Treasure Data is committed to protecting the security of customer data. We recognize the importance of appropriate industry-standard information security policies and procedures to protect customer data. These are just a few of the security controls we implemented to protect the confidentiality, integrity, and availability of our customers’ data.
We host customer data at scalable, high-performance, and high-resilience data centers operated by our infrastructure business partners. Our data center business partners have security certifications under assessment frameworks such as ISO 27001 and Service Organization Control (SOC) 2. These data centers maintain our customers’ data in secured zones that protects against physical intrusion, loss, theft, damage, and reasonably anticipated natural disasters, such as floods and storms. Their high availability and business continuity services provide assurances of continued reliability of our service. Our business partners operate multiple data centers, and customer data is replicated across data centers to enhance reliability.
Although we provide our services on a centralized basis to allow our customers to share our infrastructure, the Treasure Data service keeps each customer’s data separate from the data of every other customer by our implemented access control policies. In turn, our data center partners use security controls to segregate the Treasure Data service from their other customers’ data by maintaining the service in its own protected environment and establishing robust, industry standard access control rules and best practices. Our security access controls provide assurances against unauthorized access to your account, whether by those who do not use the service or other Treasure Data customers.