{"id":18490,"date":"2022-01-27T04:27:51","date_gmt":"2022-01-27T04:27:51","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=18490"},"modified":"2022-01-27T09:14:19","modified_gmt":"2022-01-27T09:14:19","slug":"your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","title":{"rendered":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TL;DR&nbsp;summary&nbsp;<\/h2>\n\n\n\n<p><strong>Your data is\u00a0<span style=\"text-decoration: underline;\">your<\/span>\u00a0data.<\/strong>\u00a0That\u2019s one of the underlying principles of how we do business.\u00a0\u00a0<\/p>\n\n\n\n<p>BackupAssist&nbsp;365 provides the following features to help with careful data handling.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;font-size:12pt;\">\n    <tbody>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Privacy<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Our company does not hold your backup data \u2013 you do<\/li>\n          <li>There\u2019s no way for us to obtain your backup data<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Sovereignty<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>You have 100% control over where you put your backup data<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Accessibility<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Mailbox backups are stored in the ubiquitous PST file format, providing multiple restore options<\/li>\n          <li>File backups, if unencrypted, can be accessed directly by copying the files straight from the backup directory<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Anonymity<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>The email addresses of your Office 365 users can be hidden from our company by running your own SMTP server to deliver email reports<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>We\u2019ll now elaborate on each of the aspects listed above.&nbsp;<\/p>\n\n\n\n<p>(Note: if you are interested in the background context \u2013\u00a0<strong>why we take these approaches<\/strong>\u00a0\u2013 then please refer to our\u00a0<a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\">companion article<\/a>.)\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Privacy&nbsp;<\/h2>\n\n\n\n<p>BackupAssist&nbsp;365 has a \u201cchoose your own storage\u201d approach, where you can decide where to store your backup data. You can&nbsp;choose a local disk, or network share.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-2.png\" alt=\"Graphical user interface, text, application, email\n\nDescription automatically generated\" class=\"wp-image-18492\" width=\"509\" height=\"275\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-2.png 1017w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-2-300x162.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-2-768x415.png 768w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Because you host your own data, it means that&nbsp;you control who has access to it.&nbsp;&nbsp;<\/p>\n\n\n\n<p>BackupAssist&nbsp;has no way of accessing your data.&nbsp;<\/p>\n\n\n\n<p>As a security measure, you may also choose to encrypt your file backups (SharePoint, OneDrive, Dropbox, Box, etc). Using the encryption feature means that a security breach of your&nbsp;underlying&nbsp;storage will not leak any data.&nbsp;<\/p>\n\n\n\n<p>If you encrypt your file backups, an attacker will see only ciphertext:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"542\" height=\"378\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-3.png\" alt=\"\" class=\"wp-image-18493\" style=\"width:407px;height:284;\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-3.png 542w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-3-300x209.png 300w\" sizes=\"auto, (max-width: 542px) 100vw, 542px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>(Note: encryption is not available for mailbox backups, only file backups.)&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sovereignty&nbsp;<\/h2>\n\n\n\n<p>As the logical flow-on from the \u201cchoose your own storage\u201d approach, it means you can control&nbsp;the geographical location of the data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Accessibility&nbsp;<\/h2>\n\n\n\n<p>A key consideration when choosing a backup solution is this: if you have a backup, how easy is it to access and restore the data?&nbsp;<\/p>\n\n\n\n<p>BackupAssist&nbsp;was designed to address this issue.&nbsp;<\/p>\n\n\n\n<p>Mailbox backups (Exchange, IMAP):&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can take a copy of the PST file and open it in Outlook.<\/li><li>Numerous 3<sup>rd<\/sup>\u00a0party tools exist to open and extract\u00a0information\u00a0from PST files.<\/li><li>You can use\u00a0BackupAssist\u00a0365\u2019s mailbox restore feature to upload the PST to a new mailbox.<\/li><\/ul>\n\n\n\n<p>File backups (SharePoint, OneDrive, Dropbox, Box, etc):&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unencrypted backups can be restored directly by accessing the backup files.<\/li><li>In Mirror mode, the files can be copied out directly.<\/li><li>In Versioning mode, the filenames can be renamed to remove the version information suffix.<\/li><li>All backups can be restored using\u00a0BackupAsist\u00a0365\u2019s file restore\u00a0facility, and\u00a0restored to a local directory or to a cloud storage location.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Anonymity&nbsp;<\/h2>\n\n\n\n<p>In the most stringent environments where this is required, a level of anonymity can be achieved if&nbsp;BackupAssist&nbsp;365 is configured in the correct way.&nbsp;<\/p>\n\n\n\n<p>Normally, there may be some small data leakage of email addresses via two channels:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>the\u00a0BackupAssist\u00a0365 email reporting feature, and\u00a0<\/li><li>sending diagnostic information to our tech support helpdesk.\u00a0<\/li><\/ol>\n\n\n\n<p>The leakage occurs because certain metadata (e.g.&nbsp;the list of email addresses for each mailbox that was backed up) gets sent to&nbsp;BackupAssist. For example, in the email report, email addresses are visible:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-3a.png\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"639\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-3a.png\" alt=\"\" class=\"wp-image-18508\" style=\"width:485px;height:479px;\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-3a.png 647w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-3a-300x296.png 300w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>If this leakage needs to be avoided, then you can send email reports via your own SMTP server. This ensures that the email reports never pass through the&nbsp;BackupAssist&nbsp;servers.&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5-1024x786.png\" alt=\"Graphical user interface, application\n\nDescription automatically generated\" class=\"wp-image-18495\" width=\"512\" height=\"393\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5-1024x786.png 1024w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5-300x230.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5-768x589.png 768w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/image-5.png 1393w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Additionally, we&nbsp;recommend not sending diagnostic information to us.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>BackupAssist\u00a0365 provides a high level of data privacy, sovereignty, accessibility and even anonymity.\u00a0<strong>Your data is\u00a0<span style=\"text-decoration: underline;\">your<\/span>\u00a0data.<\/strong>\u00a0<\/p>\n\n\n\n<p>Do you have questions about&nbsp;this article? Contact&nbsp;our&nbsp;<a href=\"https:\/\/www.backupassist.com\/company\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">Client Success<\/a>&nbsp;team and start a conversation.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Or better still \u2013\u00a0<a href=\"https:\/\/www.backupassist.com\/365\/downloads\" target=\"_blank\" rel=\"noreferrer noopener\">start your free 30-day trial of\u00a0BackupAssist\u00a0365 today<\/a>!\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BackupAssist 365 allows you to back up your cloud data from Microsoft 365 (Office 365), and a variety of other cloud hosted services such as IMAP mailboxes, Dropbox, Box and SFTP file servers. This article explains the pertinent features in BackupAssist 365 that aim to provide data privacy, sovereignty, accessibility and anonymity.<\/p>\n","protected":false},"author":17,"featured_media":18546,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"BackupAssist 365 allows you to back up your cloud data from Microsoft 365 (Office 365), and a variety of other cloud hosted services such as IMAP mailboxes, Dropbox, Box and SFTP file servers. This article explains the pertinent features in BackupAssist 365 that aim to provide data privacy, sovereignty, accessibility and anonymity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-27T04:27:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-27T09:14:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind\",\"datePublished\":\"2022-01-27T04:27:51+00:00\",\"dateModified\":\"2022-01-27T09:14:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"},\"wordCount\":668,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\",\"url\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\",\"name\":\"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg\",\"datePublished\":\"2022-01-27T04:27:51+00:00\",\"dateModified\":\"2022-01-27T09:14:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg\",\"width\":1500,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","og_locale":"en_US","og_type":"article","og_title":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog","og_description":"BackupAssist 365 allows you to back up your cloud data from Microsoft 365 (Office 365), and a variety of other cloud hosted services such as IMAP mailboxes, Dropbox, Box and SFTP file servers. This article explains the pertinent features in BackupAssist 365 that aim to provide data privacy, sovereignty, accessibility and anonymity.","og_url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","og_site_name":"Cyber Resilience Blog","article_published_time":"2022-01-27T04:27:51+00:00","article_modified_time":"2022-01-27T09:14:19+00:00","og_image":[{"width":1500,"height":531,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind","datePublished":"2022-01-27T04:27:51+00:00","dateModified":"2022-01-27T09:14:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind"},"wordCount":668,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind","name":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg","datePublished":"2022-01-27T04:27:51+00:00","dateModified":"2022-01-27T09:14:19+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/01\/rev-724-bg.jpg","width":1500,"height":531},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-365-is-designed-with-careful-data-handling-in-mind#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Your data is your data: how BackupAssist 365 is designed with careful data handling in mind"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18490"}],"version-history":[{"count":18,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18490\/revisions"}],"predecessor-version":[{"id":18548,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18490\/revisions\/18548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/18546"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}