Gillware completes SOC 2 Type II security auditsGillware completes SOC 2 Type II security auditsGillware completes SOC 2 Type II security auditsGillware completes SOC 2 Type II security audits
  • Data Recovery Services
    • Emergency Data Recovery
    • Hard Drive Data Recovery
    • Flash Drive Data Recovery Services
    • Data Recovery Company
    • Data Recovery Lab
    • Data Recovery Specialist
    • How Much Does Data Recovery Cost?
  • RAID Data Recovery
    • RAID 0 Data Recovery
    • RAID 1 Data Recovery
    • RAID 5 Data Recovery
    • RAID 6 Data Recovery
    • RAID 10 Data Recovery
    • Server Data Recovery
    • NAS Data Recovery Services
    • Storage Area Networks (SAN)
  • Virtual Machine Data Recovery
    • VMWare Data Recovery Services
    • Deleted LUNs
    • iSCSI Targets
    • Hyper-V Data Recovery
  • About
    • The Gillware Story
    • The Gillware Team
    • Blog
    • FAQ
    • Contact Us
    • Guides, Webinars, Case Studies
    • Download for Windows
    • Download for Mac
  • START THE RECOVERY PROCESS
  • GET AN ESTIMATE
  • 877-624-7206
  • [email protected]
  • Client Login
Case Study: Western Digital Blue WD3200AAKS-00L9A0 making a clicking noise
May 9, 2014
What you don’t know about your solid state drive (SSD)
July 30, 2014

Gillware completes SOC 2 Type II security audits

May 16, 2014

Every day, thousands of Gillware customers and Partners trust us with their sensitive electronic data.  In order to prove to our customers that we hold the security and confidentiality of their data paramount, Gillware undergoes an annual SOC 2 Type II security audit.

For those familiar with SOC audit reviews, Gillware’s SOC 2 Type II audit status should ease any concerns you or your customers have about the security of your data during the recovery process or storage on Gillware’s backup servers. For those not familiar with what a SOC-2 Type II audit entails, we thought we would lay out the requirements in plain English.

The Service Organization Control (SOC) 2 Type II audit is performed by an independent review group that tests and reports on the operating effectiveness of a company’s “controls”, or operating procedures and rules. The audit is based on relevant “trust service principles”:

1. Security: The system is protected, both logically and physically, against unauthorized access.
In Gillware’s case, the security principle means that both our data recovery lab facilities, our online backup data center and our internal network are protected from any outside threats or vulnerabilities. Both our lab and data center have protected physical access and careful documentation of visitors. Our networks are password protected and encrypted to prevent unauthorized outside access.

2. Availability: The system is available for operation and use as committed or agreed to.
As an online backup provider, Gillware knows the importance of network availability. All of the machines at our offices are securely backed up and available in the event of a disaster. We have measures in place for emergency protocol so that our internal network and data center are always available.

3. Confidentiality: Information that is designated “confidential” is protected as committed or agreed.
All Gillware employees are required to sign confidentiality agreements to protect sensitive information that enters our lab for recovery. All backed up data is encrypted during transfer and storage to prevent outside access. Both Gillware’s recovery and backup processes are HIPAA compliant, meaning they adequately protect the confidentiality of medical records and health information. Gillware stores all personal information on our secure network and fully erases all data from failed hard drives after recovery has been completed and data has been transferred. Backed up data is stored in our secure data center owned and operated by Zayo.

The audit process is extremely rigorous and is performed each and every year.  During the audit process, auditors from an independent CPA firm work to review all processes and security measures employed by Gillware.  Gillware’s internal security protocol has over 75 policies that contain more than 500 separate procedures.  All of them are audited every year.  Needless to say, our auditors are kept busy. We have “demonstrated adherence to the principles and produced an unqualified opinion, with no significant exceptions found during the audit” to obtain our SOC 2 Type II audited status. Basically, we did everything we had to do well enough to get the seal of approval for both our data recovery and online backup companies.

To learn more about our security audit status, read our press releases on the subject from Gillware Data Recovery. Gillware is committed to keeping clients’ data safe and secure in our data recovery lab. We know customers and Partners have security at the top of their list of requirements, and we continually deliver solutions that meet and exceed expectations.

If you’re interested in learning the difference between SOC 1 and SOC 2 audits, here’s an informative article to get you started.

Share
atoy
atoy

Related posts

June 8, 2020

Learn From Others Podcast Featuring CEO Brian Gill


Read more
June 1, 2020

Cooking With Neutrons


Read more
May 27, 2020

Air Gap Backups for Home and Small Business


Read more

Contact Us

  • Headquarters
  • 1802 Wright Street Madison, WI 53704
  • Toll Free: 1-877-624-7206
  • Local: 1-608-237-8780
  • [email protected]
  • Contact a Client Advisor
  • Data Recovery Social Channels
  •         

Our Services

  • Home
  • Hard Drive Repair
  • Customer Login
  • Contact Us

Recent Posts

  • The Request Could Not Be Performed Because of an I/O Device Error [Solved]
  • External Hard Drive Says No Media in Disk Management
  • DVR Lost Password: How Do I Recover My CCTV DVR Password?
  • How to Get Video Off My Security DVR
  • Boot Device Not Found: How to Fix a No Boot Device Found Error