• Domain Names
    • Search for Domain Names
    • Transfer Domain Names
    • Protect Domain Names
    • Browse Domain Name Options
    • Auctions for Domain Names
    • Domain Value Appraisal
    • Generate Domain & Business Names
    • Investing in Domain Names
    • Find a Domain Owner (WHOIS)
    • Premium DNS
    77841 Domain Nav Learn More About Domains
    • Websites & Stores
    • Website Builder
    • Online Store
    • All Hosting Options
    • Web Hosting
    • WordPress Hosting
    • WordPress eCommerce Hosting
    • Protect & Secure
    • Protect Against Malware & Attacks
    • Secure Your Website (SSL Certificates)
    • Back Up Your Website
    Image Website Options Non En Desktop Explore Website Options
    • Connect & Grow
    • Email & Microsoft 365
    • Digital Marketing Suite
    • Content & Photo Creator
    Fosmo 77888 Marketing Tools Nav Image Learn to Grow Your Business
+353 1 653 5976

Call Us

24/7 Support Ireland:
+353 1 653 5976

24/7 Support US:
+1 480 366 3549

Global Directory
Phone numbers and hours

Help Center

Explore our online help resources

Get Help

Help

Notifications

  • You have no notifications.
    They'll be here when you get 'em.

Sign In

Registered Users

Have an account? Sign in now.

  • Sign In

New Customer

New to GoDaddy? Create an account to get started today.

  • Create an Account
{{displayName}}

Customer #: {{shopperid}}

PIN:  View

Reward Points: {{rewardpoints}}

Vip Account Exec:

Call: 

Email: 

CONTROL PANEL LINKS
  • Manage Domains
  • Manage Website Builder
  • Manage Hosting
  • Manage SSL Certificates
  • Manage Email
INBOX LINKS
  • Sign in to Office 365 Email
  • Sign in to GoDaddy Webmail
  • Sign Out
Checkout Now
GoDaddy

Security Standards
Last Revised: May 9, 2018

I.  Technical and Organizational Measures

We are committed to protect our customers' information.  Taking into account the best practices, the costs of implementation and the nature, scope, circumstances and purposes of processing as well as the different likelihood of occurrence and severity of the risk to the rights and freedoms of natural persons we take the following technical and organizational measures.  When selecting the measures the confidentiality, integrity, availability and resilience of the systems are considered. A quick recovery after a physical or technical incident is guaranteed.

II.  Data Privacy Program

Our Data Privacy Program is established to maintain a global data governance structure and secure information throughout its lifecycle. This program is driven by the office of the data protection officer, which oversees the implementation of privacy practices and security measures. We regularly test, assess and evaluate the effectiveness of its Data Privacy Program and Security Standards.

1. Confidentiality. “Confidentiality means that personal data is protected against unauthorized disclosure.”  

We use a variety of physical and logical measures to protect the confidentiality of its customers' personal data. Those measures include:   

Physical Security  

  • Physical access control systems in place (Badge access control, Security event monitoring etc.) 
  • Surveillance systems including alarms and, as appropriate, CCTV monitoring  
  • Clean desk policies and controls in place (Locking of unattended computers, locked cabinets etc.)  
  • Visitor Access Management 
  • Destruction of data on physical media and documents (shredding, degaussing etc.) 

Access Control & Prevention of Unauthorized Access

  • User access restrictions applied and role-based access permissions provided/reviewed based on segregation of duties principle  
  • Strong authentication and authorization methods (Multi-factor authentication, certificate based authorization, automatic deactivation/log-off etc. ) 
  • Centralized password management and strong/complex password policies (minimum length, complexity of characters, expiration of passwords etc.)   
  • Controlled access to e-mails and the Internet 
  • Anti-virus management  
  • Intrusion Prevention System management  

Encryption  

  • Encryption of external and internal communication via strong cryptographic protocols  
  • Encrypting PII/SPII data at rest (databases, shared directories etc.)   
  • Full disk encryption for company PCs and laptops   
  • Encryption of storage media  
  • Remote connections to the company networks are encrypted via VPN  
  • Securing the lifecycle of encryption keys  

Data Minimization

  • PII/SPI minimization in application, debugging and security logs  
  • Pseudonymization of personal data to prevent directly identification of an individual 
  • Segregation of data stored by function (test, staging, live) 
  • Logical segregation of data by role based access rights 
  • Defined data retention periods for personal data   

Security Testing

  • Penetration Testing for critical company networks and platforms hosting personal data 
  • Regular network and vulnerability scans   

2. Integrity. “Integrity refers to ensuring the correctness (intactness) of data and the correct functioning of systems. When the term integrity is used in connection with the term "data", it expresses that the data is complete and unchanged.”  

Appropriate change and log management controls are in place, in addition to access controls to be able to maintain the integrity of personal data such as:    

Change & Release Management  

  • Change and release management process including (impact analysis, approvals, testing, security reviews, staging, monitoring etc.)  
  • Role & Function based (Segregation of Duties) access provisioning on production environments    

Logging & Monitoring

  • Logging of access and changes on data  
  • Centralized audit & security logs   
  • Monitoring of the completeness and correctness of the transfer of data (end-to-end check)    

3. Availability. “The availability of services and IT systems, IT applications, and IT network functions or of information is guaranteed, if the users are able to use them at all times as intended.”    

We implement appropriate continuity and security measures to maintain the availability of its services and the data residing within those services:    

  • Regular fail-over tests applied for critical services  
  • Extensive performance/availability monitoring and reporting for critical systems  
  • Incident response programme  
  • Critical data either replicated or backed up (Cloud Backups/Hard Disks/Database replication etc.) 
  • Planned software, infrastructure and security maintenance in place (Software updates, security patches etc.)   
  • Redundant and resilient systems (server clusters, mirrored DBs, high availability setups etc.) located on off-site and/or geographically separated locations    
  • Use of uninterruptible power supplies, fail redundant hardware and network systems  
  • Alarm, security systems in place  
  • Physical Protection measures in place for critical sites (surge protection, raised floors, cooling systems, fire and/or smoke detectors, fire suppression systems etc.) 
  • DDOS protection to maintain availability   
  • Load & Stress Testing  

4. Data Processing Instructions. "Data Processing Instructions refers to ensuring that personal data will only be processed in accordance with the instructions of the data controller and the related company measures"  

We have established internal privacy policies, agreements and conduct regular privacy trainings for employees to ensure personal data is processed in accordance with customers’ preferences and instructions.   

  • Privacy and confidentiality terms in place within employee contracts 
  • Regular data privacy and security trainings for employees 
  • Appropriate contractual provisions to the agreements with sub-contractors to maintain instructional control rights 
  • Regular privacy checks for external service providers 
  • Providing customers full control over their data processing preferences 
  • Regular security audits 

Need help? Call our award-winning support team at +353 1 653 5976

  1. Legal
  2. Agreements
  3. Data Protection Security Standards

We love taking your call.

GoDaddy guides

Prices exclude applicable taxes and ICANN fees.

  • About GoDaddy
    • About Us
    • Contact Us
    • Investor Relations
    • Careers
    • Trust Center
    • Legal
  • Support
    • Product Support
    • Community
    • Report Abuse
    • Resources
  • Resources
    • Webmail
    • WHOIS
    • ICANN Confirmation
    • Designers & Developers
    • Redeem Code
    • Product Catalog
    • Business Name Generator
  • Partner Programs
    • Affiliates
    • Reseller Programs
    • GoDaddy Pro
  • Account
    • My Products
    • Renewals & Billing
    • Create Account
  • Shopping
    • Domain Search
    • Websites
    • WordPress
    • Hosting
    • Web Security
    • Email & Office
    • Promos

Choose your Country/Region
  • Argentina - Español
  • Australia - English
  • België - Nederlands
  • Belgique - Français
  • Brasil - Português
  • Canada - English
  • Canada - Français
  • Chile - Español
  • Colombia - Español
  • Danmark - Dansk
  • Deutschland - Deutsch
  • España - Español
  • Estados Unidos - Español
  • France - Français
  • Hong Kong - English
  • India - English
  • India - हिंदी
  • Indonesia - Bahasa Indonesia
  • Ireland - English
  • Israel - English
  • Italia - Italiano
  • Malaysia - English
  • México - Español
  • Nederland - Nederlands
  • New Zealand - English
  • Norge - Bokmål
  • Österreich - Deutsch
  • Pakistan - English
  • Perú - Español
  • Philippines - English
  • Polska - Polski
  • Portugal - Português
  • Schweiz - Deutsch
  • Singapore - English
  • South Africa - English
  • Suisse - Français
  • Suomi - Suomi
  • Sverige - Svenska
  • Svizzera - Italiano
  • Türkiye - Türkçe
  • United Arab Emirates - English
  • United Kingdom - English
  • United States - English
  • Venezuela - Español
  • Việt Nam - Tiếng Việt
  • Ελλάδα - Ελληνικά
  • Україна - Українська
  • الإمارات العربية المتحدة - اللغة العربية
  • ไทย - ไทย
  • 대한민국 - 한국어
  • 台灣 - 繁體中文
  • 新加坡 - 简体中文
  • 日本 - 日本語
  • 香港 - 繁體中文
  • Legal
  • Privacy Policy
  • Advertising Preferences
  • Cookies
Copyright © 1999 - 2022 GoDaddy Operating Company, LLC. All Rights Reserved. The GoDaddy word mark is a registered trademark of GoDaddy Operating Company, LLC in the US and other countries. The “GO” logo is a registered trademark of GoDaddy.com, LLC in the US.
Use of this Site is subject to express terms of use. By using this site, you signify that you agree to be bound by these Universal Terms of Service.