Access monitoring
We log and monitor all access attempts to our company resources to ensure security and compliance. Unauthorized access attempts are flagged and investigated promptly to maintain system integrity.
Data backups
We ensure data is backed up across multiple locations to prevent data loss. Our backup systems are designed to retrieve data within our recovery time objective (RTO) in case of failure, ensuring business continuity and data integrity.
Data erasure
Upon termination or expiration of an agreement, BioRender will, upon customer request, delete or return all customer data (including copies) in its possession or control.
- Data deletion requests must be made within 30 days of contract termination or expiration.
- This requirement does not apply in cases where BioRender is legally required to retain some or all of the customer data.
- Data archived on backup systems will be securely isolated, protected from further processing, and eventually deleted in compliance with BioRender’s data retention policies.
Encryption-at-rest
Data stored within our network is encrypted at rest to ensure confidentiality and integrity.
- Data stored on AWS is encrypted using Advanced Encryption Standard (AES) with XTS Mode and a 256-bit key (XTS-AES-256).
- Any mobile devices, including laptops and mobile phones, that access our systems are required to have whole-disk encryption enabled.
Encryption-in-transit
BioRender uses TLS 1.2 and above for secure data transmission, employing strong key and message exchange algorithms to protect sensitive data as it moves across networks.
Need help?
For further information on access monitoring, data security, or compliance best practices, please visit our Trust Center or reach out to our support team:
- Email: support@biorender.com
- Live Chat: Click the "Help" bubble in the bottom right-hand corner of the app.
Was this article helpful?
Articles in this section
- Infrastructure at BioRender: BioRender AWS hosting
- Legal: BioRender subprocessors disclosure
- Access control
- BioRender access and data security
- BioRender employee training policy
- Responsible disclosure & security practices
- BioRender endpoint security
- BioRender cookies policy
- Security documentation and assessments
- The Pentest report