Security & Compliance
How secure — and private — are your files in the cloud?

Our partnership with Seagate lets our customers take advantage of extremely affordable file storage costs, while benefitting from all of Seagate’s current state-of-the-art security features and its continuous development and research into cloud security.
Our Commitment
At Starchive, we are dedicated to achieving and maintaining the highest standards of security and compliance. Our controls and practices demonstrate our unwavering commitment to safeguarding the security and privacy of our clients’ data, supporting creators and creative teams globally.
Data Security
Data Encryption and Protection
- In Transit: All data transmitted to and from our platform is securely encrypted using HTTPS with SSL/TLS protocols, safeguarding data as it moves across the internet.
- At Rest: We use AES-256 encryption for data stored on our servers. Files are encrypted using managed keys that are rotated regularly, ensuring robust protection across our storage environments.
Access Controls and Permissions
- Role-Based Access Controls (RBAC) and Multi-Factor Authentication (MFA) are enforced to manage and restrict access to sensitive information, ensuring that only authorized personnel have access based on their role requirements.
Secure Storage and Backup
- Cloud Storage: Data is stored in secure, encrypted environments with leading cloud service providers.
- Backup Practices: Regularly scheduled backups ensure data durability and resilience, with encrypted backups stored in multiple secure locations.
Secure Sharing and Collaboration
- Secure Sharing: Utilizes mechanisms including signed URLs to share files securely, ensuring that shared content is accessible only to authorized users for a limited time.
Metadata Management
- Metadata Tagging and Classification: Leveraging AI, metadata is automatically generated and tagged, allowing for efficient data management and enhanced security through categorization and sensitive data identification.
Compliance
Privacy Compliance
- Regulatory Adherence: We comply with international privacy regulations including GDPR and CCPA, ensuring all personal data is handled with the highest standards of privacy and security.
- Privacy Policy: Detailed in our privacy policy, our practices cover the comprehensive measures we take to protect personal information.
Audit Trails and Monitoring
- Audit Logs: We maintain detailed logs of all system and user activities, including access and modifications to data. These logs support compliance, help detect unauthorized access, and facilitate forensic investigations.
Standardization and Vendor Risk Management
- Controls: We adhere to standardized security frameworks and controls across our operations.
- Vendor Assessments: Rigorous assessments ensure our vendors comply with our strict security and privacy standards, especially those handling sensitive or critical data.
Operational Integrity
System and Network Security
- Regular Security Assessments: Including vulnerability scans and third-party penetration tests to identify and mitigate potential security vulnerabilities.
- Incident Response: A formal incident response plan enables us to promptly address and mitigate any security incidents to minimize impact.
Continual Improvement
- Updates and Patches: Regular updates to our systems and applications ensure we address security vulnerabilities and enhance functionalities.
Training & Awareness
Employee Security Training
- Ongoing Education: Regular training on the latest security and privacy best practices ensure our team is well-prepared to uphold our security standards.
For more detailed information or to schedule a call, please contact us.
Your media is just that: yours.
Here’s a general rule of thumb about digital privacy: if you’re getting a service for free, then YOU are probably the product. Free services will often use your media and track your usage statistics for machine learning or marketing purposes.
But maintaining privacy is one Starchive’s priorities (you can read our full privacy policy here). Your media and data is never shared or used by Starchive or any third party — ever. Our team does not have any back-door access to your Starchive. The only time you’ll ever see us in your Starchive is if you explicitly invite one of our support team members to help you solve a technical issue.
Securely encrypted storage
This is where storing data in the cloud via AWS really outshines the traditional on-site server or storage device setup. Forget about installing firewalls, proxies, virus scanners, etc. Encryption and security protocols are built into AWS by default — and maintained by AWS — saving you time and money while giving you peace of mind that your data is secure.
Backups of your backups
No more worrying about lost media from a server crash or hardware malfunction. Your data is stored on multiple cloud servers across multiple facilities, so it’s always protected and always available.
24-7 Security Monitoring
Seagate continuously monitors their cloud infrastructures for suspicious activity. Seagate notifies Starchive of any sort of activity that is outside of the “norm,” which can help to identify suspicious activity including attempts at gaining unauthorized access.