{"id":18552,"date":"2022-02-17T04:23:46","date_gmt":"2022-02-17T04:23:46","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=18552"},"modified":"2022-02-28T04:33:20","modified_gmt":"2022-02-28T04:33:20","slug":"your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","title":{"rendered":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TL;DR\u202fsummary\u202f&nbsp;<\/h2>\n\n\n\n<p><strong>Your data is\u202f<span style=\"text-decoration: underline;\">your<\/span>\u202fdata.<\/strong>\u202fThat\u2019s one of the underlying principles of how we do business.&nbsp;<\/p>\n\n\n\n<p>BackupAssist\u202fClassic provides the following features to help with careful data handling.\u202f&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;font-size:12pt;\">\n    <tbody>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Privacy<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Our company does not hold your backup data \u2013 you do<\/li>\n          <li>There\u2019s no way for us to obtain your backup data<\/li>\n          <li>You can choose to encrypt your backup data if data theft is a concern<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Sovereignty<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>You have 100% control over where you put your backup data \u2013 including when backing up to the public cloud<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Accessibility<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Choose amongst multiple different open (non-proprietary) backup storage formats<\/li>\n          <li>Data restore is free FOREVER and can be performed with BackupAssist Classic or with 3rd party tools<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Anonymity<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>The backup report metadata can be hidden from our company by running your own SMTP server to deliver email reports<\/li>\n          <li>Backup report and CryptoSafeGuard notifications are optional<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>We\u2019ll now elaborate on each of the aspects listed above.\u202f&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;background:#DDF1DB;border-radius:5px;\">\n    <tbody>\n      <tr>\n        <td style=\"width:9%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/01\/note.svg\"><\/td>\n        <td style=\"width:91%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;\"><b>Note:<\/b> If you are interested in the background context \u2013\u202f<b>why we take these approaches<\/b>\u202f\u2013 then please refer to our\u202f<a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\" target=\"_blank\" rel=\"noopener noreferrer\">companion article.<\/a><\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Privacy\u202f&nbsp;<\/h2>\n\n\n\n<p>BackupAssist\u202fClassic has a \u201cchoose your own storage\u201d approach, where you can decide where to store your backup data. You can\u202fchoose a local disk, network share, or even dedicated options like tape.\u202f&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"582\" height=\"544\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image.png\" alt=\"\" class=\"wp-image-18553\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image.png 582w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-300x280.png 300w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Because you host your own data, you control who has access to it. And BackupAssist\u202fhas no way of accessing your data.\u202f&nbsp;<\/p>\n\n\n\n<p>For cloud backups, you choose exactly which region you want your backup data to be located \u2013 helping you to satisfy relevant regulatory and compliance requirements.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-4b.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-4b.jpg\" alt=\"\" class=\"wp-image-18639\" width=\"569\" height=\"448\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-4b.jpg 759w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-4b-300x236.jpg 300w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>As a security measure, you may also choose to encrypt your backups using a variety of methods to match your needs. Using the encryption feature means that a security breach of your underlying storage will not leak any data.&nbsp;<\/p>\n\n\n\n<p>Cloud backups are ALWAYS encrypted on the client side to ensure privacy, both when the data is at rest in the cloud and in motion while being uploaded. BackupAssist\u2019s cloud backups use Zero-Knowledge Encryption, meaning you and only you can know the password, and there\u2019s no other way to access the data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sovereignty\u202f&nbsp;<\/h2>\n\n\n\n<p>A logical flow-on from the \u201cchoose your own storage\u201d approach is that you can control\u202fthe geographical location of the data. In particular, your cloud backups are in the region(s) you have chosen from your cloud storage provider, and are not limited by BackupAssist.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Accessibility\u202f&nbsp;<\/h2>\n\n\n\n<p>A key consideration when choosing a backup solution is this: if you have a backup, how easy is it to access and restore the data?\u202f&nbsp;<\/p>\n\n\n\n<p>BackupAssist\u202fClassic was designed to address this issue.\u202f&nbsp;<\/p>\n\n\n\n<p>You can choose amongst multiple different backup methods that use a variety of non-proprietary backup formats.&nbsp;<\/p>\n\n\n\n<p>In addition, your data is yours forever, and you can freely restore it using either BackupAssist Classic (whether in trial or licensed) or a number of different Microsoft and 3<sup>rd<\/sup> party tools.&nbsp;<\/p>\n\n\n\n<p>System Protection backups (Virtual Hard Disk &#8211; VHD\/VHDX format):&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Microsoft and 3<sup>rd<\/sup>\u202fparty tools exist to open and extract\u202finformation\u202ffrom VHD\/VHDX&nbsp; files.&nbsp;<\/li><li>When set up to use a Data Container, you can copy or archive the entire container with all your backup history to any other location.&nbsp;<\/li><\/ul>\n\n\n\n<p>File Protection backups (files copied directly to backup storage):\u202f&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Backups can be restored directly by accessing the backup files using Windows File Explorer.&nbsp;<\/li><li>You can take a copy of your backups and archive them separately.&nbsp;<\/li><\/ul>\n\n\n\n<p>File Archiving (ZIP):&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Numerous 3<sup>rd<\/sup>\u202fparty tools exist to open and extract\u202finformation\u202ffrom ZIP files.&nbsp;<\/li><li>You can take a copy of your backups and archive them separately.&nbsp;<\/li><\/ul>\n\n\n\n<p>Cloud backups are in a proprietary format, but you can access them for free \u2013 forever. You will not require a subscription of BackupAssist Classic in order to restore.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Anonymity\u202f&nbsp;<\/h2>\n\n\n\n<p>The backup report includes some metadata that can identify the server and user information.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"136\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-1.png\" alt=\"\" class=\"wp-image-18554\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-1.png 875w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-1-300x47.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-1-768x119.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>If you are concerned about information leakage when optionally selecting to email the job report, then you can choose to use your own SMTP server to ensure that nobody else has access to the reports.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"445\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-2.png\" alt=\"\" class=\"wp-image-18555\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-2.png 491w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-2-300x272.png 300w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Similarly, when using CryptoSafeGuard, the SMS notification feature is optional, if anonymity is paramount.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"178\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-3.png\" alt=\"\" class=\"wp-image-18556\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-3.png 607w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-3-300x88.png 300w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion\u202f&nbsp;<\/h2>\n\n\n\n<p>BackupAssist\u202fClassic provides a high level of data privacy, sovereignty, accessibility and even anonymity.\u202f<strong>Your data is\u202f<span style=\"text-decoration: underline;\">your<\/span> data.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Do you have questions about\u202fthis article? Contact\u202four\u202f<a href=\"https:\/\/www.backupassist.com\/company\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">Client Success<\/a>\u202fteam and start a conversation.\u202f\u202f&nbsp;<\/p>\n\n\n\n<p>Or better still \u2013\u202f<a href=\"https:\/\/www.backupassist.com\/classic\/downloads\" target=\"_blank\" rel=\"noreferrer noopener\">start your free 30-day trial of\u202fBackupAssist\u202fClassic today<\/a>!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BackupAssist Classic has a host of features that give you flexible choices over what kind of backup technologies you use, how much data is stored, when your backups run, and how long your backups are kept. Did you know that it also provides you with full control of your data privacy, sovereignty, accessibility and anonymity?<\/p>\n","protected":false},"author":22,"featured_media":18570,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[771],"tags":[],"class_list":["post-18552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-classic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"BackupAssist Classic has a host of features that give you flexible choices over what kind of backup technologies you use, how much data is stored, when your backups run, and how long your backups are kept. Did you know that it also provides you with full control of your data privacy, sovereignty, accessibility and anonymity?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T04:23:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-28T04:33:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind\",\"datePublished\":\"2022-02-17T04:23:46+00:00\",\"dateModified\":\"2022-02-28T04:33:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\"},\"wordCount\":780,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg\",\"articleSection\":[\"BackupAssist Classic\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\",\"url\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\",\"name\":\"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg\",\"datePublished\":\"2022-02-17T04:23:46+00:00\",\"dateModified\":\"2022-02-28T04:33:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg\",\"width\":1500,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","og_locale":"en_US","og_type":"article","og_title":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog","og_description":"BackupAssist Classic has a host of features that give you flexible choices over what kind of backup technologies you use, how much data is stored, when your backups run, and how long your backups are kept. Did you know that it also provides you with full control of your data privacy, sovereignty, accessibility and anonymity?","og_url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","og_site_name":"Cyber Resilience Blog","article_published_time":"2022-02-17T04:23:46+00:00","article_modified_time":"2022-02-28T04:33:20+00:00","og_image":[{"width":1500,"height":534,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind","datePublished":"2022-02-17T04:23:46+00:00","dateModified":"2022-02-28T04:33:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind"},"wordCount":780,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg","articleSection":["BackupAssist Classic"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind","name":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg","datePublished":"2022-02-17T04:23:46+00:00","dateModified":"2022-02-28T04:33:20+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-728-bg.jpg","width":1500,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-classic-is-designed-with-careful-data-handling-in-mind#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Your data is your data: how BackupAssist Classic is designed with careful data handling in mind"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18552"}],"version-history":[{"count":17,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18552\/revisions"}],"predecessor-version":[{"id":18641,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18552\/revisions\/18641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/18570"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}