{"id":18573,"date":"2022-02-17T08:26:34","date_gmt":"2022-02-17T08:26:34","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=18573"},"modified":"2022-03-13T21:58:08","modified_gmt":"2022-03-13T21:58:08","slug":"your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","title":{"rendered":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TL;DR\u202fsummary\u202f&nbsp;<\/h2>\n\n\n\n<p><strong>Your data is\u202f<span style=\"text-decoration: underline;\">your<\/span>\u202fdata.<\/strong>\u202fThat\u2019s one of the underlying principles of how we do business.&nbsp;<\/p>\n\n\n\n<p>BackupAssist\u202fER provides the following features to help with careful data handling.\u202f&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;font-size:12pt;\">\n    <tbody>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Privacy<\/strong><\/td>\n      <td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Our company does not hold your backup data \u2013 you do<\/li>\n          <li>There\u2019s no way for us to obtain your backup data<\/li>\n          <li>You can choose to encrypt your local backup data if data theft is a concern \u2013 and cloud backups are always encrypted <\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Sovereignty<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>You have 100% control over where you put your backup data \u2013 including when backing up to the public cloud<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Accessibility<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Primary backups are saved in standard VHDX format<\/li>\n          <li>Restore is free forever and can be performed with BackupAssist ER or with 3rd party tools (if unencrypted)<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <tr>\n      <td style=\"width:20%;border-collapse:collapse;border:none;border-right:1px solid white;border-bottom:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Anonymity<\/strong>\n      <\/td><td style=\"pading:20px;border-collapse:collapse;border:none;border-bottom:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">\n        <ul style=\"margin:0px 20px 0px 20px;\">\n          <li>Backup report and CryptoSafeGuard notifications are optional<\/li>\n        <\/ul>\n      <\/td>\n    <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>We\u2019ll now elaborate on each of the aspects listed above.\u202f&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;background:#DDF1DB;border-radius:5px;\">\n    <tbody>\n      <tr>\n        <td style=\"width:9%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/01\/note.svg\"><\/td>\n        <td style=\"width:91%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;\"><b>Note:<\/b> If you are interested in the background context \u2013\u202f<b>why we take these approaches<\/b>\u202f\u2013 then please refer to our\u202f<a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\" target=\"_blank\" rel=\"noopener noreferrer\">companion article.<\/a><\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Privacy\u202f&nbsp;<\/h2>\n\n\n\n<p>BackupAssist\u202fER has a \u201cchoose your own storage\u201d approach, where you can decide where to store your backup data. For your local backup, you can\u202fchoose a local disk or network share.\u202f&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-5.png\" alt=\"\" class=\"wp-image-18574\" width=\"454\" height=\"224\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-5.png 605w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-5-300x148.png 300w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Because you host your own data, you control who has access to it.\u202f\u202fAnd BackupAssist\u202fhas no way of accessing your data.\u202f&nbsp;<\/p>\n\n\n\n<p>For cloud backups, you choose exactly which region you want your backup data to be located \u2013 helping you&nbsp;to satisfy relevant regulatory and compliance requirements.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-8.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-8.png\" alt=\"\" class=\"wp-image-18577\" width=\"460\" height=\"388\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-8.png 613w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-8-300x253.png 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>As a security measure, you may also choose to encrypt your local backups. Using the encryption feature means that a security breach of your underlying storage will not leak any data. Note that encrypting your local backup would affect accessibility of the backup using third party tools.&nbsp;<\/p>\n\n\n\n<p>Cloud backups are ALWAYS encrypted on the client side to ensure privacy, both when the data is at rest in the cloud and in motion while being uploaded. BackupAssist\u2019s cloud backups use Zero-Knowledge Encryption, meaning you and only you can know the password, and there\u2019s no other way to access the data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sovereignty\u202f&nbsp;<\/h2>\n\n\n\n<p>A logical flow-on from the \u201cchoose your own storage\u201d approach is that you can control\u202fthe geographical location of the data. In particular, your cloud backups are in the region(s) you have chosen from your cloud storage provider, and are not limited by BackupAssist.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Accessibility\u202f&nbsp;<\/h2>\n\n\n\n<p>A key consideration when choosing a backup solution is this: if you have a backup, how easy is it to access and restore the data?\u202f&nbsp;<\/p>\n\n\n\n<p>BackupAssist\u202fER was designed to address this issue.\u202f&nbsp;<\/p>\n\n\n\n<p>The local backup is stored in standard Virtual Hard Disk (VHDX) format. When the backup is not encrypted, you can choose from numerous 3<sup>rd<\/sup>\u202fparty tools to open and extract\u202finformation.&nbsp;<\/p>\n\n\n\n<p>In addition, your data is yours forever, and you can freely restore it using either BackupAssist ER (whether in trial or licensed) or a number of different Microsoft and 3<sup>rd<\/sup> party tools.&nbsp;<\/p>\n\n\n\n<p>Cloud backups are in a proprietary format, but you can access them for free \u2013 forever. You will not require a subscription of BackupAssist ER in order to restore.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Anonymity\u202f&nbsp;<\/h2>\n\n\n\n<p>The backup report includes some metadata that can identify the server and user information.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"136\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-6.png\" alt=\"\" class=\"wp-image-18575\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-6.png 875w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-6-300x47.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-6-768x119.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>If anonymity is paramount, you can choose not to use the backup report email notification feature.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-7.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-7.png\" alt=\"\" class=\"wp-image-18576\" width=\"467\" height=\"228\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-7.png 623w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-7-300x146.png 300w\" sizes=\"auto, (max-width: 467px) 100vw, 467px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Similarly, the SMS notification feature of CryptoSafeGuard is optional &#8211; if anonymity is paramount.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-9.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-9.png\" alt=\"\" class=\"wp-image-18578\" width=\"623\" height=\"209\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-9.png 831w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-9-300x101.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/image-9-768x258.png 768w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion\u202f&nbsp;<\/h2>\n\n\n\n<p>BackupAssist\u202fER provides a high level of data privacy, sovereignty, accessibility and even anonymity.\u202f<strong>Your data is\u202f<span style=\"text-decoration: underline;\">your<\/span>\u202fdata.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Do you have questions about\u202fthis article? Contact our <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/company\/contact-us\" target=\"_blank\">Client Success<\/a> team and start a conversation.\u202f\u202f&nbsp;<\/p>\n\n\n\n<p>Or better still \u2013 <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/er\/downloads\" target=\"_blank\">start your free 30-day trial of\u202fBackupAssist\u202fER today<\/a>!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BackupAssist ER is a powerfully simple backup and recovery solution for SMBs that allows you to recover your critical Windows servers quickly from local storage, and from the cloud in case of other disasters. But it also gives you the ability to control your data privacy, sovereignty, accessibility, and anonymity \u2013 here&#8217;s how.<\/p>\n","protected":false},"author":22,"featured_media":18587,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[767],"tags":[],"class_list":["post-18573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-er"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"BackupAssist ER is a powerfully simple backup and recovery solution for SMBs that allows you to recover your critical Windows servers quickly from local storage, and from the cloud in case of other disasters. But it also gives you the ability to control your data privacy, sovereignty, accessibility, and anonymity \u2013 here&#039;s how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T08:26:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-13T21:58:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"Your data is your data: how BackupAssist ER is designed with careful data handling in mind\",\"datePublished\":\"2022-02-17T08:26:34+00:00\",\"dateModified\":\"2022-03-13T21:58:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\"},\"wordCount\":649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg\",\"articleSection\":[\"BackupAssist ER\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\",\"url\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\",\"name\":\"Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg\",\"datePublished\":\"2022-02-17T08:26:34+00:00\",\"dateModified\":\"2022-03-13T21:58:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg\",\"width\":1500,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your data is your data: how BackupAssist ER is designed with careful data handling in mind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","og_locale":"en_US","og_type":"article","og_title":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog","og_description":"BackupAssist ER is a powerfully simple backup and recovery solution for SMBs that allows you to recover your critical Windows servers quickly from local storage, and from the cloud in case of other disasters. But it also gives you the ability to control your data privacy, sovereignty, accessibility, and anonymity \u2013 here's how.","og_url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","og_site_name":"Cyber Resilience Blog","article_published_time":"2022-02-17T08:26:34+00:00","article_modified_time":"2022-03-13T21:58:08+00:00","og_image":[{"width":1500,"height":534,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind","datePublished":"2022-02-17T08:26:34+00:00","dateModified":"2022-03-13T21:58:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind"},"wordCount":649,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg","articleSection":["BackupAssist ER"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","url":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind","name":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg","datePublished":"2022-02-17T08:26:34+00:00","dateModified":"2022-03-13T21:58:08+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/rev-729-bg-02.jpg","width":1500,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-how-backupassist-er-is-designed-with-careful-data-handling-in-mind#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Your data is your data: how BackupAssist ER is designed with careful data handling in mind"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18573"}],"version-history":[{"count":8,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18573\/revisions"}],"predecessor-version":[{"id":18645,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18573\/revisions\/18645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/18587"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}