We’re Serious About Security

Advanced Discovery takes our obligation to protect your privacy and that of your customers very seriously.  Our protocols and practices, developed through years of experience and research, follow—and often exceed— international best practices for security of data, documents and work product.

Our complete suite of eDiscovery and risk management solutions is physically located in multiple certified and secure data centers in the U.S. and the U.K.; the International Trade Administration recognizes our data centers as self-certified under EU-US Privacy Shield Principles. They are listed under the Privacy Shield List at www.privacyshield.gov.

Security: Data Center Certifications:

U.S.                                          U.K.
• SOC 2 Type 1                         • ISO 27001
• SOC 2 Type 2
• ISO 27001 
                     

COMPLIANCE: COMPANY CERTIFICATIONS :

U.S.                                          U.K.
• ISO 27001                             • ISO 27001
• SOC 2 Type 2                        
• SOC 3                                    
• Compliant with all
   applicable HIPAA
   regulations

 

Partner with Confidence

Our Cyber Security expert advisors can assist you with information system security assessments to help you ensure that your own technical environment is a secure as possible, and that your staff are properly and thoroughly trained in appropriate protocols. Read more.

In the event of a data security incident, our experts can be on-the-job virtually within minutes – and physically onsite within 24 hours to assist with assessment and remediation.

~25%

OF LAW FIRMS WITH 100 OR MORE ATTORNEYS
REPORTED A DATA BREACH IN 2016.

You need a partner that's serious about security. That's Advanced Discovery.
Encryption
  • All data in motion, whether physical or virtual, is fully encrypted using SSL.
Physical and Electronic Security
  • Multiple layers of physical security—including guards, cameras and biometrics—restrict access to our facilities.
  • Network perimeter controls identify and prevent network intrusion.
  • Regular third-party penetration testing.
 

INSIGHTS GET ANSWERS NOW.

Feature Stories

Get in Touch