www.vmware.com Open in urlscan Pro
2a02:26f0:3400:18f::2ef  Public Scan

Submitted URL: https://cloud.vmware.com/trust-center
Effective URL: https://www.vmware.com/products/trust-center.html
Submission: On October 25 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

//www.vmware.com/search.html

<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
  <input type="text" name="q" id="ub-search" class="d-none" aria-role="searchbox" role="searchbox">
  <a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">

									<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
								 </a>
  <input type="hidden" name="num" value="20">
  <input type="hidden" name="filter" value="0">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="hidden" name="oe" value="UTF-8">
  <input type="hidden" name="entqr" value="0">
  <input type="hidden" name="start" value="0">
  <input type="hidden" name="sort" value="">
  <input type="hidden" name="tlen" value="200">
  <input type="hidden" name="numgm" value="3">
  <input type="hidden" name="cn" value="vmware">
  <input type="hidden" name="cid" value="">
  <input type="hidden" name="tid" value="">
  <input type="hidden" name="getfields" value="*">
  <input type="hidden" name="partialfields" value="">
  <input type="hidden" name="requiredfields" value="">
  <input type="hidden" name="place" value="top">
  <input type="hidden" name="client" value="VMware_Site_1">
  <input type="hidden" name="site" value="VMware_Site_1">
  <input type="hidden" name="cc" value="en">
  <input type="hidden" name="stype" value="main">
</form>

Text Content

Skip to Promo Skip to main content
Global Search

US About Us Resources Store
Log in
Cloud Services Console Customer Connect Partner Connect
 * Multi-Cloud Environments
 * App Platform
 * Cloud & Edge Infrastructure
 * Anywhere Workspace
 * Security & Networking
 * Partners

GET STARTED
Main Menu


TAKE CONTROL OF YOUR MULTI-CLOUD ENVIRONMENT

73% of enterprises use two or more public clouds today. While multi-cloud
accelerates digital transformation, it also introduces complexity and risk.


Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public
cloud environments."

Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and
services.

Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.

Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud
challenge.

SEE HOW VMWARE CAN HELP


VMWARE CROSS-CLOUD™ SERVICES ENABLE ORGANIZATIONS TO UNLOCK THE POTENTIAL OF
MULTI-CLOUD WITH ENTERPRISE SECURITY AND RESILIENCY.



BUILD & OPERATE CLOUD NATIVE APPS

Give developers the flexibility to use any app framework and tooling for a
secure, consistent and fast path to production on any cloud.

CONNECT & SECURE APPS & CLOUDS

Deliver security and networking as a built-in distributed service across users,
apps, devices, and workloads in any cloud.

AUTOMATE & OPTIMIZE APPS & CLOUDS

Operate apps and infrastructure consistently, with unified governance and
visibility into performance and costs across clouds.

ACCESS ANY APP ON ANY DEVICE

Empower your employees to be productive from anywhere, with secure, frictionless
access to enterprise apps from any device.

RUN ENTERPRISE APPS ANYWHERE

Run enterprise apps and platform services at scale across public and telco
clouds, data centers and edge environments.

LEARN ABOUT CROSS-CLOUD SERVICES
Main Menu
Multi-Cloud Spotlight

MODERNIZE FASTER ACROSS CLOUDS

MODERNIZE APPS FASTER WITH A MULTI-CLOUD KUBERNETES PLATFORM TO HELP YOU BUILD
AND RUN ALL APPS CONSISTENTLY ACROSS CLOUDS.

Get on a Faster Path to Prod

Build and deploy quickly and securely on any public cloud or on-premises
Kubernetes cluster.


Simplify Kubernetes Operations

Build and operate a secure, multi-cloud container infrastructure at scale.


Pair with App Development Experts

Unlock value by modernizing your existing apps and building innovative new
products.

LEARN MORE

APP PLATFORM

Build, run, secure, and manage all of your apps across any cloud with
application modernization solutions and guidance from VMware.

Join Us at SpringOne by VMware Tanzu, Dec 6-8

Learn how architects, platform teams and innovators are using the latest tech to
get code from idea to reality faster.

REGISTER NOW

SOLUTIONS & PRODUCTS




BOOST DEVELOPER VELOCITY

Data Transformation Product Development Rapid Portfolio Modernization Tanzu
Application Platform Tanzu Data Services

REALIZE DEVSECOPS OUTCOMES

Carbon Black Container Tanzu Application Platform Tanzu Service Mesh

EMBRACE PLATFORM OPS

Platform Development Tanzu for Kubernetes Operations Tanzu Kubernetes Grid Tanzu
Mission Control Aria Operations for Applications

CONNECT & SECURE MODERN APPS

Carbon Black Container Container Networking with Antrea Network Security NSX NSX
Advanced Load Balancer Tanzu Service Mesh

EMERGE AS A CLOUD NATIVE CSP

Telco Cloud Automation Telco Cloud Infrastructure Telco Cloud Platform Telco
Cloud Platform – Public Cloud Telco Cloud Platform – RAN Telco Cloud Service
Assurance VMware RIC

TANZU DATA SERVICES

Tanzu GemFire Tanzu RabbitMQ

QUICK LINKS

All Industries

ALL PRODUCTS

ALL SOLUTIONS

Main Menu
Multi-Cloud Spotlight

POWER OF ANY CLOUD WITH CONSISTENCY OF ONE

ACCELERATE CLOUD TRANSFORMATION WITH AN ENTERPRISE INFRASTRUCTURE, MULTI-CLOUD
OPERATIONS AND MODERN APP PLATFORM ACROSS THE EDGE AND ANY CLOUD.

Connect and Run with Confidence

Reduce time-to-value, lower costs, and enhance security while modernizing your
private and public cloud infrastructure.

 

Enhance Digital Experiences

Securely, reliably, and optimally connect applications in the cloud and at the
edge to deliver unique experiences.

 

LEARN MORE

CLOUD & EDGE INFRASTRUCTURE

Run enterprise apps at scale with a consistent cloud infrastructure across
public clouds, data centers and edge environments.

 

VMware Research: Multi-Cloud Strategies

Learn why enterprises find multi-cloud strategies critical for success.

SEE INTERACTIVE EBOOK

SOLUTIONS & PRODUCTS




CLOUD INFRASTRUCTURE

EXPLORE VMWARE CLOUD

Adopt Multi-Cloud Choose Hybrid Cloud Migrate to the Cloud Transform to Cloud
Infrastructure VMware Cloud Universal

SELECT CLOUD INFRASTRUCTURE

Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine
IBM Cloud for VMware Solutions Oracle Cloud VMware Solution VMware Cloud on AWS
VMware Cloud on AWS GovCloud (US) VMware Cloud on AWS Outposts VMware Cloud on
Dell VMware Cloud Disaster Recovery VMware Cloud Flex Storage VMware Cloud
Foundation VMware Verified Cloud Providers

GET A HYPERCONVERGED INFRASTRUCTURE

Dell EMC VxRail NSX NSX Advanced Load Balancer vCenter Server vSAN/vSAN+
vSphere/vSphere+

OPERATE IN THE CLOUD

Accelerate Disaster Recovery Automate the Network Deploy a Sovereign Cloud
Enable Cloud Adoption Scale Capacity On Demand

TRANSFORM TELCO CLOUD

Edge Monetization Network Modernization Network Programmability RAN
Disaggregation

MANAGE THE CLOUD

VMware Aria CloudHealth CloudHealth Secure State Skyline Aria Operations for
Applications vRealize Automation vRealize Cloud Universal vRealize Log Insight
vRealize Network Insight vRealize Operations vRealize Suite

SECURE CLOUD WORKLOADS

Carbon Black Container Carbon Black Workload CloudHealth Secure State NSX
Advanced Load Balancer NSX Distributed Firewall NSX Distributed IDS/IPS

EDGE

ENABLE THE MULTI-CLOUD EDGE

Edge Compute Stack Edge Network Intelligence Empower Remote Work Optimize and
Secure the WAN SD-WAN Secure Access Secure Access Service Edge (SASE) Telco Edge
VMware Cloud Web Security

TANZU DATA SERVICES

Tanzu Greenplum Tanzu SQL

QUICK LINKS

All Industries Cloud Platform Tech Zone VMware Tech Zone VMware Marketplace

ALL PRODUCTS

ALL SOLUTIONS

Main Menu
Multi-Cloud Spotlight

MULTI-CLOUD & ANYWHERE WORKSPACE

EMPOWER YOUR EMPLOYEES TO BE PRODUCTIVE FROM ANYWHERE, WITH SECURE, FRICTIONLESS
ACCESS TO ENTERPRISE APPS FROM ANY DEVICE. 

Deliver an Engaging Experience

Put employees first with device choice, flexibility, and seamless, consistent,
high-quality experiences.

 

Secure Today’s Anywhere Workspace

Ease the move to Zero Trust with situational intelligence and connected control
points.

 

Automate the Workspace

Manage to outcomes — not tasks — with intelligent compliance, workflow and
performance management.

LEARN MORE

ANYWHERE WORKSPACE

Enable any employee to work from anywhere, anytime with seamless employee
experiences.

Remote Work Is No Longer Optional

Shift from supporting remote work to becoming an anywhere organization.

DOWNLOAD BRIEF

SOLUTIONS & PRODUCTS




EMBRACE ANYWHERE WORKSPACE

Digital Employee Experience Endpoint Protection End User Adoption SaaS App
Management Secure Remote Access Virtual Desktops and Applications Web Protection
Digital Workspace Unified Endpoint Management

ENSURE EXPERIENCE AND PRODUCTIVITY

Workspace ONE Workspace ONE Access Workspace ONE Assist Workspace ONE
Intelligence Workspace ONE Intelligent Hub Workspace ONE Productivity Apps

ENABLE MODERN MANAGEMENT

Workspace ONE Workspace ONE Freestyle Orchestrator Workspace ONE Intelligence
Workspace ONE UEM Workspace ONE UEM for Mac Workspace ONE for Windows

SCALE WITH VDI & DAAS

Horizon Horizon Cloud NSX Advanced Load Balancer Workspace ONE Assist for
Horizon

EMPOWER FRONTLINE WORKERS

Workspace ONE Workspace ONE Assist Workspace ONE Intelligence Workspace ONE
Launcher Workspace ONE for Rugged Devices Workspace ONE UEM Workspace ONE for
Workspace IoT Endpoints

SECURE THE HYBRID WORKFORCE

Carbon Black Endpoint Mobile Threat Defense Secure Access VMware Cloud Web
Security Workspace ONE Access Workspace ONE Intelligence

DESKTOP HYPERVISOR

Fusion for Mac Workstation Player Workstation Pro

QUICK LINKS

All Industries Workspace Tech Zone

ALL PRODUCTS

ALL SOLUTIONS

Main Menu
Multi-Cloud Spotlight

MULTI-CLOUD SECURITY & NETWORKING

WITH CONNECTED SECURITY THAT DELIVERS FULL VISIBILITY AND FRICTIONLESS
OPERATIONS, YOUR APPS AND DATA ARE MORE SECURE WITH VMWARE, IN ANY ENVIRONMENT.

Secure & Connect Workloads

Operationalize consistent security and networking across apps, users, and
entities with transparency built into our tools.

 

Protect APIs — the New Endpoints

Increase app velocity and centrally manage, secure, connect, and govern your
clusters no matter where they reside.

 

Be Future-Ready

Get built-in threat intelligence spanning users, endpoints and networks to
evolve your protection in a dynamic landscape.

LEARN MORE

SECURITY & NETWORKING

Deliver security and networking as a built-in distributed service across users,
apps, devices, and workloads in any cloud.

Protect Your Multi-Cloud Environments

Discover the unique characteristics of malware and how to stay ahead of attacks.

GET THREAT REPORT

SOLUTIONS & PRODUCTS




SECURITY

MODERNIZE THE SOC

Carbon Black Cloud Carbon Black Endpoint Carbon Black MDR NSX Distributed
IDS/IPS NSX Network Detection and Response NSX Sandbox Security Professional
Services

SECURE MULTI-CLOUD WORKLOADS

Carbon Black App Control Carbon Black Container Carbon Black Workload
CloudHealth Secure State NSX Advanced Load Balancer NSX Distributed Firewall NSX
Distributed IDS/IPS NSX Gateway Firewall Ransomware Protection

SECURE MODERN APPS

Carbon Black Container Container Networking with Antrea NSX Advanced Load
Balancer Tanzu Service Mesh

SECURE THE HYBRID WORKFORCE

Carbon Black App Control Carbon Black Endpoint SASE Platform SD-WAN Secure
Access

NETWORKING

ENABLE CLOUD NETWORKING

DPU-based Acceleration for NSX NSX NSX Advanced Load Balancer NSX Firewall

RETHINK MODERN APP DELIVERY

NSX Advanced Load Balancer

CONNECT AND SECURE MODERN APPS

Container Networking with Antrea NSX Advanced Load Balancer Tanzu Service Mesh

STRENGTHEN APP & NETWORK ACCESS

Edge Network Intelligence Empower Remote Work Optimize and Secure the WAN SD-WAN
Secure Access Secure Access Service Edge (SASE) VMware Cloud Web Security

SECURE YOUR NETWORK

NSX Firewall NSX Distributed IDS/IPS NSX Network Detection & Response NSX
Sandbox

SIMPLIFY NETWORK OPS AND AUTOMATION

Global Network Identities HCX Workload Mobility NSX Intelligence vRealize
Network Insight

QUICK LINKS

All Industries Carbon Black Tech Zone NSX Tech Zone

ALL PRODUCTS

ALL SOLUTIONS

Main Menu
Multi-Cloud Spotlight

TRUSTED ADVISORS ON MULTI-CLOUD JOURNEY

PARTNERS ARE TRUSTED ADVISORS TO GUIDE CUSTOMERS’ JOURNEYS TO MULTI-CLOUD,
ENABLING DIGITAL INNOVATION WITH ENTERPRISE CONTROL.

Work with a VMware Partner

Partners deliver outcomes with their expertise and VMware technology, creating
exceptional value for our mutual customers. 

 

Become a Partner

Together with our partners, VMware is building the new multi-cloud ecosystem
positioned to become essential to our customers. 

 

LEARN MORE

PARTNERS

With thousands of partners worldwide, we are positioned to help customers scale
their business, drive innovation and transform their customer experience.

Working Together with Partners for Customer Success

See how we work with a global partner to help companies prepare for multi-cloud.

VIEW PARTNER STORY

SOLUTIONS




FOR CUSTOMERS

Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner

FOR PARTNERS

Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and
Selling Resources Partner Connect Login Partner Executive Edge Technology
Partner Hub Work with VMware

Ellipsis
Products  Trust Center




VMWARE CLOUD TRUST CENTER

Giving you the confidence to move at the speed of the cloud.


 


Overview Security Privacy Compliance Resiliency FAQs
Overview

 1. Overview
 2. Security
 3. Privacy
 4. Compliance
 5. Resiliency
 6. FAQs
 7. 




SECURITY

Operate with the confidence of security. View our commitment to keeping your
data safe at rest and in transit for your cloud, hybrid, and on-premises
deployments.

LEARN MORE


PRIVACY

Stay in control. View our policies that let you decide how your data is accessed
and used.


LEARN MORE


COMPLIANCE

Realize extensive compliance in every region. View our comprehensive list of
compliance standards and regulations.

LEARN MORE


RESILIENCY

Stay informed on the status of your solutions. Access a transparent view of
global product and service availability.


LEARN MORE


WHY VMWARE CLOUD SECURITY?

Cloud, hybrid or on-premise – your security is our priority.

EXTENSIVE SECURITY EXPERIENCE

From government and defense, to the largest data centers in the world, VMware
has a long history as a trusted partner in the most sensitive environments
around the world. Now we’ve expanded this reputation to our cloud offerings.


 

BUILT-IN COMPLIANCE

VMware builds security into the foundations of every one of our cloud solutions.
This means our offerings align with major compliance certifications to maintain
standards that meet industry best-practices.


 

ACCELERATE WITHOUT COMPROMISE

Whether migrating to the cloud, building modern apps, scaling your data center
or automating multi-cloud operations, move with agility and confidence.


 

Discover more information on security specific to each VMware Cloud Service

VMware participates at the Cloud Security Alliance (CSA) STAR Level 1 by
completing the Consensus Assessments Initiative Questionnaire (CAIQ) to document
compliance with the Cloud Controls Matrix (CCM).  STAR Self-Assessments are
updated annually.

You can view the CAIQ documents for VMware Cloud Services here.


VMWARE CLOUD SECURITY CAPABILITIES


SOFTWARE SECURITY

With world-class security partnerships and an industry-leading Security
Development Lifecycle process, VMware ensures Cloud operational and security
controls are aligned with industry benchmarks and best-practices.


DATA SECURITY

VMware maintains stringent data protection standards, to ensure appropriate
handling at every classification level, from processing and storage to
transmission and destruction of data. Data in the cloud is a shared
responsibility, and we define controls to ensure ownership and stewardship of
customer organizational data remains with the customer.






NETWORK SECURITY

VMware Cloud solutions build on top of the base network security provided by our
IaaS partners. Network environments are logically separated and protected by
firewalls to safeguard business security requirements and ensure appropriate
protection and isolation.



IDENTITY AND ACCESS MANAGEMENT

Based on the principle of least privilege, VMware cloud solutions use identity
and access management controls, ensuring the appropriate level of access for all
personnel to keep your data and systems safe and secure.


 


VULNERABILITY AND PATCH MANAGEMENT

The VMware comprehensive vulnerability management program includes third-party
vulnerability scanning and penetration testing across network, application and
local operating system layers, helping you stay ahead of new and emerging gaps
in security.


OPERATIONS MANAGEMENT

VMware Cloud solutions continuously collect and monitor environment logs
correlated with both public and private threat feeds, to spot suspicious and
unusual activities. This is supported by continuously updated contact with
industry bodies, risk and compliance organizations, local authorities, and
regulatory bodies to ensure new threats are apprehended rapidly.



RELATED RESOURCES


SECURITY MEASURES IN VMWARE TANZU MISSION CONTROL

Discover how VMware Tanzu Mission Control approaches security and implements
security measures.

LEARN MORE


HORIZON SERVICE CLOUD SECURITY OVERVIEW

Learn more about the security controls implemented in the cloud connected
components of Horizon Service.

LEARN MORE


VMWARE SECURITY BLOG

Make sure your enterprise is secure with the latest trends, tips and technology
from VMware’s security leaders and experts.


LEARN MORE


INFORMATION SECURITY MANAGEMENT AT VMWARE

Discover key elements of information security policies at VMware

LEARN MORE


INFORMATION SECURITY POLICY ATTESTATION

Discover more about which industry standards our information security policies
are aligned with as well as our policy review schedule. 

LEARN MORE


HOW WE PROTECT DATA WE PROCESS AS A BUSINESS

Transparency on how we collect, use, disclose, transfer and store personal
information.






HOW WE PROTECT DATA WE PROCESS AS A BUSINESS

Transparency on how we collect, use, disclose, transfer and store personal
information.



Products and Services Notice Privacy Notice Cookie Notice Additional Notices
Products and Services Notice

 1. Products and Services Notice
 2. Privacy Notice
 3. Cookie Notice
 4. Additional Notices


PRODUCTS AND SERVICES NOTICE

Applies to the personal information VMware collects and uses in connection with
your use of VMware products and services, including:

 

 * Cookies and similar tracking technologies we may use when providing the
   products or services.
 * Data we collect to improve our products and services and your customer
   experience.

Details regarding VMware’s customer experience improvement and analytics
programs relating to VMware products and service can be found here.

VIEW NOW


PRIVACY NOTICE

Addresses the personal information we collect when you:

 

 * Visit, interact with or use any of our websites, social media pages, mobile
   apps (where linked to the Privacy Notice), online advertisements, marketing
   communications.
 * Visit, interact with or use any of our events, sales, marketing and other
   offline activities.
 * Purchase VMware products and services and provide account-related personal
   information.

VIEW NOW


COOKIE NOTICE

Addresses how VMware uses cookies and similar tracking technologies when you use
and interact with our websites and our online properties.


VIEW NOW


ADDITIONAL NOTICES

VMware may have additional privacy notices for specific websites, events, mobile
apps, including "just-in-time" disclosures and in-product privacy notices. These
notices may supplement or clarify VMware's privacy practices or may provide
additional choices about how VMware processes data.


VIEW ADDITIONAL NOTICES


HOW WE PROTECT DATA AS A SERVICE PROVIDER

Enabling you to comply with data protection and privacy requirements.


PROCESSING OF CUSTOMER CONTENT

VMware processes, stores and hosts content you or your end users have uploaded
to VMware services as “Customer Content” (as defined in the VMware Terms of
Service or other relevant agreement). VMware processes personal data contained
within Customer Content as a “service provider” or “processor” acting on your
instruction. View our FAQs for more information.



DATA PROCESSING ADDENDUM

VMware’s obligations and commitments as a data processor are set forth in
VMware’s Data Processing Addendum (DPA). Our DPA Summary Coversheet offers
additional context and outlines the applicability of our DPA. VMware processes
personal data contained within Customer Content in accordance with this DPA and
the applicable agreements. Standard agreements for each product and service can
be found on our End User Terms and Conditions.



BINDING CORPORATE RULES

VMware has achieved Binding Corporate Rules (BCR) as a processor, acknowledging
we have met the standards of the EU General Data Protection Regulation for
international transfers of personal data contained in Customer Content.


VIEW VMWARE BCR VIEW EU COMMISION BCR LISTING


SUB-PROCESSORS

VMware may use third-party companies to provide certain services on its behalf.
Third party service providers who process personal data contained in Customer
Content (sub-processors), will have written agreements and data transfer
mechanisms in place to protect personal data in the manner set forth in the Data
Processing Addendum.


 

VIEW VMWARE SUB-PROCESSORS NOTIFY ME OF UPDATES TO LIST


VMWARE CLOUD SECURITY

VMware has programs, policies, and practices to ensure personal data contained
in Customer Content is adequately protected (including regular training and
confidentiality agreements for employees handling data), and to help identify,
prevent and resolve security vulnerabilities in our products and services. These
programs are continually reviewed and updated.


 

 

LEARN ABOUT VMWARE SECURITY LEARN ABOUT VMWARE COMPLIANCE


UNIFIED ENDPOINT MANAGEMENT

VMware offers solutions that enable you to protect your organization’s
information and systems, accessed and made available through corporate owned or
personal devices, using management controls. View information on Workspace ONE’s
privacy and security program and disclosure relating to data collected and used
by the service.


 

WORKSPACE ONE PRIVACY WORKSPACE ONE DISCLOSURE


RELATED RESOURCES




VMWARE CLOUD ON AWS PRIVACY

Learn about who is responsible for personal data in VMware Cloud on AWS SDDCs
and how VMware protects any data in its domain.


READ DATASHEET


VMWARE CLOUD DISASTER RECOVERY PRIVACY

Discover how VMware processes and protects your personal data in connection with
the VMware Cloud Disaster Recovery Service Offering

READ DATASHEET


VMWARE CLOUD WEB SECURITY PRIVACY

Learn about the types of personal data collected by this secure web gateway and
how VMware processes and protects it.

READ DATASHEET


CLOUDHEALTH BY VMWARE PRIVACY

Discover how VMware processes and protects personal data on the trusted platform
for optimizing multi-cloud environments.


READ DATASHEET


VMWARE CARBON BLACK CLOUD PRIVACY

Learn about the types of personal data collected by this cloud native security
solution and how VMware processes and protects it.


READ DATASHEET


VMWARE SD-WAN PRIVACY

Learn about the types of personal data collected by this network overlay
solution and VMware’s role in protecting it.


 

READ DATASHEET


VMWARE WORKSPACE ONE PRIVACY

Learn about the types of personal data collected by this digital workspace
platform and how VMware processes and protects it.


READ DATASHEET


VMWARE TANZU MISSION CONTROL

Discover how VMware processes and protects your personal data in connection with
the VMware Tanzu Mission Control Offering.

READ DATASHEET


VMWARE SECURE ACCESS

Discover how VMware processes and protects personal data in the Secure Access
hosted offering.

READ DATASHEET


VMWARE HORIZON PRIVACY

Discover how VMware processes and protects your personal data in connection with
the VMware Horizon Service.

READ DATASHEET


VMWARE TANZU SERVICE MESH PRIVACY

Learn how VMware processes and protects your personal data in connection with
VMware Tanzu Service Mesh.

READ DATASHEET


SEE ALL RESOURCES
COLLAPSE RESOURCES


MAINTAINING COMPLIANCE TOGETHER

VMware continuously monitors existing and emerging security standards and
requirements and integrates applicable requirements into our cloud service
compliance programs. As VMware partners with you on enabling your compliance,
you, as the customer, are required to ensure the Service Offering meets your
compliance and regulatory obligations.

If you have questions about compliance, we encourage you to discuss your
business goals and objectives with your VMware Sales Representative.





EXISTING CLOUD COMPLIANCE PROGRAMS

Continually updated information on the compliance programs most relevant to you.
For information on VMware Product Compliance click here.
Filter by Region APJAmericasEMEAGlobal
Filter by Service CerberusCloudgateCloud Partner NavigatorCloud
ServiceCloudHealth by VMwareCloudHealth Secure StateCSEP/VDPHorizon Cloud
ServiceLastlineNSX Advanced Load BalancerNSX Threat Intelligence CloudTanzu
Observability by WavefrontVMware App LaunchpadVMware Carbon Black CloudVMware
Carbon Black Hosted EDRVMware Cloud Director ServiceVMware Cloud Disaster
RecoveryVMware Cloud On AWSVMware Cloud on AWS GovCloud (US)VMware Cloud on Dell
EMCVMware Edge Network IntelligenceVMware Global Cloud ServicesVMware HCXVMware
Lab PlatformVMware Pivotal TrackerVMware SD-WANVMware SD-WAN for GovCloudVMware
Secure AccessVMware Secure Access Service EdgeVMware Site Recovery (VSR)VMware
SkylineVMware Tanzu Mission ControlVMware Tanzu Service MeshVMware vRealize AI
CloudVMware vRealize Automation CloudVMware vRealize Log Insight CloudVMware
vRealize Network Insight CloudVMware vRealize Operations CloudVMware vRealize
Cloud Subscription ManagerVMware vRealize Suite Lifecycle ManagerWorkspace ONE
AccessWorkspace ONE AssistWorkspace ONE IntelligenceWorkspace ONE UEMVMware
vSphere Advantage
 * CSA
   Cloud Security Alliance Controls
   Region: Global
   Alignment/Framework
   
 * Cyber Essentials Plus
   UK Government Information Assurance Framework
   Region: EMEA
   Certification/Attestation
   
 * DoD CC SRG
   Department of Defense Security Requirements
   Region: Americas
   Certification/Attestation
   
 * FedRAMP
   US Government Cloud Data Standards
   Region: Americas
   Certification/Attestation
   
 * G-Cloud
   UK Government Initiative for Procurement of Cloud Services
   Region: EMEA
   Certification/Attestation
   
 * IRAP
   Australian Cyber Security Centre Framework
   Region: APJ
   Certification/Attestation
   
 * ISMAP
   Japan Information Systems Security Management Program
   Region: APJ
   Certification/Attestation
   
 * ISO 27001
   Security Standard for Information Security Management
   Region: Global
   Certification/Attestation
   
 * ISO 27017
   Security Standard for Cloud Service Providers
   Region: Global
   Certification/Attestation
   
 * ISO 27018
   Security Standard for Protection of PII
   Region: Global
   Certification/Attestation
   
 * MTCS
   Singapore Multi-Tier Cloud Security Standard
   Region: APJ
   Certification/Attestation
   
 * OSPAR
   Singapore Outsourced Service Provider Auditor Report
   Region: APJ
   Certification/Attestation
   
 * PCI-DSS
   Security Standard for Protection of Payment Card Data
   Region: Global
   Certification/Attestation
   
 * SOC 2
   System and Organizational Controls for Service Organizations
   Region: Global
   Certification/Attestation
   
 * SOC 3
   System and Organizational Controls for Service Organizations
   Region: Global
   Certification/Attestation
   

 

 


ADDITIONAL COMPLIANCE INFORMATION

Thank you for your interest in compliance at VMware.

Please contact your VMware Sales Representative if you need additional
information about our compliance programs. Your sales representative can also
assist you in gaining access to compliance reports not available for immediate
download.

SERVICE STATUS

VMware Cloud on AWS (4)
VMware vRealize (4)
Workspace ONE (EUC) (4)
VMware Horizon Cloud (2)
VMware Tanzu (4)
Hybrid Cloud Extension (HCX) (1)
VMware Cloud Director service (1)
VMware Skyline (1)
VMware Lab Platform (1)
CloudHealth by VMware (2)
VMware SD-WAN by VeloCloud (1)
VMware Cloud Marketplace (1)
Cloud Partner Navigator (1)
VMware AppDefense (1)
VMware vSphere Advantage (1)

SERVICE LOCATION

US East (9)
US West (21)
US Central (2)
Singapore (4)
United Kingdom (9)
France (3)
India (4)
South Korea (2)
Brazil (2)
Germany (9)
Ireland (5)
Japan (9)
Canada (6)
Australia (9)
Hong Kong (2)
Netherlands (2)
Sweden (1)
Switzerland (1)
South Africa (1)
Philippines (1)


SERVICE STATUS

 * SERVICE
   
   VMWARE CLOUD ON AWS
   
   CHECK STATUS
 * SERVICE
   
   VMWARE CLOUD ON AWS GOVCLOUD
   
   CHECK STATUS
 * SERVICE
   
   VMWARE CLOUD ON AWS SDDC
   
   CHECK STATUS
 * SERVICE
   
   VMWARE CLOUD ON DELL EMC
   
   CHECK STATUS
 * SERVICE
   
   VMWARE VREALIZE AUTOMATION CLOUD
   
   CHECK STATUS
 * SERVICE
   
   VMWARE VREALIZE NETWORK INSIGHT CLOUD
   
   CHECK STATUS
 * SERVICE
   
   VMWARE VREALIZE LOG INSIGHT CLOUD
   
   CHECK STATUS
 * SERVICE
   
   VMWARE VREALIZE OPERATIONS CLOUD
   
   CHECK STATUS
 * SERVICE
   
   WORKSPACE ONE ACCESS
   
   CHECK STATUS
 * SERVICE
   
   WORKSPACE ONE UEM
   
   CHECK STATUS
 * SERVICE
   
   WORKSPACE ONE INTELLIGENCE
   
   CHECK STATUS
 * SERVICE
   
   WORKSPACE ONE ASSIST
   
   CHECK STATUS
 * SERVICE
   
   HORIZON CLOUD SERVICE ON IBM CLOUD
   
   CHECK STATUS
 * SERVICE
   
   HORIZON CLOUD CONTROL PLANE
   
   CHECK STATUS
 * SERVICE
   
   TANZU MISSION CONTROL
   
   CHECK STATUS
 * SERVICE
   
   TANZU SERVICE MESH
   
   CHECK STATUS
 * SERVICE
   
   TANZU APPLICATION CATALOG
   
   CHECK STATUS
 * SERVICE
   
   TANZU OBSERVABILITY BY WAVEFRONT
   
   CHECK STATUS
 * SERVICE
   
   VMWARE SD-WAN BY VELOCLOUD
   
   CHECK STATUS
 * SERVICE
   
   VMWARE LAB PLATFORM
   
   CHECK STATUS
 * SERVICE
   
   CLOUDHEALTH BY VMWARE
   
   CHECK STATUS
 * SERVICE
   
   CLOUDHEALTH SECURE STATE
   
   CHECK STATUS
 * SERVICE
   
   VMWARE HYBRID CLOUD EXTENSION (HCX)
   
   CHECK STATUS
 * SERVICE
   
   VMWARE CLOUD DIRECTOR SERVICE
   
   CHECK STATUS
 * SERVICE
   
   VMWARE SKYLINE
   
   CHECK STATUS
 * SERVICE
   
   VMWARE CLOUD MARKETPLACE
   
   CHECK STATUS
 * SERVICE
   
   CLOUD PARTNER NAVIGATOR
   
   CHECK STATUS
 * SERVICE
   
   VMWARE APPDEFENSE
   
   CHECK STATUS
 * SERVICE
   
   VMWARE VSPHERE ADVANTAGE
   
   CHECK STATUS

Load More


FREQUENTLY ASKED QUESTIONS




TRUST CENTER

I have more questions on Security, Compliance, Privacy & Resiliency, who do I
contact?


For more information related to VMware Cloud Trust Center, we encourage you to
reach out to your VMware Sales Representative. Your representative will be able
to obtain the information to best support your request.

Is there a partner led service that has completed IRAP assessment?


Yes, please visit here.


PRIVACY

Your Content: What is Your/Customer Content?


“Your Content” or “Customer Content” is any content you, as a customer, upload
into a Service Offering as further defined in your agreement with VMware
(e.g. VMware Terms of Service). This includes all text, sound, video, or image
files, and software (including machine images), or other information that you or
any of your end users upload into the Service Offering for processing, storage,
or hosting in connection with your account with us. For example, Customer
Content includes data that you or your end users store in Workspace ONE.
Importantly, your account information, including names, usernames, phone
numbers, and billing information associated with your account, is not included
in the definition of “Customer Content”, nor any information we collect in
connection with your use of our Service Offerings. Rather, VMware will handle
that information in accordance with our Privacy Notice.

Ownership of Your Content: Who owns Your/Customer Content?


You always retain ownership of your Customer Content. You determine which VMware
Service Offerings you would like to use in processing, storing, and hosting
Customer Content, and what information you upload into the Service Offering as
Customer Content. Also, we will not access or use your Customer Content for any
purpose except as necessary to provide the Service Offering to you and as set
forth and permitted in our VMware Terms of Service with you. Lastly, we do not
use Customer Content for marketing or advertising.

 

Court Orders: What happens if VMware receives a court order or legal request for
Customer Content?


VMware makes the following contractual commitments regarding how it will handle
subpoenas, court orders, agency actions or other legal or regulatory
requirements to disclose any customer's Content, as set forth in the "Required
Disclosure" section of the Terms of Service:

Where customer notification is not legally prohibited, VMware will: 

- Notify the Customer: Notify its customers of any demand for disclosure of
customer's content.

- Refer Government Agency to the Customer: Inform the relevant government
authority that VMware is a service provider acting on the customer's behalf and
all requests for access to customer's content should be directed in writing to
the contact person the customer has identified to us, or the customer's legal
department. 

- Limit Access: Only provide access to customer's content with the customer's
authorization. If the customer requests, we will, at the customer's expense,
take reasonable steps to contest any demand. 

In the event VMware is legally prohibited from notifying the customer, VMware
will: 

- Evaluate Legal Validity: VMware will evaluate the demand for disclosure to
determine whether it is legally valid and binding. 

- Challenge Unlawful Requests: VMware will challenge the order if it reasonably
believes the order does not comply with the applicable law. 

- Limit Scope of Disclosure: VMware will limit the scope of any disclosure to
only the information we are required to disclose and will disclose the
information in accordance with applicable law.

Government Access Requests: How does VMware handle government access requests
for Customer Content and any Personal Data contained therein?


VMware is committed to protecting its customers’ Content while complying with
applicable law, and accordingly, VMware has made commitments in its VMware Terms
of Service (Required Disclosures) and Binding Corporate Rules (BCRs) Processor
Policy regarding how VMware will respond to government access requests, as
further detailed below. VMware has prepared VMware’s Principles for Handling
Government Requests to Access Customer Content to assist customers in further
understanding VMware’s commitments and processes for handling government access
requests, including commitments set forth in VMware’s BCR’s. 

VMware specifically makes the following contractual commitments regarding how it
will handle government access requests, as set forth in the ‘Required
Disclosure” section of the VMware Terms of Service:


Where customer notification is not legally prohibited, VMware will: 

- Notify the Customer: Notify its customers of any demand for disclosure of
customer’s content.

 - Refer Government Agency to the Customer: Inform the relevant government
authority that VMware is a service provider acting on the customer’s behalf and
all requests for access to customer’s content should be directed in writing to
the contact person the customer has identified to us, or the customer’s legal
department. 

- Limit Access: Only provide access to customer’s content with the customer’s
authorization. If the customer requests, we will, at the customer’s expense,
take reasonable steps to contest any demand.

In the event VMware is legally prohibited from notifying the customer, VMware
will:

- Evaluate Legal Validity: VMware will evaluate the demand for disclosure to
determine whether it is legally valid and binding.

- Challenge Unlawful Requests: VMware will challenge the order if it reasonably
believes the order does not comply with applicable law.

- Limit Scope of Disclosure: VMware will limit the scope of any disclosure to
only the information we are required to disclose and will disclose the
information in accordance with applicable law.

In no event will VMware disclose any Personal Data in a massive,
disproportionate, and indiscriminate manner that goes beyond what is necessary
in a democratic society.


Further, following the decision of the European Union Court of Justice (ECJ) in
Data Protection Commissioner v. Facebook Ireland and Maximillian Schrems, Case
C-311/18 (Schrems II), VMware has prepared the VMware Statement regarding
application of FISA Section 702 and Executive Order 12333 in view of Schrems
II to address concerns about U.S. intelligence agencies having access to data
transiting from the EU to the U.S. and to assist customers in understanding the
likely application of two U.S. authorities: Executive Order (EO)12333 and the
Foreign Intelligence Surveillance Act (FISA) Section 702. VMware strongly
believes there is a low likelihood that it would be subject to Section 702 or EO
12333 in relation to its provision of the service offerings given the nature of
the services it provides.


VMware is a global company and is subject to global laws. The list of countries
where Personal Data contained in Customer Content is processed in relation to a
specific Service Offering are set forth in the applicable Sub-processor list(s),
identified here. VMware is not aware of any applicable law that would impinge on
its ability to comply with its commitments relating to government access
requests and required disclosures as set forth in the VMware Terms of Service.


Has VMware received any Law Enforcement Information Requests?


VMware recently published its VMware Transparency and Law Enforcement Report. To
access the Report, please click here.

Data Transfer Strategy: What mechanism has VMware implemented to ensure
appropriate safeguards for the transfer of personal data outside of EEA,
Switzerland and UK where VMware is acting as a processor?


In connection with the provision of VMware services to a customer, VMware may
transfer Personal Data included in Customer Content (as such terms are defined
in the VMware Data Processing Addendum from the European Economic Area ("EEA"),
Switzerland and UK to third countries in its capacity as a processor. The
General Data Protection Regulation ("GDPR") has been incorporated into UK's
domestic legislation, and therefore the data transfer mechanism permitted under
the GDPR for transfers of personal data outside the EEA will also apply to
transfers from the UK. Regarding Switzerland, the Federal Act on Data Protection
("FADP") follows a similar framework as the GDPR and therefore, the same data
transfer mechanisms apply to transfers from Switzerland (with the necessary
amendments to account for any differences).

Recipients or importers of customer's Personal Data include the entities in the
VMware Group and select third-party vendors we engage who process Personal Data
on our behalf to provide our services (“Sub-Processors”). A list of the entities
in the VMware Group and Sub-Processors we use to process our customers’ Personal
Data in connection with our service offerings and customer support, along with
details of their location, are available here.


Intra-Group Transfers: Whenever VMware, acting as a processor, shares Personal
Data originating in the EEA, it will do so on the basis of its Irish Data
Protection Commissioner and peer approved binding corporate rules known as
the VMware Binding Corporate Rules ("VMware's EEA BCRs") which establish
adequate protection of such Personal Data and are legally binding on the VMware
Group.


VMware's BCRs were approved by the European Data Protection Authorities on May
23, 2018. You can review confirmation that this review has now been
completed here. For additional information on VMware’s Binding Corporate Rules
and to access VMware's EEA BCRs Processor Policy, see VMware's Processor Binding
Corporate Rules. To see a listing of the VMware affiliates that have signed an
Intra-Group Agreement for VMware's EEA BCRs, click here. For further
information, click here.


VMware’s application for Binding Corporate Rules in the UK ("VMware's UK BCR’s")
is currently pending, and VMware’s Data Processing Addendum will be updated when
the UK BCRs take effect. See FAQ “What is VMware data transfer strategy in light
of Brexit?” for more information.


Transfers to Third-Party Sub-Processors: VMware has in place Data Processing
Agreements (DPAs) with its Sub-Processors which incorporate the current version
of the Controller to Processor SCCs to ensure safe, secure, and legal data
transfers from the EEA, Switzerland and UK and to protect any subsequent onward
transfers. The European Commission has published a new draft version of the SCCs
available here. Once the new SCCs are approved and take effect, VMware will take
such necessary steps to implement such new SCCs with its Sub-Processors in
accordance with any new requirements established by the European Commission.


Brexit: What is VMware's data transfer strategy in light of Brexit?


VMware has prepared an FAQ “Brexit and International Data Transfers”,
available here, to address concerns from customers regarding VMware's data
transfer strategy in light of Brexit, and specifically the use of binding
corporate rules (BCRs) and standard contractual clauses (SCCs).

For additional information regarding the mechanisms VMware has implemented to
ensure appropriate safeguards for the transfer of personal data, see FAQ “What
mechanism has VMware implemented to ensure appropriate safeguards for the
transfer of personal data outside of the EEA, Switzerland and UK where VMware is
acting as a processor?”


Customer Security Obligations: What obligations do you have as a customer in
securing your Customer Content?


Security of our Service Offerings is of the upmost importance to VMware. For a
list of the security measures deployed in connection with our Service Offerings,
see the Trust Center Security page.

In your use of the Service Offerings, you are responsible for configuring and
implementing the necessary technical, organizational and administrative controls
to enable you to comply with any laws applicable to your use of the Service
Offering, which may depend on the types of data you choose to process using the
Service Offering. Your responsibilities relating to the security of your
Customer Content are set forth in the applicable agreement, and include (a)
controlling access you provide to your users, (b) configuring the Service
Offering appropriately, (c) ensuring the security of Customer Content while it
is in transit to and from the Service Offering, (d) using encryption technology
to protect Customer Content as you deem necessary, and (e) backing up Customer
Content.


VMware Security Controls: What does VMware do to protect the security of
Customer Content?


VMware maintains an information security management program that is aligned with
the ISO 27001 standard (as applicable), which is reviewed at least annually to
ensure appropriate controls, practices and procedures are in place. For a list
of the security measures deployed in connection with our Service Offerings, see
the Trust Center Security page.

Sub-Processors: How does VMware engage and use third parties to perform services
on its behalf in connection with the provision of VMware Service Offerings or
Support & Subscription Services?


VMware engages and uses third parties to perform services on its behalf in
connection with the provision of VMware Service Offerings or Support &
Subscription Services. See details provided here. In connection with the
engagement of third-parties who process Personal Data as a Sub-processor (as
those terms are defined in Data Processing Addendum), VMware has implemented the
following processes and procedures:

1. Contractual Commitment and International Data Transfers: VMware enters into
data processing agreements with all its Sub-processors which requires the
Sub-processors to maintain proper privacy, security and confidentiality of
Personal Data on terms which are substantially similar to the contractual
commitments VMware makes to its own customers in the Data Processing Addendum.
VMware relies on the EU Standard Contractual Clauses unless there is another
legitimate data transfer mechanism in place and the Sub-processor makes
appropriate contractual commitments.

2. Privacy Review Process and Privacy-by-Design: VMware has established a
centralized end-to-end third-party vendor management process to onboard new
suppliers, including initiating, conducting and tracking third-party privacy and
security reviews using centralized tools to assist with its compliance efforts.
The VMware Privacy Team conducts detailed privacy reviews of the services
provided by Sub-processors, including determining the categories of Personal
Data processed and the processing purposes. The reviews include the
implementation of privacy controls for mitigating the risks associated with
Sub-processors’ access to and processing of Personal Data and ensuring
regulatory compliance.

3. Security Review Process: VMware maintains a policy and process for conducting
security reviews of Sub-processors. The VMware Security Team conducts an initial
security review of any new Sub-processor, and ongoing monitoring based on the
identified security risk level.

4. List of Sub-Processors and Notification of New Sub-Processors: VMware
maintains a list of the Sub-processors used by individual Service Offerings and
in relation to the Support & Subscription Services. The list for each Service
Offering can be accessed here. VMware provides prior notice to Customer of any
new engagement of a Sub-processor if the Customer has subscribed to receive
notification for a specific Service via the mechanisms provided by VMware. If
you would like to receive new Sub-processor notifications, please go here, and
enable notifications for the relevant Sub-processor list(s).

Privacy Reviews: Does VMware conduct Privacy Reviews of its On-Premise Products
and Service Offerings?


VMware has implemented a privacy-by-design framework to ensure that its
On-Premise Products and Service Offerings are designed in a manner which
complies with applicable privacy principles and legal requirements. A privacy
review process has been implemented in the design lifecycle of VMware’s
On-Premise Products and Service Offerings, which includes documented
instructions for submitting a product or service through a privacy review,
designated legal counsel to conduct privacy reviews, data processing impact
assessments (as may be required), and general privacy requirements for designing
products/services in compliance with applicable data protection and privacy
laws.

Further, VMware has established a centralized end-to-end third-party vendor
management process to onboard new suppliers, including initiating, conducting
and tracking third-party privacy and security reviews using centralized tools to
assist with its compliance efforts. The VMware Privacy Team conducts detailed
privacy reviews of the services provided by Sub-processors, including
determining the categories of Personal Data processed and the processing
purposes. The reviews include the implementation of privacy controls for
mitigating the risks associated with Sub-processors’ access to and processing of
Personal Data and ensuring regulatory compliance.


Data Protection Officer: Does VMware have a Data Protection Officer?


VMware has a Data Protection Officer who is a lawyer and director of an external
data protection consulting firm. The role of the DPO is described in Articles 38
and 39 of the GDPR. The DPO must be involved in all issues relating to the
protection of personal data, advise the organization regarding its obligations
under GDPR, monitor its compliance, provide advice regarding any data protection
impact assessment, and be a point of contact for the supervisory authorities. 
The VMware Privacy Team engages VMware’s DPO as appropriate.  To contact
VMware’s DPO, please email dpo@vmware.com.  The VMware Privacy Team will address
the query and/or engage our DPO, as appropriate.

EU General Data Protection Regulation: How does VMware comply with the GDPR?


Under the EU General Data Protection Regulation (“GDPR”), VMware is the
“processor” with respect to Customer Content. VMware’s obligations and
commitments as a processor under GDPR are set forth in our Data Processing
Addendum, and VMware will process personal data contained within Customer
Content in accordance with the applicable agreement and the Data Processing
Addendum. Further, VMware has achieved Binding Corporate Rules (“BCR”) approval
for personal data it processes as a processor. A copy of VMware’s BCR is
available here and evidence of VMware’s approval is available on the European
Commission’s website.

VMware GDPR Supplemental Measures Addendum: When does it apply and what changes
does it introduce?


VMware recently published the GDPR Supplemental Measures Addendum (the Addendum)
in light of the Schrems II decision and the revised EU standard contractual
clauses. To learn more, please click here.

Schrems II Decision: What steps did VMware take in its capacity as a data
processor in response to the Schrems II Decision of the Court of Justice of the
European Union?


VMware provides enterprise solutions which enable its customers to build,
manage, secure and run applications across multiple systems and environments.
Although VMware believes the nature of the Service Offerings it provides to its
customers won’t generally warrant a direct government access request to Customer
Content, VMware took the following steps to comply with the Schrems II ruling
and to assist customers in their own compliance efforts in relation to data they
process as a controller:

Strengthened Contractual Commitments Regarding Government Access Requests

VMware updated the ‘Required Disclosure’ section of its Terms of Service to
clarify how VMware handles government access requests by adding the following
commitments:


Where customer notification is not legally prohibited, VMware will:

- Notify the Customer: Notify its customers of any demand for disclosure of
customer’s content.

- Refer Government Agency to the Customer: Inform the relevant government
authority that VMware is a service provider acting on the customer’s behalf and
all requests for access to customer’s content should be directed in writing to
the contact person the customer has identified to us, or the customer’s legal
department.

- Limit Access: Only provide access to customer’s content with the customer’s
authorization. If the customer requests, we will, at the customer’s expense,
take reasonable steps to contest any demand.

In the event VMware is legally prohibited from notifying the customer, VMware
will:

- Evaluate Legal Validity: VMware will evaluate the demand for disclosure to
determine whether it is legally valid and binding,

- Challenge Unlawful Requests: VMware will challenge the order if it reasonably
believes the order does not comply with applicable law.

- Limit Scope of Disclosure: VMware will limit the scope of any disclosure to
only the information we are required to disclose and will disclose the
information in accordance with applicable law.

Transparency Regarding Process for Handling Government Access Requests and US
Authorities


To assist customers in further understanding VMware’s commitments and process
for handling government access requests, including commitments set forth in
VMware’s BCR’s, VMware has prepared VMware Principles for Handling Government
Requests to Access Customer Content.


Further, VMware has prepared the VMware Statement regarding application of FISA
Section 702 and Executive Order 12333 in view of Schrems II to address concerns
about U.S. intelligence agencies having access to data transiting from the EU to
the U.S. and to assist customers in understanding the likely application of two
U.S. authorities: Executive Order (EO)12333 and the Foreign Intelligence
Surveillance Act (FISA) Section 702. VMware strongly believes there is a low
likelihood that it would be subject to Section 702 or EO 12333 in relation to
its provision of the service offerings given the nature of the services it
provides.


Updated Contracts with Sub-Processors to Ensure Legal Basis for Transferring
Personal Data


Since the invalidation of the EU-U.S. Privacy Shield, VMware has implemented
Standard Contractual Clauses with all of its Sub-processors who previously
relied on the EU-US Privacy Shield as a data transfer mechanism. In its capacity
as a data processor, VMware relies on Binding Corporate Rules to transfer
Personal Data outside the EU in connection with the provision of the applicable
VMware Service Offerings as set forth in VMware’s Data Processing Addendum.
Additional information on VMware’s BCR’s can be found here and on the VMware
Trust Center. 


Technical and Organizational Measures


VMware confirms its commitment to implement and maintain appropriate technical
and organizational measures as set forth in VMware’s Data Processing
Addendum. VMware’s Trust Center website outlines the third-party certifications
and audits VMware maintains in relation to its Service Offerings. Given the
nature of the VMware Service Offerings, customers also have control over how
they configure the Service Offerings, and can implement any necessary
administrative and technical controls as required to protect the data that is
processed in connection with their use of the applicable Service Offering. In
many instances, VMware provides both on-premise and hosted solutions for
customers to choose from when managing their systems and infrastructure.


Transparency Regarding the Types of Data processed by VMware Service –
Datasheets


The European Data Protection Board (EDPB) in its FAQs on “Schrems II" outlined
that it is necessary to consider the types of data transferred as one factor in
making a determination whether there is an adequate level of protection
surrounding the transfer of personal data outside the EU, and that controllers
should conduct a case-by-case analysis to determine the risks posed by such
transfer. To assist customers in understanding the types of data processed in
connection with their use of VMware Service Offerings, VMware provides Service
Descriptions for each Service Offering available here, and makes available
datasheets for certain Service Offerings in the Privacy section of the VMware
Trust Center. For Workspace One Service Offerings, VMware also makes available
the Workspace One Disclosure.


Transfer Impact Assessments: Does VMware conduct Transfer Impact Assessments?


In light of the “Schrems II” ruling of the Court of Justice for the European
Union and the recommendations from the European Data Protection Board, VMware
conducts transfer impact assessments (TIAs) on personal data transferred from
the EEA, UK and Switzerland to third countries which have not been granted
adequacy status. 

VMware has developed an internal process for conducting TIAs which follows The
European Data Protection Board (EDPB) guidance and the UK Information
Commissioner’s Office’s International Transfer Risk Assessment and Tool. This
includes undertaking a country level analysis, gathering additional information
from our vendors to assess government access, and conducting TIAs as part of the
privacy reviews for our products and services, third-party sub-processors and
corporate functions.  

For more information, see our FAQ on TIAs available here.  

The following resources (available on the VMware Trust Center) provide
additional information on VMware’s response to the Schrems II, how VMware
handles government access requests, and the likelihood of such requests.  

 * FAQ on VMware’s response to Schrems II
 * FAQ on VMware’s GDPR Supplemental Measures Addendum
 * VMware Principles for Handling Government Requests to Access Customer Content
 * VMware Statement regarding application of FISA Section 702 and Executive
   Order 12333 in view of Schrems II

California Consumer Privacy Act: How does the California Consumer Privacy Act
(“CCPA”) apply to VMware’s provision of the services?


The California Consumer Privacy Act (“CCPA”) applies to businesses that provide
services to consumers in California. It gives individuals certain rights
regarding the processing of their personal data. Under the CCPA, VMware acts as
a ‘service provider’ of the customer in connection with the processing of
personal data contained within customer content. VMware will not access or use
such personal data for any purpose except as necessary to provide the services
to the customer as set forth in the applicable agreement, and will assist the
customer in responding to data subject access requests under the CCPA as set
forth in our Data Processing Addendum. Where VMware acts as a ‘business’ under
CCPA, VMware’s California Privacy Notice and other Privacy Notices provide
details regarding how VMware handles such personal information as a business,
including any required disclosures pertaining to the categories of data
collected and used, and the sale of personal information. For more detailed
information regarding the applicability of the CCPA to VMware’s provision of the
services, click here.


READY TO GET STARTED?


CONTACT US

Company

About Us Executive Leadership News & Stories Investor Relations Customer Stories
Diversity, Equity & Inclusion Environment, Social & Governance
Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust
Center COVID-19 Resources

Support

VMware Customer Connect Support Policies Product Documentation Compatibility
Guide End User Terms & Conditions California Transparency Act Statement
Twitter YouTube Facebook LinkedIn Contact Sales

--------------------------------------------------------------------------------

© 2022 VMware, Inc. Terms of Use Your California Privacy Rights Privacy
Accessibility Site Map Trademarks Glossary Help Feedback
Cookie Settings




We use cookies to provide you with the best experience on our website, to
improve usability and performance and thereby improve what we offer to you. Our
website may also use third-party cookies to display advertising that is more
relevant to you. By clicking on the “Accept All” button you agree to the storing
of cookies on your device. If you want to know more about how we use cookies,
please see our Cookie Policy.

Cookie Settings Accept All Cookies



COOKIE PREFERENCE CENTER




GENERAL INFORMATION ON COOKIES

GENERAL INFORMATION ON COOKIES

When you visit our website, we use cookies to ensure that we give you the best
experience. This information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies by clicking on the
different category headings to find out more and change your settings. However,
blocking some types of cookies may impact your experience on the site and the
services we are able to offer. Further information can be found in our
Cookie Policy.


 * STRICTLY NECESSARY
   
   STRICTLY NECESSARY
   
   Always Active
   Strictly Necessary
   
   Strictly necessary cookies are always enabled since they are essential for
   our website to function. They enable core functionality such as security,
   network management, and website accessibility. You can set your browser to
   block or alert you about these cookies, but this may affect how the website
   functions. For more information please visit www.aboutcookies.org or
   www.allaboutcookies.org.
   
   Cookie Details‎


 * PERFORMANCE
   
   PERFORMANCE
   
   Performance
   
   Performance cookies are used to analyze the user experience to improve our
   website by collecting and reporting information on how you use it. They allow
   us to know which pages are the most and least popular, see how visitors move
   around the site, optimize our website and make it easier to navigate.
   
   Cookie Details‎


 * FUNCTIONAL
   
   FUNCTIONAL
   
   Functional
   
   Functional cookies help us keep track of your past browsing choices so we can
   improve usability and customize your experience. These cookies enable the
   website to remember your preferred settings, language preferences, location
   and other customizable elements such as font or text size. If you do not
   allow these cookies, then some or all of these services may not function
   properly.
   
   Cookie Details‎


 * ADVERTISING
   
   ADVERTISING
   
   Advertising
   
   Advertising cookies are used to send you relevant advertising and promotional
   information. They may be set through our site by third parties to build a
   profile of your interests and show you relevant advertisements on other
   sites. These cookies do not directly store personal information, but their
   function is based on uniquely identifying your browser and internet device.
   
   Cookie Details‎


 * SOCIAL MEDIA
   
   SOCIAL MEDIA
   
   Social Media
   
   Social media cookies are intended to facilitate the sharing of content and to
   improve the user experience. These cookies can sometimes track your
   activities. We do not control social media cookies and they do not allow us
   to gain access to your social media accounts. Please refer to the relevant
   social media platform’s privacy policies for more information.
   
   Cookie Details‎

Back Button


ADVERTISING COOKIES

Filter Button
Consent Leg.Interest
Select All Vendors
Select All Vendors
Select All Hosts

Select All

 * REPLACE-WITH-DYANMIC-HOST-ID
   
   
   
   View Third Party Cookies
   
    * Name
      cookie name



Clear Filters

Information storage and access
Apply
Confirm My Choices Allow All

word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1