Information Security & Data Processes Reports

Trust Center

At Aberdeen Broadcast Services, protecting client data and maintaining reliable service delivery are fundamental to how we operate.

Our services support live broadcasts, events, and media workflows across churches, universities, government organizations, and media producers. These environments often involve sensitive or time-critical content, which is why our systems and processes are designed to prioritize security, privacy, and operational reliability.

This Trust Center provides an overview of our security practices, privacy protections, and operational safeguards, along with access to key documentation for clients who require additional detail.

Security

Infrastructure
Aberdeen operates on enterprise cloud platforms designed for reliability and security.

Our services rely on trusted infrastructure providers including Amazon Web Services (AWS) and Salesforce, which maintain industry security certifications such as SOC 2 Type II and ISO 27001. These platforms provide robust protections for data storage, system availability, and operational resilience.

Our cloud-first architecture eliminates single points of failure associated with traditional on-premises systems and allows our team to maintain reliable service delivery across distributed environments.
Encryption

All customer data is protected using strong encryption standards.

  • Data in transit is encrypted using modern TLS protocols
  • Data at rest is encrypted using industry-standard encryption methods
  • Secure transmission is used for all file uploads and service delivery

These protections help ensure that client content and service data remain protected during processing and storage.

Access Controls

Access to systems and customer data is restricted using multiple layers of protection.

  • Role-based access controls limit access to authorized personnel only
  • Multi-factor authentication is required for system access
  • Access permissions are reviewed regularly
  • The principle of least privilege is applied to all operational roles

These controls help ensure that only authorized individuals can access sensitive systems or customer data.

Monitoring and Security Oversight

Aberdeen maintains continuous monitoring and logging to detect suspicious activity and protect customer systems.

Security monitoring helps us identify unusual behavior, investigate potential threats, and respond quickly to incidents if they occur. Our team follows established procedures for incident response, investigation, and remediation.

Privacy & Data Protection

Customer Data Ownership
Clients retain ownership and control of all content submitted to Aberdeen for captioning, transcription, or translation services.

We process customer content only for the purpose of delivering the services requested and according to the instructions provided by the client.
AI and Automated Processing

Some Aberdeen services use automated speech recognition or translation technologies to deliver faster and more affordable accessibility solutions.

Customer content processed through these systems is used only for service delivery.

Aberdeen does not use customer data to train AI models without explicit written authorization from the client.

Data Processing Roles

Depending on the service provided, Aberdeen may act as either:

Data Controller
for website visitors, business contacts, and general communications

Data Processor
when processing content on behalf of clients using our captioning, transcription, or translation services.

In these cases, our clients remain the Data Controller, and Aberdeen processes data only according to client instructions and applicable data protection laws.

Data Retention

Aberdeen retains customer content only as long as necessary to deliver services and support operational requirements.

Typical retention practices include:

  • Live captioning audio processed in real time and not stored after service delivery
  • Post-production media files retained briefly for delivery verification before automatic deletion
  • Client-controlled retention options when extended storage is requested

Clients may request immediate deletion or customized retention policies when needed.

Operational Reliability

Many Aberdeen services support live broadcasts, events, and scheduled programming, where reliability is critical.

Our operational planning focuses on minimizing disruption and maintaining service availability.

Business Continuity

Aberdeen maintains a structured business continuity program designed to support service delivery during unexpected disruptions.

Key elements include:

  • Cloud-based infrastructure designed for redundancy
  • Distributed workforce capable of operating remotely
  • Multiple communication channels for client support
  • Operational procedures for maintaining service continuity
Disaster Recovery

Critical systems and operational data are protected through backup and recovery procedures designed to restore services quickly if necessary.

These safeguards include:

  • Automated backups
  • Redundant cloud infrastructure
  • Defined recovery objectives for critical services
Incident Response

Aberdeen maintains a formal incident response process designed to detect, investigate, and resolve security incidents.

If a security incident affecting customer data were to occur, Aberdeen follows established procedures to:

  • Contain and investigate the incident
  • Remediate vulnerabilities
  • Notify affected clients when required by law or contract
  • Implement corrective measures to prevent recurrence

Service Providers

To deliver our services, Aberdeen works with trusted technology partners that provide core infrastructure and processing capabilities.

Key service providers include:

  • Amazon Web Services (AWS) — cloud infrastructure and storage
  • Salesforce — customer relationship management and service delivery platform
  • AI transcription providers when automated services are selected

These providers are contractually required to maintain appropriate security and confidentiality protections.

Documentation

Clients and partners who require more detailed information can review the following documentation.

These documents provide additional detail regarding our privacy practices, security procedures, and operational safeguards.

Security & Privacy Inquiries

We understand that many organizations require additional information during vendor evaluations or security reviews.

If you have questions about our security practices, privacy protections, or data handling procedures, please contact our team.

Aberdeen Broadcast Services
Email: matt@aberdeen.io
Email: deepthi@aberdeen.io

We will work with your team to provide the information needed to support your review.