


HIPAA (the Health Insurance Portability and Accountability Act of 1996) established guidelines for properly safeguarding this medical information. Hospitals, clinics, and other organizations deal with an overwhelming amount of extremely sensitive data and ePHI (electronically protected health information). HIPAA Privacy Standards and Data Recovery Privacyįew industries are as concerned with privacy as the healthcare industry. These audits ensure the safety and privacy of all our customers’ sensitive data. Gillware’s data recovery facilities have been SOC 2 Type II audited. These principles are security, availability, and confidentiality. The Service Organization Control (SOC) 2 Type II audit gauges how well a company meets three “trust service principles”. Maintaining Secure Data Recovery Facilities with SOC 2Īssure Professional, an independent review group, audits a company’s operating procedures and rules according to rigorous standards. When we send a data recovery customer a list of files to view so they can see the results of our efforts, our secure case portal ensures that only they can see their case results.įor clients with even more stringent data recovery privacy requirements, especially large corporations with extremely sensitive proprietary data they need recovered, Gillware can agree to further non-disclosure agreements as needed. We lock down our facilities to prevent unauthorized access, and we keep a close eye on visitors to our lab. We perform background checks on all of our employees, from our customer service representatives to the data recovery engineers in our cleanroom lab. When a drive wears out, we break it down for spare parts.Īll of Gillware’s employees are well-trained to keep our customers’ private and sensitive data safe. It goes on to store data for another case, and the process repeats itself. Once we’ve successfully zero-filled one of our internal customer data drives, it goes back into circulation. Unless a customer asks us to hold onto their data for longer and keep it archived for a few months in our facility, we completely erase their recovered data one week (five business days) after we’ve delivered their data. These drives never leave our facility under any circumstances or for any reason. The clone lives on one of our internally-used hard drives. When we work on a data recovery case, we create a “clone” of the data on the customer’s storage device. As part of our policy, we here at Gillware agree to hold your personal information in the strictest of confidence. When you sign our service form and agree to our terms and conditions before sending your failed storage device to us, you agree to Gillware’s data recovery privacy policy. Periodic internal and/or external facility audits to make sure their data recovery privacy protocols are up to snuff.A secure website where clients can view their case results without risking other people viewing their sensitive data.A facility that safely and temporarily stores customer data until the customer receives their recovered data.Employees who have gone through background checks and have been trained in IT security and safely handling sensitive data.Source: /tech What a Data Recovery Company Committed to Data Recovery Privacy Looks Like Meets U.S.Data breaches grow more serious every year.FERPA (Family Educational Rights and Privacy Act).HIPAA (Health Insurance Portability and Accountability Act).NIST (National Institute of Standards & Technology) SP 800.34 (Rev.1).Annual SOC 2 Type II audits verify our qualifications to handle enterprise-class recoveries and support those customers who must maintain compliance with data privacy and data security regulations such as: All operating systems, all media, all types of “disk-asters”ĭriveSavers is the only data recovery company in the industry to post proof of annual, company-wide SOC 2 Type II audits performed on our data hosting and processing control systems.Highest data recovery success rate since 1985.Data Recovery Advisors ready to assist 24/7.

Standard turnaround time-24 to 48 hours.Fast, Reliable, Secure Data Recovery Service
