SSAE 16 SOC Type III Secure Recovery
Data Security is Vital to Us
Verified Secure, Audited & Certified
We proudly display our certification documents online for our customers to view. We hope to inspire other organizations to always be mindful of the security of their data during the recovery process. SOC3 SysTrust assurance is the highest most relevant and credible standard available in the data recovery industry.
We believe all data recovery vendors should offer access to a completed SSAE 16 Type III SOC report in order to demonstrate compliance.
Information Security Focused Processes
Our SSAE 16 SOC3 Type III certification is only the beginning, we also follow a strict chain-of-command protocol for each case.
Once the recovery process is complete, data is stored on our secure network until the integrity of the recovered data is verified. Custom solutions are offered for recoveries on encrypted files and drives. Data is protected during transit to and from our facility. Should instant access of the recovered data be required, data is uploaded to an encrypted cloud service. Secure and permanent data destruction is carried out at the end of every completed case within 20 days.
Why SSAE 16 SOC Type III
The SOC 3 Report, like SOC 2, is based upon Trust Service Principles and performed under AT101. The difference being the SOC 3 report can be freely distributed. The SOC 3 Trust principles details outlined below show our achievement in meeting the Trust Services criteria.
SOC III Trust Principles
Requires the system is protected, both logically and physically against any unauthorized access.
The system is available for operation and use as committed or agreed by the organization.
Authorized system processing is complete, accurate, and timely.
Information that is designated “confidential” is protected as committed or agreed by the organization.
Personal information obtained as a result of e-commerce is guarded and secured as committed or agreed by the organization.
SOC III allows us to consistently meet and exceed the standard expectations with flexibility of adapting to the dynamic nature of the various client security requirements.