www.vmware.com
Open in
urlscan Pro
2a02:26f0:3400:18f::2ef
Public Scan
Submitted URL: https://cloud.vmware.com/trust-center
Effective URL: https://www.vmware.com/products/trust-center.html
Submission: On October 25 via api from US — Scanned from DE
Effective URL: https://www.vmware.com/products/trust-center.html
Submission: On October 25 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<input type="text" name="q" id="ub-search" class="d-none" aria-role="searchbox" role="searchbox">
<a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">
<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
</a>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
Text Content
Skip to Promo Skip to main content Global Search US About Us Resources Store Log in Cloud Services Console Customer Connect Partner Connect * Multi-Cloud Environments * App Platform * Cloud & Edge Infrastructure * Anywhere Workspace * Security & Networking * Partners GET STARTED Main Menu TAKE CONTROL OF YOUR MULTI-CLOUD ENVIRONMENT 73% of enterprises use two or more public clouds today. While multi-cloud accelerates digital transformation, it also introduces complexity and risk. Simplicity Across Clouds Is Rare 91% of executives are looking to improve “consistency across [their] public cloud environments." Applications Need to Be Modernized 68% of developers want to expand use of modern application frameworks, APIs and services. Distributed Work Models Are Here to Stay 72% of enterprise employees are working from non-traditional environments. Security Is a Top-Down Concern Risk related to security, data and privacy issues remains the #1 multi-cloud challenge. SEE HOW VMWARE CAN HELP VMWARE CROSS-CLOUD™ SERVICES ENABLE ORGANIZATIONS TO UNLOCK THE POTENTIAL OF MULTI-CLOUD WITH ENTERPRISE SECURITY AND RESILIENCY. BUILD & OPERATE CLOUD NATIVE APPS Give developers the flexibility to use any app framework and tooling for a secure, consistent and fast path to production on any cloud. CONNECT & SECURE APPS & CLOUDS Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud. AUTOMATE & OPTIMIZE APPS & CLOUDS Operate apps and infrastructure consistently, with unified governance and visibility into performance and costs across clouds. ACCESS ANY APP ON ANY DEVICE Empower your employees to be productive from anywhere, with secure, frictionless access to enterprise apps from any device. RUN ENTERPRISE APPS ANYWHERE Run enterprise apps and platform services at scale across public and telco clouds, data centers and edge environments. LEARN ABOUT CROSS-CLOUD SERVICES Main Menu Multi-Cloud Spotlight MODERNIZE FASTER ACROSS CLOUDS MODERNIZE APPS FASTER WITH A MULTI-CLOUD KUBERNETES PLATFORM TO HELP YOU BUILD AND RUN ALL APPS CONSISTENTLY ACROSS CLOUDS. Get on a Faster Path to Prod Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster. Simplify Kubernetes Operations Build and operate a secure, multi-cloud container infrastructure at scale. Pair with App Development Experts Unlock value by modernizing your existing apps and building innovative new products. LEARN MORE APP PLATFORM Build, run, secure, and manage all of your apps across any cloud with application modernization solutions and guidance from VMware. Join Us at SpringOne by VMware Tanzu, Dec 6-8 Learn how architects, platform teams and innovators are using the latest tech to get code from idea to reality faster. REGISTER NOW SOLUTIONS & PRODUCTS BOOST DEVELOPER VELOCITY Data Transformation Product Development Rapid Portfolio Modernization Tanzu Application Platform Tanzu Data Services REALIZE DEVSECOPS OUTCOMES Carbon Black Container Tanzu Application Platform Tanzu Service Mesh EMBRACE PLATFORM OPS Platform Development Tanzu for Kubernetes Operations Tanzu Kubernetes Grid Tanzu Mission Control Aria Operations for Applications CONNECT & SECURE MODERN APPS Carbon Black Container Container Networking with Antrea Network Security NSX NSX Advanced Load Balancer Tanzu Service Mesh EMERGE AS A CLOUD NATIVE CSP Telco Cloud Automation Telco Cloud Infrastructure Telco Cloud Platform Telco Cloud Platform – Public Cloud Telco Cloud Platform – RAN Telco Cloud Service Assurance VMware RIC TANZU DATA SERVICES Tanzu GemFire Tanzu RabbitMQ QUICK LINKS All Industries ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight POWER OF ANY CLOUD WITH CONSISTENCY OF ONE ACCELERATE CLOUD TRANSFORMATION WITH AN ENTERPRISE INFRASTRUCTURE, MULTI-CLOUD OPERATIONS AND MODERN APP PLATFORM ACROSS THE EDGE AND ANY CLOUD. Connect and Run with Confidence Reduce time-to-value, lower costs, and enhance security while modernizing your private and public cloud infrastructure. Enhance Digital Experiences Securely, reliably, and optimally connect applications in the cloud and at the edge to deliver unique experiences. LEARN MORE CLOUD & EDGE INFRASTRUCTURE Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments. VMware Research: Multi-Cloud Strategies Learn why enterprises find multi-cloud strategies critical for success. SEE INTERACTIVE EBOOK SOLUTIONS & PRODUCTS CLOUD INFRASTRUCTURE EXPLORE VMWARE CLOUD Adopt Multi-Cloud Choose Hybrid Cloud Migrate to the Cloud Transform to Cloud Infrastructure VMware Cloud Universal SELECT CLOUD INFRASTRUCTURE Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine IBM Cloud for VMware Solutions Oracle Cloud VMware Solution VMware Cloud on AWS VMware Cloud on AWS GovCloud (US) VMware Cloud on AWS Outposts VMware Cloud on Dell VMware Cloud Disaster Recovery VMware Cloud Flex Storage VMware Cloud Foundation VMware Verified Cloud Providers GET A HYPERCONVERGED INFRASTRUCTURE Dell EMC VxRail NSX NSX Advanced Load Balancer vCenter Server vSAN/vSAN+ vSphere/vSphere+ OPERATE IN THE CLOUD Accelerate Disaster Recovery Automate the Network Deploy a Sovereign Cloud Enable Cloud Adoption Scale Capacity On Demand TRANSFORM TELCO CLOUD Edge Monetization Network Modernization Network Programmability RAN Disaggregation MANAGE THE CLOUD VMware Aria CloudHealth CloudHealth Secure State Skyline Aria Operations for Applications vRealize Automation vRealize Cloud Universal vRealize Log Insight vRealize Network Insight vRealize Operations vRealize Suite SECURE CLOUD WORKLOADS Carbon Black Container Carbon Black Workload CloudHealth Secure State NSX Advanced Load Balancer NSX Distributed Firewall NSX Distributed IDS/IPS EDGE ENABLE THE MULTI-CLOUD EDGE Edge Compute Stack Edge Network Intelligence Empower Remote Work Optimize and Secure the WAN SD-WAN Secure Access Secure Access Service Edge (SASE) Telco Edge VMware Cloud Web Security TANZU DATA SERVICES Tanzu Greenplum Tanzu SQL QUICK LINKS All Industries Cloud Platform Tech Zone VMware Tech Zone VMware Marketplace ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight MULTI-CLOUD & ANYWHERE WORKSPACE EMPOWER YOUR EMPLOYEES TO BE PRODUCTIVE FROM ANYWHERE, WITH SECURE, FRICTIONLESS ACCESS TO ENTERPRISE APPS FROM ANY DEVICE. Deliver an Engaging Experience Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences. Secure Today’s Anywhere Workspace Ease the move to Zero Trust with situational intelligence and connected control points. Automate the Workspace Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management. LEARN MORE ANYWHERE WORKSPACE Enable any employee to work from anywhere, anytime with seamless employee experiences. Remote Work Is No Longer Optional Shift from supporting remote work to becoming an anywhere organization. DOWNLOAD BRIEF SOLUTIONS & PRODUCTS EMBRACE ANYWHERE WORKSPACE Digital Employee Experience Endpoint Protection End User Adoption SaaS App Management Secure Remote Access Virtual Desktops and Applications Web Protection Digital Workspace Unified Endpoint Management ENSURE EXPERIENCE AND PRODUCTIVITY Workspace ONE Workspace ONE Access Workspace ONE Assist Workspace ONE Intelligence Workspace ONE Intelligent Hub Workspace ONE Productivity Apps ENABLE MODERN MANAGEMENT Workspace ONE Workspace ONE Freestyle Orchestrator Workspace ONE Intelligence Workspace ONE UEM Workspace ONE UEM for Mac Workspace ONE for Windows SCALE WITH VDI & DAAS Horizon Horizon Cloud NSX Advanced Load Balancer Workspace ONE Assist for Horizon EMPOWER FRONTLINE WORKERS Workspace ONE Workspace ONE Assist Workspace ONE Intelligence Workspace ONE Launcher Workspace ONE for Rugged Devices Workspace ONE UEM Workspace ONE for Workspace IoT Endpoints SECURE THE HYBRID WORKFORCE Carbon Black Endpoint Mobile Threat Defense Secure Access VMware Cloud Web Security Workspace ONE Access Workspace ONE Intelligence DESKTOP HYPERVISOR Fusion for Mac Workstation Player Workstation Pro QUICK LINKS All Industries Workspace Tech Zone ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight MULTI-CLOUD SECURITY & NETWORKING WITH CONNECTED SECURITY THAT DELIVERS FULL VISIBILITY AND FRICTIONLESS OPERATIONS, YOUR APPS AND DATA ARE MORE SECURE WITH VMWARE, IN ANY ENVIRONMENT. Secure & Connect Workloads Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools. Protect APIs — the New Endpoints Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside. Be Future-Ready Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape. LEARN MORE SECURITY & NETWORKING Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud. Protect Your Multi-Cloud Environments Discover the unique characteristics of malware and how to stay ahead of attacks. GET THREAT REPORT SOLUTIONS & PRODUCTS SECURITY MODERNIZE THE SOC Carbon Black Cloud Carbon Black Endpoint Carbon Black MDR NSX Distributed IDS/IPS NSX Network Detection and Response NSX Sandbox Security Professional Services SECURE MULTI-CLOUD WORKLOADS Carbon Black App Control Carbon Black Container Carbon Black Workload CloudHealth Secure State NSX Advanced Load Balancer NSX Distributed Firewall NSX Distributed IDS/IPS NSX Gateway Firewall Ransomware Protection SECURE MODERN APPS Carbon Black Container Container Networking with Antrea NSX Advanced Load Balancer Tanzu Service Mesh SECURE THE HYBRID WORKFORCE Carbon Black App Control Carbon Black Endpoint SASE Platform SD-WAN Secure Access NETWORKING ENABLE CLOUD NETWORKING DPU-based Acceleration for NSX NSX NSX Advanced Load Balancer NSX Firewall RETHINK MODERN APP DELIVERY NSX Advanced Load Balancer CONNECT AND SECURE MODERN APPS Container Networking with Antrea NSX Advanced Load Balancer Tanzu Service Mesh STRENGTHEN APP & NETWORK ACCESS Edge Network Intelligence Empower Remote Work Optimize and Secure the WAN SD-WAN Secure Access Secure Access Service Edge (SASE) VMware Cloud Web Security SECURE YOUR NETWORK NSX Firewall NSX Distributed IDS/IPS NSX Network Detection & Response NSX Sandbox SIMPLIFY NETWORK OPS AND AUTOMATION Global Network Identities HCX Workload Mobility NSX Intelligence vRealize Network Insight QUICK LINKS All Industries Carbon Black Tech Zone NSX Tech Zone ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight TRUSTED ADVISORS ON MULTI-CLOUD JOURNEY PARTNERS ARE TRUSTED ADVISORS TO GUIDE CUSTOMERS’ JOURNEYS TO MULTI-CLOUD, ENABLING DIGITAL INNOVATION WITH ENTERPRISE CONTROL. Work with a VMware Partner Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers. Become a Partner Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers. LEARN MORE PARTNERS With thousands of partners worldwide, we are positioned to help customers scale their business, drive innovation and transform their customer experience. Working Together with Partners for Customer Success See how we work with a global partner to help companies prepare for multi-cloud. VIEW PARTNER STORY SOLUTIONS FOR CUSTOMERS Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner FOR PARTNERS Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and Selling Resources Partner Connect Login Partner Executive Edge Technology Partner Hub Work with VMware Ellipsis Products Trust Center VMWARE CLOUD TRUST CENTER Giving you the confidence to move at the speed of the cloud. Overview Security Privacy Compliance Resiliency FAQs Overview 1. Overview 2. Security 3. Privacy 4. Compliance 5. Resiliency 6. FAQs 7. SECURITY Operate with the confidence of security. View our commitment to keeping your data safe at rest and in transit for your cloud, hybrid, and on-premises deployments. LEARN MORE PRIVACY Stay in control. View our policies that let you decide how your data is accessed and used. LEARN MORE COMPLIANCE Realize extensive compliance in every region. View our comprehensive list of compliance standards and regulations. LEARN MORE RESILIENCY Stay informed on the status of your solutions. Access a transparent view of global product and service availability. LEARN MORE WHY VMWARE CLOUD SECURITY? Cloud, hybrid or on-premise – your security is our priority. EXTENSIVE SECURITY EXPERIENCE From government and defense, to the largest data centers in the world, VMware has a long history as a trusted partner in the most sensitive environments around the world. Now we’ve expanded this reputation to our cloud offerings. BUILT-IN COMPLIANCE VMware builds security into the foundations of every one of our cloud solutions. This means our offerings align with major compliance certifications to maintain standards that meet industry best-practices. ACCELERATE WITHOUT COMPROMISE Whether migrating to the cloud, building modern apps, scaling your data center or automating multi-cloud operations, move with agility and confidence. Discover more information on security specific to each VMware Cloud Service VMware participates at the Cloud Security Alliance (CSA) STAR Level 1 by completing the Consensus Assessments Initiative Questionnaire (CAIQ) to document compliance with the Cloud Controls Matrix (CCM). STAR Self-Assessments are updated annually. You can view the CAIQ documents for VMware Cloud Services here. VMWARE CLOUD SECURITY CAPABILITIES SOFTWARE SECURITY With world-class security partnerships and an industry-leading Security Development Lifecycle process, VMware ensures Cloud operational and security controls are aligned with industry benchmarks and best-practices. DATA SECURITY VMware maintains stringent data protection standards, to ensure appropriate handling at every classification level, from processing and storage to transmission and destruction of data. Data in the cloud is a shared responsibility, and we define controls to ensure ownership and stewardship of customer organizational data remains with the customer. NETWORK SECURITY VMware Cloud solutions build on top of the base network security provided by our IaaS partners. Network environments are logically separated and protected by firewalls to safeguard business security requirements and ensure appropriate protection and isolation. IDENTITY AND ACCESS MANAGEMENT Based on the principle of least privilege, VMware cloud solutions use identity and access management controls, ensuring the appropriate level of access for all personnel to keep your data and systems safe and secure. VULNERABILITY AND PATCH MANAGEMENT The VMware comprehensive vulnerability management program includes third-party vulnerability scanning and penetration testing across network, application and local operating system layers, helping you stay ahead of new and emerging gaps in security. OPERATIONS MANAGEMENT VMware Cloud solutions continuously collect and monitor environment logs correlated with both public and private threat feeds, to spot suspicious and unusual activities. This is supported by continuously updated contact with industry bodies, risk and compliance organizations, local authorities, and regulatory bodies to ensure new threats are apprehended rapidly. RELATED RESOURCES SECURITY MEASURES IN VMWARE TANZU MISSION CONTROL Discover how VMware Tanzu Mission Control approaches security and implements security measures. LEARN MORE HORIZON SERVICE CLOUD SECURITY OVERVIEW Learn more about the security controls implemented in the cloud connected components of Horizon Service. LEARN MORE VMWARE SECURITY BLOG Make sure your enterprise is secure with the latest trends, tips and technology from VMware’s security leaders and experts. LEARN MORE INFORMATION SECURITY MANAGEMENT AT VMWARE Discover key elements of information security policies at VMware LEARN MORE INFORMATION SECURITY POLICY ATTESTATION Discover more about which industry standards our information security policies are aligned with as well as our policy review schedule. LEARN MORE HOW WE PROTECT DATA WE PROCESS AS A BUSINESS Transparency on how we collect, use, disclose, transfer and store personal information. HOW WE PROTECT DATA WE PROCESS AS A BUSINESS Transparency on how we collect, use, disclose, transfer and store personal information. Products and Services Notice Privacy Notice Cookie Notice Additional Notices Products and Services Notice 1. Products and Services Notice 2. Privacy Notice 3. Cookie Notice 4. Additional Notices PRODUCTS AND SERVICES NOTICE Applies to the personal information VMware collects and uses in connection with your use of VMware products and services, including: * Cookies and similar tracking technologies we may use when providing the products or services. * Data we collect to improve our products and services and your customer experience. Details regarding VMware’s customer experience improvement and analytics programs relating to VMware products and service can be found here. VIEW NOW PRIVACY NOTICE Addresses the personal information we collect when you: * Visit, interact with or use any of our websites, social media pages, mobile apps (where linked to the Privacy Notice), online advertisements, marketing communications. * Visit, interact with or use any of our events, sales, marketing and other offline activities. * Purchase VMware products and services and provide account-related personal information. VIEW NOW COOKIE NOTICE Addresses how VMware uses cookies and similar tracking technologies when you use and interact with our websites and our online properties. VIEW NOW ADDITIONAL NOTICES VMware may have additional privacy notices for specific websites, events, mobile apps, including "just-in-time" disclosures and in-product privacy notices. These notices may supplement or clarify VMware's privacy practices or may provide additional choices about how VMware processes data. VIEW ADDITIONAL NOTICES HOW WE PROTECT DATA AS A SERVICE PROVIDER Enabling you to comply with data protection and privacy requirements. PROCESSING OF CUSTOMER CONTENT VMware processes, stores and hosts content you or your end users have uploaded to VMware services as “Customer Content” (as defined in the VMware Terms of Service or other relevant agreement). VMware processes personal data contained within Customer Content as a “service provider” or “processor” acting on your instruction. View our FAQs for more information. DATA PROCESSING ADDENDUM VMware’s obligations and commitments as a data processor are set forth in VMware’s Data Processing Addendum (DPA). Our DPA Summary Coversheet offers additional context and outlines the applicability of our DPA. VMware processes personal data contained within Customer Content in accordance with this DPA and the applicable agreements. Standard agreements for each product and service can be found on our End User Terms and Conditions. BINDING CORPORATE RULES VMware has achieved Binding Corporate Rules (BCR) as a processor, acknowledging we have met the standards of the EU General Data Protection Regulation for international transfers of personal data contained in Customer Content. VIEW VMWARE BCR VIEW EU COMMISION BCR LISTING SUB-PROCESSORS VMware may use third-party companies to provide certain services on its behalf. Third party service providers who process personal data contained in Customer Content (sub-processors), will have written agreements and data transfer mechanisms in place to protect personal data in the manner set forth in the Data Processing Addendum. VIEW VMWARE SUB-PROCESSORS NOTIFY ME OF UPDATES TO LIST VMWARE CLOUD SECURITY VMware has programs, policies, and practices to ensure personal data contained in Customer Content is adequately protected (including regular training and confidentiality agreements for employees handling data), and to help identify, prevent and resolve security vulnerabilities in our products and services. These programs are continually reviewed and updated. LEARN ABOUT VMWARE SECURITY LEARN ABOUT VMWARE COMPLIANCE UNIFIED ENDPOINT MANAGEMENT VMware offers solutions that enable you to protect your organization’s information and systems, accessed and made available through corporate owned or personal devices, using management controls. View information on Workspace ONE’s privacy and security program and disclosure relating to data collected and used by the service. WORKSPACE ONE PRIVACY WORKSPACE ONE DISCLOSURE RELATED RESOURCES VMWARE CLOUD ON AWS PRIVACY Learn about who is responsible for personal data in VMware Cloud on AWS SDDCs and how VMware protects any data in its domain. READ DATASHEET VMWARE CLOUD DISASTER RECOVERY PRIVACY Discover how VMware processes and protects your personal data in connection with the VMware Cloud Disaster Recovery Service Offering READ DATASHEET VMWARE CLOUD WEB SECURITY PRIVACY Learn about the types of personal data collected by this secure web gateway and how VMware processes and protects it. READ DATASHEET CLOUDHEALTH BY VMWARE PRIVACY Discover how VMware processes and protects personal data on the trusted platform for optimizing multi-cloud environments. READ DATASHEET VMWARE CARBON BLACK CLOUD PRIVACY Learn about the types of personal data collected by this cloud native security solution and how VMware processes and protects it. READ DATASHEET VMWARE SD-WAN PRIVACY Learn about the types of personal data collected by this network overlay solution and VMware’s role in protecting it. READ DATASHEET VMWARE WORKSPACE ONE PRIVACY Learn about the types of personal data collected by this digital workspace platform and how VMware processes and protects it. READ DATASHEET VMWARE TANZU MISSION CONTROL Discover how VMware processes and protects your personal data in connection with the VMware Tanzu Mission Control Offering. READ DATASHEET VMWARE SECURE ACCESS Discover how VMware processes and protects personal data in the Secure Access hosted offering. READ DATASHEET VMWARE HORIZON PRIVACY Discover how VMware processes and protects your personal data in connection with the VMware Horizon Service. READ DATASHEET VMWARE TANZU SERVICE MESH PRIVACY Learn how VMware processes and protects your personal data in connection with VMware Tanzu Service Mesh. READ DATASHEET SEE ALL RESOURCES COLLAPSE RESOURCES MAINTAINING COMPLIANCE TOGETHER VMware continuously monitors existing and emerging security standards and requirements and integrates applicable requirements into our cloud service compliance programs. As VMware partners with you on enabling your compliance, you, as the customer, are required to ensure the Service Offering meets your compliance and regulatory obligations. If you have questions about compliance, we encourage you to discuss your business goals and objectives with your VMware Sales Representative. EXISTING CLOUD COMPLIANCE PROGRAMS Continually updated information on the compliance programs most relevant to you. For information on VMware Product Compliance click here. Filter by Region APJAmericasEMEAGlobal Filter by Service CerberusCloudgateCloud Partner NavigatorCloud ServiceCloudHealth by VMwareCloudHealth Secure StateCSEP/VDPHorizon Cloud ServiceLastlineNSX Advanced Load BalancerNSX Threat Intelligence CloudTanzu Observability by WavefrontVMware App LaunchpadVMware Carbon Black CloudVMware Carbon Black Hosted EDRVMware Cloud Director ServiceVMware Cloud Disaster RecoveryVMware Cloud On AWSVMware Cloud on AWS GovCloud (US)VMware Cloud on Dell EMCVMware Edge Network IntelligenceVMware Global Cloud ServicesVMware HCXVMware Lab PlatformVMware Pivotal TrackerVMware SD-WANVMware SD-WAN for GovCloudVMware Secure AccessVMware Secure Access Service EdgeVMware Site Recovery (VSR)VMware SkylineVMware Tanzu Mission ControlVMware Tanzu Service MeshVMware vRealize AI CloudVMware vRealize Automation CloudVMware vRealize Log Insight CloudVMware vRealize Network Insight CloudVMware vRealize Operations CloudVMware vRealize Cloud Subscription ManagerVMware vRealize Suite Lifecycle ManagerWorkspace ONE AccessWorkspace ONE AssistWorkspace ONE IntelligenceWorkspace ONE UEMVMware vSphere Advantage * CSA Cloud Security Alliance Controls Region: Global Alignment/Framework * Cyber Essentials Plus UK Government Information Assurance Framework Region: EMEA Certification/Attestation * DoD CC SRG Department of Defense Security Requirements Region: Americas Certification/Attestation * FedRAMP US Government Cloud Data Standards Region: Americas Certification/Attestation * G-Cloud UK Government Initiative for Procurement of Cloud Services Region: EMEA Certification/Attestation * IRAP Australian Cyber Security Centre Framework Region: APJ Certification/Attestation * ISMAP Japan Information Systems Security Management Program Region: APJ Certification/Attestation * ISO 27001 Security Standard for Information Security Management Region: Global Certification/Attestation * ISO 27017 Security Standard for Cloud Service Providers Region: Global Certification/Attestation * ISO 27018 Security Standard for Protection of PII Region: Global Certification/Attestation * MTCS Singapore Multi-Tier Cloud Security Standard Region: APJ Certification/Attestation * OSPAR Singapore Outsourced Service Provider Auditor Report Region: APJ Certification/Attestation * PCI-DSS Security Standard for Protection of Payment Card Data Region: Global Certification/Attestation * SOC 2 System and Organizational Controls for Service Organizations Region: Global Certification/Attestation * SOC 3 System and Organizational Controls for Service Organizations Region: Global Certification/Attestation ADDITIONAL COMPLIANCE INFORMATION Thank you for your interest in compliance at VMware. Please contact your VMware Sales Representative if you need additional information about our compliance programs. Your sales representative can also assist you in gaining access to compliance reports not available for immediate download. SERVICE STATUS VMware Cloud on AWS (4) VMware vRealize (4) Workspace ONE (EUC) (4) VMware Horizon Cloud (2) VMware Tanzu (4) Hybrid Cloud Extension (HCX) (1) VMware Cloud Director service (1) VMware Skyline (1) VMware Lab Platform (1) CloudHealth by VMware (2) VMware SD-WAN by VeloCloud (1) VMware Cloud Marketplace (1) Cloud Partner Navigator (1) VMware AppDefense (1) VMware vSphere Advantage (1) SERVICE LOCATION US East (9) US West (21) US Central (2) Singapore (4) United Kingdom (9) France (3) India (4) South Korea (2) Brazil (2) Germany (9) Ireland (5) Japan (9) Canada (6) Australia (9) Hong Kong (2) Netherlands (2) Sweden (1) Switzerland (1) South Africa (1) Philippines (1) SERVICE STATUS * SERVICE VMWARE CLOUD ON AWS CHECK STATUS * SERVICE VMWARE CLOUD ON AWS GOVCLOUD CHECK STATUS * SERVICE VMWARE CLOUD ON AWS SDDC CHECK STATUS * SERVICE VMWARE CLOUD ON DELL EMC CHECK STATUS * SERVICE VMWARE VREALIZE AUTOMATION CLOUD CHECK STATUS * SERVICE VMWARE VREALIZE NETWORK INSIGHT CLOUD CHECK STATUS * SERVICE VMWARE VREALIZE LOG INSIGHT CLOUD CHECK STATUS * SERVICE VMWARE VREALIZE OPERATIONS CLOUD CHECK STATUS * SERVICE WORKSPACE ONE ACCESS CHECK STATUS * SERVICE WORKSPACE ONE UEM CHECK STATUS * SERVICE WORKSPACE ONE INTELLIGENCE CHECK STATUS * SERVICE WORKSPACE ONE ASSIST CHECK STATUS * SERVICE HORIZON CLOUD SERVICE ON IBM CLOUD CHECK STATUS * SERVICE HORIZON CLOUD CONTROL PLANE CHECK STATUS * SERVICE TANZU MISSION CONTROL CHECK STATUS * SERVICE TANZU SERVICE MESH CHECK STATUS * SERVICE TANZU APPLICATION CATALOG CHECK STATUS * SERVICE TANZU OBSERVABILITY BY WAVEFRONT CHECK STATUS * SERVICE VMWARE SD-WAN BY VELOCLOUD CHECK STATUS * SERVICE VMWARE LAB PLATFORM CHECK STATUS * SERVICE CLOUDHEALTH BY VMWARE CHECK STATUS * SERVICE CLOUDHEALTH SECURE STATE CHECK STATUS * SERVICE VMWARE HYBRID CLOUD EXTENSION (HCX) CHECK STATUS * SERVICE VMWARE CLOUD DIRECTOR SERVICE CHECK STATUS * SERVICE VMWARE SKYLINE CHECK STATUS * SERVICE VMWARE CLOUD MARKETPLACE CHECK STATUS * SERVICE CLOUD PARTNER NAVIGATOR CHECK STATUS * SERVICE VMWARE APPDEFENSE CHECK STATUS * SERVICE VMWARE VSPHERE ADVANTAGE CHECK STATUS Load More FREQUENTLY ASKED QUESTIONS TRUST CENTER I have more questions on Security, Compliance, Privacy & Resiliency, who do I contact? For more information related to VMware Cloud Trust Center, we encourage you to reach out to your VMware Sales Representative. Your representative will be able to obtain the information to best support your request. Is there a partner led service that has completed IRAP assessment? Yes, please visit here. PRIVACY Your Content: What is Your/Customer Content? “Your Content” or “Customer Content” is any content you, as a customer, upload into a Service Offering as further defined in your agreement with VMware (e.g. VMware Terms of Service). This includes all text, sound, video, or image files, and software (including machine images), or other information that you or any of your end users upload into the Service Offering for processing, storage, or hosting in connection with your account with us. For example, Customer Content includes data that you or your end users store in Workspace ONE. Importantly, your account information, including names, usernames, phone numbers, and billing information associated with your account, is not included in the definition of “Customer Content”, nor any information we collect in connection with your use of our Service Offerings. Rather, VMware will handle that information in accordance with our Privacy Notice. Ownership of Your Content: Who owns Your/Customer Content? You always retain ownership of your Customer Content. You determine which VMware Service Offerings you would like to use in processing, storing, and hosting Customer Content, and what information you upload into the Service Offering as Customer Content. Also, we will not access or use your Customer Content for any purpose except as necessary to provide the Service Offering to you and as set forth and permitted in our VMware Terms of Service with you. Lastly, we do not use Customer Content for marketing or advertising. Court Orders: What happens if VMware receives a court order or legal request for Customer Content? VMware makes the following contractual commitments regarding how it will handle subpoenas, court orders, agency actions or other legal or regulatory requirements to disclose any customer's Content, as set forth in the "Required Disclosure" section of the Terms of Service: Where customer notification is not legally prohibited, VMware will: - Notify the Customer: Notify its customers of any demand for disclosure of customer's content. - Refer Government Agency to the Customer: Inform the relevant government authority that VMware is a service provider acting on the customer's behalf and all requests for access to customer's content should be directed in writing to the contact person the customer has identified to us, or the customer's legal department. - Limit Access: Only provide access to customer's content with the customer's authorization. If the customer requests, we will, at the customer's expense, take reasonable steps to contest any demand. In the event VMware is legally prohibited from notifying the customer, VMware will: - Evaluate Legal Validity: VMware will evaluate the demand for disclosure to determine whether it is legally valid and binding. - Challenge Unlawful Requests: VMware will challenge the order if it reasonably believes the order does not comply with the applicable law. - Limit Scope of Disclosure: VMware will limit the scope of any disclosure to only the information we are required to disclose and will disclose the information in accordance with applicable law. Government Access Requests: How does VMware handle government access requests for Customer Content and any Personal Data contained therein? VMware is committed to protecting its customers’ Content while complying with applicable law, and accordingly, VMware has made commitments in its VMware Terms of Service (Required Disclosures) and Binding Corporate Rules (BCRs) Processor Policy regarding how VMware will respond to government access requests, as further detailed below. VMware has prepared VMware’s Principles for Handling Government Requests to Access Customer Content to assist customers in further understanding VMware’s commitments and processes for handling government access requests, including commitments set forth in VMware’s BCR’s. VMware specifically makes the following contractual commitments regarding how it will handle government access requests, as set forth in the ‘Required Disclosure” section of the VMware Terms of Service: Where customer notification is not legally prohibited, VMware will: - Notify the Customer: Notify its customers of any demand for disclosure of customer’s content. - Refer Government Agency to the Customer: Inform the relevant government authority that VMware is a service provider acting on the customer’s behalf and all requests for access to customer’s content should be directed in writing to the contact person the customer has identified to us, or the customer’s legal department. - Limit Access: Only provide access to customer’s content with the customer’s authorization. If the customer requests, we will, at the customer’s expense, take reasonable steps to contest any demand. In the event VMware is legally prohibited from notifying the customer, VMware will: - Evaluate Legal Validity: VMware will evaluate the demand for disclosure to determine whether it is legally valid and binding. - Challenge Unlawful Requests: VMware will challenge the order if it reasonably believes the order does not comply with applicable law. - Limit Scope of Disclosure: VMware will limit the scope of any disclosure to only the information we are required to disclose and will disclose the information in accordance with applicable law. In no event will VMware disclose any Personal Data in a massive, disproportionate, and indiscriminate manner that goes beyond what is necessary in a democratic society. Further, following the decision of the European Union Court of Justice (ECJ) in Data Protection Commissioner v. Facebook Ireland and Maximillian Schrems, Case C-311/18 (Schrems II), VMware has prepared the VMware Statement regarding application of FISA Section 702 and Executive Order 12333 in view of Schrems II to address concerns about U.S. intelligence agencies having access to data transiting from the EU to the U.S. and to assist customers in understanding the likely application of two U.S. authorities: Executive Order (EO)12333 and the Foreign Intelligence Surveillance Act (FISA) Section 702. VMware strongly believes there is a low likelihood that it would be subject to Section 702 or EO 12333 in relation to its provision of the service offerings given the nature of the services it provides. VMware is a global company and is subject to global laws. The list of countries where Personal Data contained in Customer Content is processed in relation to a specific Service Offering are set forth in the applicable Sub-processor list(s), identified here. VMware is not aware of any applicable law that would impinge on its ability to comply with its commitments relating to government access requests and required disclosures as set forth in the VMware Terms of Service. Has VMware received any Law Enforcement Information Requests? VMware recently published its VMware Transparency and Law Enforcement Report. To access the Report, please click here. Data Transfer Strategy: What mechanism has VMware implemented to ensure appropriate safeguards for the transfer of personal data outside of EEA, Switzerland and UK where VMware is acting as a processor? In connection with the provision of VMware services to a customer, VMware may transfer Personal Data included in Customer Content (as such terms are defined in the VMware Data Processing Addendum from the European Economic Area ("EEA"), Switzerland and UK to third countries in its capacity as a processor. The General Data Protection Regulation ("GDPR") has been incorporated into UK's domestic legislation, and therefore the data transfer mechanism permitted under the GDPR for transfers of personal data outside the EEA will also apply to transfers from the UK. Regarding Switzerland, the Federal Act on Data Protection ("FADP") follows a similar framework as the GDPR and therefore, the same data transfer mechanisms apply to transfers from Switzerland (with the necessary amendments to account for any differences). Recipients or importers of customer's Personal Data include the entities in the VMware Group and select third-party vendors we engage who process Personal Data on our behalf to provide our services (“Sub-Processors”). A list of the entities in the VMware Group and Sub-Processors we use to process our customers’ Personal Data in connection with our service offerings and customer support, along with details of their location, are available here. Intra-Group Transfers: Whenever VMware, acting as a processor, shares Personal Data originating in the EEA, it will do so on the basis of its Irish Data Protection Commissioner and peer approved binding corporate rules known as the VMware Binding Corporate Rules ("VMware's EEA BCRs") which establish adequate protection of such Personal Data and are legally binding on the VMware Group. VMware's BCRs were approved by the European Data Protection Authorities on May 23, 2018. You can review confirmation that this review has now been completed here. For additional information on VMware’s Binding Corporate Rules and to access VMware's EEA BCRs Processor Policy, see VMware's Processor Binding Corporate Rules. To see a listing of the VMware affiliates that have signed an Intra-Group Agreement for VMware's EEA BCRs, click here. For further information, click here. VMware’s application for Binding Corporate Rules in the UK ("VMware's UK BCR’s") is currently pending, and VMware’s Data Processing Addendum will be updated when the UK BCRs take effect. See FAQ “What is VMware data transfer strategy in light of Brexit?” for more information. Transfers to Third-Party Sub-Processors: VMware has in place Data Processing Agreements (DPAs) with its Sub-Processors which incorporate the current version of the Controller to Processor SCCs to ensure safe, secure, and legal data transfers from the EEA, Switzerland and UK and to protect any subsequent onward transfers. The European Commission has published a new draft version of the SCCs available here. Once the new SCCs are approved and take effect, VMware will take such necessary steps to implement such new SCCs with its Sub-Processors in accordance with any new requirements established by the European Commission. Brexit: What is VMware's data transfer strategy in light of Brexit? VMware has prepared an FAQ “Brexit and International Data Transfers”, available here, to address concerns from customers regarding VMware's data transfer strategy in light of Brexit, and specifically the use of binding corporate rules (BCRs) and standard contractual clauses (SCCs). For additional information regarding the mechanisms VMware has implemented to ensure appropriate safeguards for the transfer of personal data, see FAQ “What mechanism has VMware implemented to ensure appropriate safeguards for the transfer of personal data outside of the EEA, Switzerland and UK where VMware is acting as a processor?” Customer Security Obligations: What obligations do you have as a customer in securing your Customer Content? Security of our Service Offerings is of the upmost importance to VMware. For a list of the security measures deployed in connection with our Service Offerings, see the Trust Center Security page. In your use of the Service Offerings, you are responsible for configuring and implementing the necessary technical, organizational and administrative controls to enable you to comply with any laws applicable to your use of the Service Offering, which may depend on the types of data you choose to process using the Service Offering. Your responsibilities relating to the security of your Customer Content are set forth in the applicable agreement, and include (a) controlling access you provide to your users, (b) configuring the Service Offering appropriately, (c) ensuring the security of Customer Content while it is in transit to and from the Service Offering, (d) using encryption technology to protect Customer Content as you deem necessary, and (e) backing up Customer Content. VMware Security Controls: What does VMware do to protect the security of Customer Content? VMware maintains an information security management program that is aligned with the ISO 27001 standard (as applicable), which is reviewed at least annually to ensure appropriate controls, practices and procedures are in place. For a list of the security measures deployed in connection with our Service Offerings, see the Trust Center Security page. Sub-Processors: How does VMware engage and use third parties to perform services on its behalf in connection with the provision of VMware Service Offerings or Support & Subscription Services? VMware engages and uses third parties to perform services on its behalf in connection with the provision of VMware Service Offerings or Support & Subscription Services. See details provided here. In connection with the engagement of third-parties who process Personal Data as a Sub-processor (as those terms are defined in Data Processing Addendum), VMware has implemented the following processes and procedures: 1. Contractual Commitment and International Data Transfers: VMware enters into data processing agreements with all its Sub-processors which requires the Sub-processors to maintain proper privacy, security and confidentiality of Personal Data on terms which are substantially similar to the contractual commitments VMware makes to its own customers in the Data Processing Addendum. VMware relies on the EU Standard Contractual Clauses unless there is another legitimate data transfer mechanism in place and the Sub-processor makes appropriate contractual commitments. 2. Privacy Review Process and Privacy-by-Design: VMware has established a centralized end-to-end third-party vendor management process to onboard new suppliers, including initiating, conducting and tracking third-party privacy and security reviews using centralized tools to assist with its compliance efforts. The VMware Privacy Team conducts detailed privacy reviews of the services provided by Sub-processors, including determining the categories of Personal Data processed and the processing purposes. The reviews include the implementation of privacy controls for mitigating the risks associated with Sub-processors’ access to and processing of Personal Data and ensuring regulatory compliance. 3. Security Review Process: VMware maintains a policy and process for conducting security reviews of Sub-processors. The VMware Security Team conducts an initial security review of any new Sub-processor, and ongoing monitoring based on the identified security risk level. 4. List of Sub-Processors and Notification of New Sub-Processors: VMware maintains a list of the Sub-processors used by individual Service Offerings and in relation to the Support & Subscription Services. The list for each Service Offering can be accessed here. VMware provides prior notice to Customer of any new engagement of a Sub-processor if the Customer has subscribed to receive notification for a specific Service via the mechanisms provided by VMware. If you would like to receive new Sub-processor notifications, please go here, and enable notifications for the relevant Sub-processor list(s). Privacy Reviews: Does VMware conduct Privacy Reviews of its On-Premise Products and Service Offerings? VMware has implemented a privacy-by-design framework to ensure that its On-Premise Products and Service Offerings are designed in a manner which complies with applicable privacy principles and legal requirements. A privacy review process has been implemented in the design lifecycle of VMware’s On-Premise Products and Service Offerings, which includes documented instructions for submitting a product or service through a privacy review, designated legal counsel to conduct privacy reviews, data processing impact assessments (as may be required), and general privacy requirements for designing products/services in compliance with applicable data protection and privacy laws. Further, VMware has established a centralized end-to-end third-party vendor management process to onboard new suppliers, including initiating, conducting and tracking third-party privacy and security reviews using centralized tools to assist with its compliance efforts. The VMware Privacy Team conducts detailed privacy reviews of the services provided by Sub-processors, including determining the categories of Personal Data processed and the processing purposes. The reviews include the implementation of privacy controls for mitigating the risks associated with Sub-processors’ access to and processing of Personal Data and ensuring regulatory compliance. Data Protection Officer: Does VMware have a Data Protection Officer? VMware has a Data Protection Officer who is a lawyer and director of an external data protection consulting firm. The role of the DPO is described in Articles 38 and 39 of the GDPR. The DPO must be involved in all issues relating to the protection of personal data, advise the organization regarding its obligations under GDPR, monitor its compliance, provide advice regarding any data protection impact assessment, and be a point of contact for the supervisory authorities. The VMware Privacy Team engages VMware’s DPO as appropriate. To contact VMware’s DPO, please email dpo@vmware.com. The VMware Privacy Team will address the query and/or engage our DPO, as appropriate. EU General Data Protection Regulation: How does VMware comply with the GDPR? Under the EU General Data Protection Regulation (“GDPR”), VMware is the “processor” with respect to Customer Content. VMware’s obligations and commitments as a processor under GDPR are set forth in our Data Processing Addendum, and VMware will process personal data contained within Customer Content in accordance with the applicable agreement and the Data Processing Addendum. Further, VMware has achieved Binding Corporate Rules (“BCR”) approval for personal data it processes as a processor. A copy of VMware’s BCR is available here and evidence of VMware’s approval is available on the European Commission’s website. VMware GDPR Supplemental Measures Addendum: When does it apply and what changes does it introduce? VMware recently published the GDPR Supplemental Measures Addendum (the Addendum) in light of the Schrems II decision and the revised EU standard contractual clauses. To learn more, please click here. Schrems II Decision: What steps did VMware take in its capacity as a data processor in response to the Schrems II Decision of the Court of Justice of the European Union? VMware provides enterprise solutions which enable its customers to build, manage, secure and run applications across multiple systems and environments. Although VMware believes the nature of the Service Offerings it provides to its customers won’t generally warrant a direct government access request to Customer Content, VMware took the following steps to comply with the Schrems II ruling and to assist customers in their own compliance efforts in relation to data they process as a controller: Strengthened Contractual Commitments Regarding Government Access Requests VMware updated the ‘Required Disclosure’ section of its Terms of Service to clarify how VMware handles government access requests by adding the following commitments: Where customer notification is not legally prohibited, VMware will: - Notify the Customer: Notify its customers of any demand for disclosure of customer’s content. - Refer Government Agency to the Customer: Inform the relevant government authority that VMware is a service provider acting on the customer’s behalf and all requests for access to customer’s content should be directed in writing to the contact person the customer has identified to us, or the customer’s legal department. - Limit Access: Only provide access to customer’s content with the customer’s authorization. If the customer requests, we will, at the customer’s expense, take reasonable steps to contest any demand. In the event VMware is legally prohibited from notifying the customer, VMware will: - Evaluate Legal Validity: VMware will evaluate the demand for disclosure to determine whether it is legally valid and binding, - Challenge Unlawful Requests: VMware will challenge the order if it reasonably believes the order does not comply with applicable law. - Limit Scope of Disclosure: VMware will limit the scope of any disclosure to only the information we are required to disclose and will disclose the information in accordance with applicable law. Transparency Regarding Process for Handling Government Access Requests and US Authorities To assist customers in further understanding VMware’s commitments and process for handling government access requests, including commitments set forth in VMware’s BCR’s, VMware has prepared VMware Principles for Handling Government Requests to Access Customer Content. Further, VMware has prepared the VMware Statement regarding application of FISA Section 702 and Executive Order 12333 in view of Schrems II to address concerns about U.S. intelligence agencies having access to data transiting from the EU to the U.S. and to assist customers in understanding the likely application of two U.S. authorities: Executive Order (EO)12333 and the Foreign Intelligence Surveillance Act (FISA) Section 702. VMware strongly believes there is a low likelihood that it would be subject to Section 702 or EO 12333 in relation to its provision of the service offerings given the nature of the services it provides. Updated Contracts with Sub-Processors to Ensure Legal Basis for Transferring Personal Data Since the invalidation of the EU-U.S. Privacy Shield, VMware has implemented Standard Contractual Clauses with all of its Sub-processors who previously relied on the EU-US Privacy Shield as a data transfer mechanism. In its capacity as a data processor, VMware relies on Binding Corporate Rules to transfer Personal Data outside the EU in connection with the provision of the applicable VMware Service Offerings as set forth in VMware’s Data Processing Addendum. Additional information on VMware’s BCR’s can be found here and on the VMware Trust Center. Technical and Organizational Measures VMware confirms its commitment to implement and maintain appropriate technical and organizational measures as set forth in VMware’s Data Processing Addendum. VMware’s Trust Center website outlines the third-party certifications and audits VMware maintains in relation to its Service Offerings. Given the nature of the VMware Service Offerings, customers also have control over how they configure the Service Offerings, and can implement any necessary administrative and technical controls as required to protect the data that is processed in connection with their use of the applicable Service Offering. In many instances, VMware provides both on-premise and hosted solutions for customers to choose from when managing their systems and infrastructure. Transparency Regarding the Types of Data processed by VMware Service – Datasheets The European Data Protection Board (EDPB) in its FAQs on “Schrems II" outlined that it is necessary to consider the types of data transferred as one factor in making a determination whether there is an adequate level of protection surrounding the transfer of personal data outside the EU, and that controllers should conduct a case-by-case analysis to determine the risks posed by such transfer. To assist customers in understanding the types of data processed in connection with their use of VMware Service Offerings, VMware provides Service Descriptions for each Service Offering available here, and makes available datasheets for certain Service Offerings in the Privacy section of the VMware Trust Center. For Workspace One Service Offerings, VMware also makes available the Workspace One Disclosure. Transfer Impact Assessments: Does VMware conduct Transfer Impact Assessments? In light of the “Schrems II” ruling of the Court of Justice for the European Union and the recommendations from the European Data Protection Board, VMware conducts transfer impact assessments (TIAs) on personal data transferred from the EEA, UK and Switzerland to third countries which have not been granted adequacy status. VMware has developed an internal process for conducting TIAs which follows The European Data Protection Board (EDPB) guidance and the UK Information Commissioner’s Office’s International Transfer Risk Assessment and Tool. This includes undertaking a country level analysis, gathering additional information from our vendors to assess government access, and conducting TIAs as part of the privacy reviews for our products and services, third-party sub-processors and corporate functions. For more information, see our FAQ on TIAs available here. The following resources (available on the VMware Trust Center) provide additional information on VMware’s response to the Schrems II, how VMware handles government access requests, and the likelihood of such requests. * FAQ on VMware’s response to Schrems II * FAQ on VMware’s GDPR Supplemental Measures Addendum * VMware Principles for Handling Government Requests to Access Customer Content * VMware Statement regarding application of FISA Section 702 and Executive Order 12333 in view of Schrems II California Consumer Privacy Act: How does the California Consumer Privacy Act (“CCPA”) apply to VMware’s provision of the services? The California Consumer Privacy Act (“CCPA”) applies to businesses that provide services to consumers in California. It gives individuals certain rights regarding the processing of their personal data. Under the CCPA, VMware acts as a ‘service provider’ of the customer in connection with the processing of personal data contained within customer content. VMware will not access or use such personal data for any purpose except as necessary to provide the services to the customer as set forth in the applicable agreement, and will assist the customer in responding to data subject access requests under the CCPA as set forth in our Data Processing Addendum. Where VMware acts as a ‘business’ under CCPA, VMware’s California Privacy Notice and other Privacy Notices provide details regarding how VMware handles such personal information as a business, including any required disclosures pertaining to the categories of data collected and used, and the sale of personal information. For more detailed information regarding the applicability of the CCPA to VMware’s provision of the services, click here. READY TO GET STARTED? CONTACT US Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide End User Terms & Conditions California Transparency Act Statement Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2022 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Site Map Trademarks Glossary Help Feedback Cookie Settings We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookie Settings Accept All Cookies COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1