All customer data is protected using strong encryption standards.
These protections help ensure that client content and service data remain protected during processing and storage.
Access to systems and customer data is restricted using multiple layers of protection.
These controls help ensure that only authorized individuals can access sensitive systems or customer data.
Aberdeen maintains continuous monitoring and logging to detect suspicious activity and protect customer systems.
Security monitoring helps us identify unusual behavior, investigate potential threats, and respond quickly to incidents if they occur. Our team follows established procedures for incident response, investigation, and remediation.
Some Aberdeen services use automated speech recognition or translation technologies to deliver faster and more affordable accessibility solutions.
Customer content processed through these systems is used only for service delivery.
Aberdeen does not use customer data to train AI models without explicit written authorization from the client.
Depending on the service provided, Aberdeen may act as either:
Data Controller
for website visitors, business contacts, and general communications
Data Processor
when processing content on behalf of clients using our captioning, transcription, or translation services.
In these cases, our clients remain the Data Controller, and Aberdeen processes data only according to client instructions and applicable data protection laws.
Aberdeen retains customer content only as long as necessary to deliver services and support operational requirements.
Typical retention practices include:
Clients may request immediate deletion or customized retention policies when needed.
Many Aberdeen services support live broadcasts, events, and scheduled programming, where reliability is critical.
Our operational planning focuses on minimizing disruption and maintaining service availability.
Aberdeen maintains a structured business continuity program designed to support service delivery during unexpected disruptions.
Key elements include:
Critical systems and operational data are protected through backup and recovery procedures designed to restore services quickly if necessary.
These safeguards include:
Aberdeen maintains a formal incident response process designed to detect, investigate, and resolve security incidents.
If a security incident affecting customer data were to occur, Aberdeen follows established procedures to:
To deliver our services, Aberdeen works with trusted technology partners that provide core infrastructure and processing capabilities.
Key service providers include:
These providers are contractually required to maintain appropriate security and confidentiality protections.
Clients and partners who require more detailed information can review the following documentation.
These documents provide additional detail regarding our privacy practices, security procedures, and operational safeguards.
We understand that many organizations require additional information during vendor evaluations or security reviews.
If you have questions about our security practices, privacy protections, or data handling procedures, please contact our team.
Aberdeen Broadcast Services
Email: matt@aberdeen.io
Email: deepthi@aberdeen.io
We will work with your team to provide the information needed to support your review.