Collaboration among distributed teams and with international partners is key to your business growth. However, it may also create risks for data protection which, under GDPR, you are required to assess and minimize. Protecting your organization’s business communications through Wickr Pro can make your collaboration easy and compliant with GDPR.

Private by design and by default

When you launch your own private communications network on Wickr Pro, you are in full control of any and all valuable information. Wickr never has access to your communications, serving de facto as a secure black box for your business content. Your conversations and files do not touch Wickr servers unencrypted and aren't stored server-side. When audited for compliance, your secure collaboration service should fall out of the audit scope, making the process easier for your organization.

End-to-end security

All applicable security measures outlined in GDPR are built into Wickr’s secure collaboration platform:

Encryption in transit and at rest

Wickr’s multilayered end-to-end encryption ensures the highest possible level of protection for all business communications that contain personal data (PHI/PII), rendering it inaccessible to anyone beyond authorized parties. This enables your company to invoke an exception to notifying users of a breach of such encrypted information. With Wickr, privacy is not just a promise, it is mathematically ensured.

Ability to ensure the ongoing confidentiality and integrity of data

Wickr enables your employees to verify and maintain the confidentiality and integrity of communications through the easy-to-use cryptographic key verification process within the platform.

Regular testing, assessment of the effectiveness of technical and organizational measures for ensuring the security of data

To validate our privacy and security assurances, Wickr undergoes the internal security testing in addition to engaging independent security teams and the open source community in auditing our source code.

Learn more about Wickr Security>>

Data minimization: in the cloud or in your own hosted environment

Wickr Pro does not record, collect, or retain any personal or sensitive information beyond what is necessary to provide service. In addition, all your business communications are ephemeral by design and by default to ensure that valuable communications content is only accessible for the necessary period of time and is destroyed when no longer needed. For these reasons, companies deploy Wickr's secure transport layer to enable reliable and private data transmission protecting support operations, deal workflow, payment processing, device-to-device communications (IoT), and other business transactions. 

Wickr’s global server infrastructure is designed to accommodate your GDPR compliance needs.  

Accountability and transparency

When shared via Wickr secure channels both internally or externally, your sensitive business data, including personal consumer information, is protected end to end and controlled by you. Through the Wickr Network Dashboard, you can manage security, policy, and compliance across your entire organization.


Video small.png

From its launch in 2012, Wickr has built all of its communications solutions private by design to empower our users to take complete control over their private communications – from beginning to end. As a team of security experts and privacy advocates, we have always believed that the most reliable path to protecting your personal and sensitive data from security compromise is to never have access to such content transmitted through Wickr networks and to ensure that data which is no longer needed is simply not retained. In recognition of our commitment to protecting user privacy and our transparency practices, Wickr has been repeatedly awarded an all-star rating by the Electronic Frontier Foundation. Learn more about Wickr’s privacy commitment >>

As you transform your data protection practices to fit the GDPR compliance requirements, consider Wickr Pro as part of your core GDPR solution. Switching your most important business communications to an end-to-end encrypted and ephemeral network makes your transition to GDPR-friendly operations easy and cost-effective.