compliance certifications and standards below.
*Other organizations, such as managed service providers and resellers, may provide cloud storage using Code42 cloud hardware and software. The information on this page may not apply to the cloud data centers managed by those organizations. Please contact those organizations for information about the features of their cloud solutions.
Code42 is committed to privacy and the protection of our customers’ data.
Keeping your data secure and private is paramount to our success as a business. We follow global privacy principles to design practices and products that safeguard your data and enable your organization to meet its own privacy obligations.
Code42 values trust. Whether you are a prospective or existing customer, it’s important to us that we’re clear about our data practices.
The data collected by Code42 through our products is customer data that is owned and controlled by the customer. Code42 will only process that data in order to provide our services as described in our agreements and product documentation. In addition, Code42 processes and controls other information about potential and existing customers, including account-related information. For more details on how Code42 processes this data, please review our Privacy Statement.
Code42 does not and will not sell our customers’ data.
To provide our services, Code42 may engage and use other companies to process certain customer data. Code42 has a mature vendor assessment process to ensure your data remains secure and protected. We validate that these subprocessors have the appropriate privacy and security safeguards and that they are contractually obligated to protect your data.
View our authorized subprocessors.
Protecting your data
You control your data. Code42 provides flexible configurations and the ability to specify which data Code42 collects to limit unwanted data storage.
Code42’s commitment to protecting customer data is built into our agreements. A Data Processing Addendum (“DPA”) is automatically incorporated into our Master Services Agreements. The DPA is based upon globally recognized privacy standards, including the GDPR and CCPA.
Code42 supports international data transfers by executing standard contractual clauses through our updated DPA, which is available to all customers and can be viewed here.
We use industry best security practices that are regularly verified by internal safeguards and external auditors. This includes end-to-end encryption of your files, customer controlled access, controls to ensure file integrity, and deletion of your files after your subscription ends.
See our FAQ for more information.
Privacy in our product
Access controls. Code42 provides a variety of role-based access and permissions controls within the product which allow manual or automated (via an external Identity Provider) access delegation.
Audit logs. Code42 maintains both customer-facing and internal audit-logging to ensure proper monitoring of privileged accounts.
Data encryption. Code42 leverages independently tested industry best practices and protocols to ensure that all data is encrypted when in transit and at rest.
Retention and storage. Code42 allows you to control how and when preservation operations take place, what files to include and exclude from preservation, the frequency and how long file versions should be retained.
Breach investigation and response. With Code42, you have visibility into files and events that allows for quicker breach investigation and response. Our built in reporting features can be utilized as part of your analysis and reporting in the event of a data breach.
It's built in.
Whether you’re protecting the data of patients, cardholders, or employees, you expect it to be easy and cost effective to comply with ever-changing requirements.
Compliance regulations abound across industries and geographies. Our platform helps you comply with regulations governing where and how your data is stored, who can access it, and who can decrypt it. Here is a guide on how Code42 Incydr™ prevents data leaks while also meeting compliance.
All our deployment options provide:
- Centralized policy management
- Enterprise-wide administration with complete visibility of data and users
- Tamper-proof audit trails
- Compliance with data export laws
- Data access strictly via strongly authenticated customer credentials
- Permanent data deletion after your subscription ends
- Single-click Compliance Settings to automatically restrict data access based on your regulations
Endpoint protection is a key component of most security and privacy regulations. Code42 helps customers meet their applicable compliance and risk management requirements, including:
DFARS: Defense Federal Acquisition Regulation Supplement
HIPAA: Health Insurance Portability and Accountability Act
FISMA: Federal Information Security Management Act
ITAR: International Traffic in Arms Regulation
GLBA: Gramm-Leach-Bliley Act
FERPA: Family Educational Rights and Privacy Act
GDPR: General Data Protection Regulation
CMMC: Cybersecurity Maturity Model Certification
Certifications, Attestations and Standards
SOC Reporting: Service Organization Control Reporting
ISO/IEC 27001: Information Security Management System
NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
NIST 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
TrustE Privacy Verified Seal: Data collection and processing practices consistent with regulatory expectations.
PCI DSS: Protecting Card Holder Data
FedRAMP: The Federal Risk and Authorization Management Program
CSA CAIQ: Cloud Security Alliance Consensus Assessments Initiative Questionnaire
Security, Trust and Compliance
We believe our customers should benefit from cloud solutions without compromising their data security, regulatory, or privacy requirements.