message disclaimer

title

body
Philippines
    • Find a Domain
    • Domain Name Search
    • Bulk Domain Search
    • New Domain Extensions
    • Domain Broker
    • Domain Name Generator
    • Domain Services
    • Domain Transfer
    • WHOIS
    • Domain Value Appraisal
    Gd Nav Domains 2X Learn More About Domains
    • Websites + Marketing
    • Website Builder
    • E-Store
    • Digital Marketing Suite
    • Search Engine Optimization
    • WordPress
    • WordPress Websites
    Img Mega Nav Wm Explore Website Options
    • Personal & Business
    • WordPress Hosting
    • WordPress Ecommerce Hosting
    • Designers & Developers
    • Site Management Tools
    • Expert Services
    • WP Premium Support
    Img Mega Nav Wordpress Learn More About WordPress
    • Website Hosting
    • Web Hosting
    • Business Hosting
    • Reseller Hosting
    • WordPress Solutions
    • WordPress Hosting
    • WordPress Ecommerce Hosting
    • Pro Sites
    • Servers
    • VPS Hosting
    • Dedicated Servers
    Gd Nav Hosting 2X Learn More About Hosting
    • SSL Certificates
    • SSL Certificates
    • EV SSL Certificates
    • OV SSL Certificates
    • DV SSL Certificates
    • SAN SSL Certificate
    • Wildcard SSL Certificates
    • Website Protection
    • Website Security
    • Website Backup
    • Security Resources
    • SSL Certificate Guide
    Gd Nav Websecurity 2X Learn More About Web Security
    • Productivity
    • Professional Email
    • Microsoft Office
    Gd Nav Email 2X Learn More About Email & Office
    • Programs
    • Affiliates
    • GoDaddy Pro - Designers & Developers
    • Reseller Programs
    Gd Nav Partners 01 2X Affiliates Gd Nav Partners 03 2X GoDaddy Pro Img Mega Nav Resellers Program Reseller Program
Contact Us

Call Us

Service hours: 5:00am~10:00pm Monday to Friday 
Support Manila: (02) 8231-2988

Service hours: 5:00am~10:00pm Monday to Friday 
Support Countrywide: (0923) 099-0453

Global Directory
Phone numbers and hours

Help Center

Explore our online help resources

Get Help

Blog Help

Notifications

  • You have no notifications.
    They'll be here when you get 'em.

Sign In
Quick Links
  • Control Panel Links:
  • Manage Domains
  • Manage Website Builder
  • Manage Hosting
  • Manage SSL Certificates
  • Manage Email
  • Inbox Links:
  • Office 365 Email Login
  • GoDaddy Webmail Login
Registered Users

Have an account? Sign in now.

Sign In
New Customer

New to GoDaddy? Create an account to get started today.

Create My Account
{{displayName}}
Customer #:{{shopperid}} | PIN: View
  • GoDaddy Pro
  • My Products
  • Account Settings
  • Renewals & Billing
Visit My Account Log Out
Checkout Now
GoDaddy

Security Standards
Last Revised: May 9, 2018

I.  Technical and Organizational Measures

We are committed to protect our customers' information.  Taking into account the best practices, the costs of implementation and the nature, scope, circumstances and purposes of processing as well as the different likelihood of occurrence and severity of the risk to the rights and freedoms of natural persons we take the following technical and organizational measures.  When selecting the measures the confidentiality, integrity, availability and resilience of the systems are considered. A quick recovery after a physical or technical incident is guaranteed.

II.  Data Privacy Program

1. Confidentiality. “Confidentiality means that personal data is protected against unauthorized disclosure.”  

We use a variety of physical and logical measures to protect the confidentiality of its customers' personal data. Those measures include:   

Physical Security  

  • Physical access control systems in place (Badge access control, Security event monitoring etc.) 
  • Surveillance systems including alarms and, as appropriate, CCTV monitoring  
  • Clean desk policies and controls in place (Locking of unattended computers, locked cabinets etc.)  
  • Visitor Access Management 
  • Destruction of data on physical media and documents (shredding, degaussing etc.) 

Access Control & Prevention of Unauthorized Access

  • User access restrictions applied and role-based access permissions provided/reviewed based on segregation of duties principle  
  • Strong authentication and authorization methods (Multi-factor authentication, certificate based authorization, automatic deactivation/log-off etc. ) 
  • Centralized password management and strong/complex password policies (minimum length, complexity of characters, expiration of passwords etc.)   
  • Controlled access to e-mails and the Internet 
  • Anti-virus management  
  • Intrusion Prevention System management  

Encryption  

  • Encryption of external and internal communication via strong cryptographic protocols  
  • Encrypting PII/SPII data at rest (databases, shared directories etc.)   
  • Full disk encryption for company PCs and laptops   
  • Encryption of storage media  
  • Remote connections to the company networks are encrypted via VPN  
  • Securing the lifecycle of encryption keys  

Data Minimization

  • PII/SPI minimization in application, debugging and security logs  
  • Pseudonymization of personal data to prevent directly identification of an individual 
  • Segregation of data stored by function (test, staging, live) 
  • Logical segregation of data by role based access rights 
  • Defined data retention periods for personal data   

Security Testing

  • Penetration Testing for critical company networks and platforms hosting personal data 
  • Regular network and vulnerability scans   

2. Integrity. “Integrity refers to ensuring the correctness (intactness) of data and the correct functioning of systems. When the term integrity is used in connection with the term "data", it expresses that the data is complete and unchanged.”  

Appropriate change and log management controls are in place, in addition to access controls to be able to maintain the integrity of personal data such as:    

Change & Release Management  

  • Change and release management process including (impact analysis, approvals, testing, security reviews, staging, monitoring etc.)  
  • Role & Function based (Segregation of Duties) access provisioning on production environments    

Logging & Monitoring

  • Logging of access and changes on data  
  • Centralized audit & security logs   
  • Monitoring of the completeness and correctness of the transfer of data (end-to-end check)    

3. Availability. “The availability of services and IT systems, IT applications, and IT network functions or of information is guaranteed, if the users are able to use them at all times as intended.”    

We implement appropriate continuity and security measures to maintain the availability of its services and the data residing within those services:    

  • Regular fail-over tests applied for critical services  
  • Extensive performance/availability monitoring and reporting for critical systems  
  • Incident response programme  
  • Critical data either replicated or backed up (Cloud Backups/Hard Disks/Database replication etc.) 
  • Planned software, infrastructure and security maintenance in place (Software updates, security patches etc.)   
  • Redundant and resilient systems (server clusters, mirrored DBs, high availability setups etc.) located on off-site and/or geographically separated locations    
  • Use of uninterruptible power supplies, fail redundant hardware and network systems  
  • Alarm, security systems in place  
  • Physical Protection measures in place for critical sites (surge protection, raised floors, cooling systems, fire and/or smoke detectors, fire suppression systems etc.) 
  • DDOS protection to maintain availability   
  • Load & Stress Testing  

4. Data Processing Instructions. "Data Processing Instructions refers to ensuring that personal data will only be processed in accordance with the instructions of the data controller and the related company measures"  

We have established internal privacy policies, agreements and conduct regular privacy trainings for employees to ensure personal data is processed in accordance with customers’ preferences and instructions.   

  • Privacy and confidentiality terms in place within employee contracts 
  • Regular data privacy and security trainings for employees 
  • Appropriate contractual provisions to the agreements with sub-contractors to maintain instructional control rights 
  • Regular privacy checks for external service providers 
  • Providing customers full control over their data processing preferences 
  • Regular security audits 

Need help? Call our award-winning support team at Support Manila: (02) 8231-2988

We love taking your call.

GoDaddy guides GoDaddy guides

Prices include applicable taxes and ICANN fees.

  • About GoDaddy
    • About Us
    • Contact Us
    • Investor Relations
    • Careers
    • Trust Center
    • Legal
    • GoDaddy Blog
  • Support
    • Product Support
    • Community
    • Report Abuse
  • Resources
    • Webmail
    • WHOIS
    • ICANN Confirmation
    • Designers & Developers
    • Redeem Code
    • Product Catalog
    • Site Map
  • Partner Programs
    • Affiliates
    • Reseller Programs
    • GoDaddy Pro
  • Account
    • My Products
    • Renewals & Billing
    • Create Account
  • Shopping
    • Domains
    • Websites
    • WordPress
    • Hosting
    • Web Security
    • Email & Office
    • Promos

Philippines - English
Choose your Country/Region
  • Argentina - Español
  • Australia - English
  • België - Nederlands
  • Belgique - Français
  • Brasil - Português
  • Canada - English
  • Canada - Français
  • Chile - Español
  • Colombia - Español
  • Danmark - Dansk
  • Deutschland - Deutsch
  • España - Español
  • Estados Unidos - Español
  • France - Français
  • Hong Kong - English
  • India - English
  • India - हिंदी
  • Indonesia - Bahasa Indonesia
  • Ireland - English
  • Israel - English
  • Italia - Italiano
  • Malaysia - English
  • México - Español
  • Nederland - Nederlands
  • New Zealand - English
  • Norge - Bokmål
  • Österreich - Deutsch
  • Pakistan - English
  • Perú - Español
  • Philippines - English
  • Polska - Polski
  • Portugal - Português
  • Schweiz - Deutsch
  • Singapore - English
  • South Africa - English
  • Suisse - Français
  • Suomi - Suomi
  • Sverige - Svenska
  • Svizzera - Italiano
  • Türkiye - Türkçe
  • United Arab Emirates - English
  • United Kingdom - English
  • United States - English
  • Venezuela - Español
  • Việt Nam - Tiếng Việt
  • Ελλάδα - Ελληνικά
  • Россия - Русский
  • Україна - Українська
  • الإمارات العربية المتحدة - اللغة العربية
  • ไทย - ไทย
  • 대한민국 - 한국어
  • 台灣 - 繁體中文
  • 新加坡 - 简体中文
  • 日本 - 日本語
  • 香港 - 繁體中文
PHP
  • Legal
  • Privacy Policy
  • Advertising Preferences
  • Cookies
Copyright © 1999 - 2021 GoDaddy Operating Company, LLC. All Rights Reserved. The GoDaddy word mark is a registered trademark of GoDaddy Operating Company, LLC in the US and other countries. The “GO” logo is a registered trademark of GoDaddy.com, LLC in the US.
Use of this Site is subject to express terms of use. By using this site, you signify that you agree to be bound by these Universal Terms of Service.