{"id":18473,"date":"2022-01-27T00:42:54","date_gmt":"2022-01-27T00:42:54","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=18473"},"modified":"2022-02-28T04:36:04","modified_gmt":"2022-02-28T04:36:04","slug":"your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","title":{"rendered":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything"},"content":{"rendered":"\n<p>This article outlines our official company policies on a range of&nbsp;data handling&nbsp;issues, and&nbsp;explains them in plain English.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TL;DR&nbsp;summary&nbsp;<\/h2>\n\n\n\n<p><strong>Your data is&nbsp;<span style=\"text-decoration: underline;\">your<\/span>&nbsp;data.<\/strong>&nbsp;That\u2019s one of the underlying principles of how we do business.&nbsp;<\/p>\n\n\n\n<p>With all our&nbsp;software&nbsp;products (BackupAssist&nbsp;Classic,&nbsp;BackupAssist&nbsp;ER and&nbsp;BackupAssist&nbsp;365)&nbsp;we offer clear and careful data handling:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;font-size:12pt;\">\n    <tbody>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Privacy<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Our company does not hold your backup data &#8211; <b>you do<\/b><\/li>\n          <li>There is no way for us to obtain your backup data<\/li>\n          <li>Client-side encryption provides you privacy if you choose to put your data in the cloud<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Sovereignty<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>You have 100% control over where you put your backup data<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Accessibility<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Ensuring you can restore your own data, even decades later, is a key element of the design of our products<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Anonymity<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Where anonymity is required, we provide certain features that enable you to protect the identity of employees<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Trust<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>We are an award-winning company that\u2019s been serving our clients in 165 countries, for two decades<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>In&nbsp;other&nbsp;articles, we\u2019ll explore&nbsp;<strong>how<\/strong>&nbsp;our products achieve these characteristics.&nbsp;You can find these articles here:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0365<\/a>\u00a0<\/li><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0Classic<\/a><\/li><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0ER<\/a><\/li><\/ul>\n\n\n\n<p>This article provides the reasons&nbsp;<strong>why<\/strong>&nbsp;we take this approach,&nbsp;and also&nbsp;provides a primer for system administrators looking&nbsp;to&nbsp;fully understand these important issues.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Careful data handling is important for our client base&nbsp;<\/h2>\n\n\n\n<p>Our client base is extremely diverse \u2013 and careful data handling is required for a large proportion of our users for both commercial and legal compliance reasons.&nbsp;<\/p>\n\n\n\n<p>Some examples of the type of our clients, and&nbsp;their top data handling priorities,&nbsp;are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Research laboratories \u2013&nbsp;ensuring that confidential trade secrets (such as research outcomes, experimental results) stay confidential.&nbsp;<\/li><li>Medical practices \u2013 keeping patient records&nbsp;safe and compliant with HIPAA and GDPR regulations.&nbsp;<\/li><li>Banks&nbsp;\u2013 keeping client information private, including financial records and personally identifiable information.&nbsp;<\/li><li>Government departments \u2013 such as police,&nbsp;courthouses, libraries and social services: storing citizens\u2019 data within country borders to satisfy&nbsp;data sovereignty laws.&nbsp;<\/li><\/ul>\n\n\n\n<p>We understand that careful data handling is not an imperative for everyone. But if it is important to you, then you\u2019re in safe hands with&nbsp;BackupAssist.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Life\u2019s easier when you know&nbsp;where your data is&nbsp;<\/h2>\n\n\n\n<p>As&nbsp;a&nbsp;system administrator, your life is busy enough.&nbsp;The last thing you need is unexpected surprises.&nbsp;<\/p>\n\n\n\n<p>Even worse is&nbsp;an unexpected surprise&nbsp;that could mean you\u2019re breaching data sovereignty laws and recovery SLAs.&nbsp;<\/p>\n\n\n\n<p>We\u2019ve heard&nbsp;first hand&nbsp;from administrators and MSPs that at least one major \u201call in one\u201d backup solution provider (where the backup software and cloud storage are offered as one package) has covertly moved data around in the background without informing their clients.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This&nbsp;particular administrator&nbsp;had to comply with data sovereignty requirements, and his chosen solution appeared to satisfy them, hosting cloud backups on servers in America, for American clients. However, months later when doing a restore, the administrator noticed that when downloading his data, the download became unexpectedly slow. After&nbsp;inspecting the network traffic, he saw that he was&nbsp;actually downloading&nbsp;his backup data from somewhere in Eastern Europe. Unknown to him, the backup provider had moved data offshore \u2013 presumably to lower costs.&nbsp;<\/p>\n\n\n\n<p>The lesson was clear. As an administrator, you don\u2019t really have time to monitor the data handling policies of your backup provider.&nbsp;&nbsp;<\/p>\n\n\n\n<p>And thankfully with&nbsp;BackupAssist, you don\u2019t have to. You get to choose exactly where your data is, because you\u2019re always in control of where you put it.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Restoring data is not just about today, but with the future in mind&nbsp;<\/h2>\n\n\n\n<p>There are numerous situations where restoring data from a backup is not just about recovering some recently deleted data.&nbsp;<\/p>\n\n\n\n<p>It&nbsp;could be about restoring data from backups of decommissioned systems, that might be a decade or two old.&nbsp;<\/p>\n\n\n\n<p>Take for example, a construction company that offers an&nbsp;18-year&nbsp;guarantee on their buildings. In the event of a legal dispute, the ability to restore key information like emails and files could make the difference between winning or losing a court case.&nbsp;<\/p>\n\n\n\n<p>In this case,&nbsp;<strong>any kind of&nbsp;vendor lock-in is your enemy.<\/strong>&nbsp;Are you dependent on your backup provider still being in business, 18 years later?&nbsp;<\/p>\n\n\n\n<p>At&nbsp;BackupAssist,&nbsp;<strong>we hate the lock-in<\/strong>. We believe in free and open access.&nbsp;<\/p>\n\n\n\n<p>Wherever possible, we provide options where you can access and restore your data well into the future. By storing data in non-proprietary or ubiquitous file formats, your data can be easily accessed.&nbsp;&nbsp;<\/p>\n\n\n\n<p>As two examples:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BackupAssist&nbsp;Classic and&nbsp;BackupAssist&nbsp;ER \u2013 drive image backups are stored as VHDX files, which&nbsp;can be opened by our recovery tools, by Microsoft\u2019s operating systems, or 3<sup>rd<\/sup>&nbsp;party recovery tools.&nbsp;<\/li><li>BackupAssist&nbsp;365 \u2013 mailbox backups are stored in PST files,&nbsp;enabling you to restore using our restore tools, Microsoft\u2019s restore tools, 3<sup>rd<\/sup>&nbsp;party recovery tools, or by opening the backup files in Microsoft Outlook.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Anonymity \u2013 a useful addition for security&nbsp;<\/h2>\n\n\n\n<p>Anonymity is often underrated and misunderstood. Many people think that if they conduct their affairs legally, they should have nothing to hide.&nbsp;<\/p>\n\n\n\n<p>However, there are cases where anonymity can have security benefits.&nbsp;<\/p>\n\n\n\n<p>While we\u2019ve already explained that you can keep&nbsp;your backup data&nbsp;<strong>private with&nbsp;BackupAssist<\/strong>, protecting the identity of the owner of the backup data, or even the fact that an organization performs backups with&nbsp;BackupAssist, can help prevent security breaches.&nbsp;<\/p>\n\n\n\n<p>You can, with our products, maintain a level of anonymity by fully self-hosting even the monitoring of the status of your backups, such that we don\u2019t know what your backups contain or whether they were successful.&nbsp;&nbsp;<\/p>\n\n\n\n<p>(If this doesn\u2019t fully make sense now, it will when we go through the features of our individual products.)&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">We don\u2019t want to be a source of a data leak&nbsp;<\/h2>\n\n\n\n<p>Under the legal system in America, Australia and many other countries, companies can be compelled to hand over data by way of a legal subpoena.&nbsp;<\/p>\n\n\n\n<p>This means that a 3<sup>rd<\/sup>&nbsp;party can be compelled to hand over data&nbsp;to unknown&nbsp;people, and&nbsp;cause a data leak for multiple clients.&nbsp;<\/p>\n\n\n\n<p>For example, if a hard drive contains data belonging to 3 clients (called \u2018A\u2019, \u2018B\u2019 and \u2018C\u2019), and \u2018C\u2019 becomes involved in a legal dispute, a court can subpoena that hard drive. This automatically compromises the privacy of&nbsp;clients&nbsp;\u2018A\u2019 and \u2018B\u2019, who may never even find out about the leak.&nbsp;<\/p>\n\n\n\n<p>While subpoenas can be fought in court,&nbsp;doing so takes time and money, meaning generally only large organizations would&nbsp;do so.&nbsp;The majority of&nbsp;organizations would simply comply.&nbsp;<\/p>\n\n\n\n<p>At&nbsp;BackupAssist, we never want to be the source of a data leak. And because we do not host your backup data, even if we were subpoenaed, we would have nothing to hand over.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Maintaining the trust through clear communication and policies&nbsp;<\/h2>\n\n\n\n<p>Now that you know more about our philosophy of \u201c<strong>your data is&nbsp;<span style=\"text-decoration: underline;\">your<\/span>&nbsp;data<\/strong>\u201d, we trust that it makes sense.&nbsp;<\/p>\n\n\n\n<p>You can be assured that we will not deviate from our approach. It\u2019s not only our guiding light, but it\u2019s the promise we\u2019ve made to hundreds of thousands of organizations across 165 countries.&nbsp;<\/p>\n\n\n\n<p>In subsequent articles, we\u2019ll explain, in detail, how our software products provide careful data handling:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0365<\/a>\u00a0<\/a><\/li><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0Classic<\/a><\/a><\/li><li><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"><a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\">BackupAssist\u00a0ER<\/a><\/a><\/li><\/ul>\n\n\n\n<p>Also refer to our&nbsp;<a href=\"https:\/\/www.backupassist.com\/company\/legal-notices\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>GDPR statement<\/strong><\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.backupassist.com\/company\/legal-notices\/privacy-policy\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>privacy policy<\/strong><\/a>&nbsp;for further information.&nbsp;<\/p>\n\n\n\n<p>Do you have questions about&nbsp;this article? Contact&nbsp;our&nbsp;<a href=\"https:\/\/www.backupassist.com\/company\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">Client Success<\/a>&nbsp;team and start a conversation.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For two decades, BackupAssist has focused on providing you with dependable backups where you have complete control over your own data. And for many organizations, careful data handling is not just a luxury, but a necessity.<\/p>\n","protected":false},"author":17,"featured_media":18487,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-18473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"For two decades, BackupAssist has focused on providing you with dependable backups where you have complete control over your own data. And for many organizations, careful data handling is not just a luxury, but a necessity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-27T00:42:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-28T04:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything\",\"datePublished\":\"2022-01-27T00:42:54+00:00\",\"dateModified\":\"2022-02-28T04:36:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\"},\"wordCount\":1384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\",\"url\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\",\"name\":\"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg\",\"datePublished\":\"2022-01-27T00:42:54+00:00\",\"dateModified\":\"2022-02-28T04:36:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg\",\"width\":1500,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","og_locale":"en_US","og_type":"article","og_title":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog","og_description":"For two decades, BackupAssist has focused on providing you with dependable backups where you have complete control over your own data. And for many organizations, careful data handling is not just a luxury, but a necessity.","og_url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","og_site_name":"Cyber Resilience Blog","article_published_time":"2022-01-27T00:42:54+00:00","article_modified_time":"2022-02-28T04:36:04+00:00","og_image":[{"width":1500,"height":567,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything","datePublished":"2022-01-27T00:42:54+00:00","dateModified":"2022-02-28T04:36:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything"},"wordCount":1384,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything","name":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg","datePublished":"2022-01-27T00:42:54+00:00","dateModified":"2022-02-28T04:36:04+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-723-bg-1.jpg","width":1500,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Your data is your data: privacy, sovereignty, accessibility, anonymity and trust in the age of cloud hosted everything"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18473"}],"version-history":[{"count":16,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18473\/revisions"}],"predecessor-version":[{"id":18643,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18473\/revisions\/18643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/18487"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}