96% of users recommend Help Desk Migration Service. Learn why in our brand new G2 Report.

Security Policy

This page outlines the security measures and principles our team applies,
so you could safely migrate your data.

Overview of Help Desk Migration Security

Jun 28, 2018, version 2

Your help desk and private data are safe with Help Desk Migration. There are a number of steps we take to ensure and respect your privacy.

However, the measures we take to provide our clients and the visitors of our website a safe experience are not tied to just legal requirements (such as the General Data Protection Regulation, etc.) We believe we have a moral and ethical obligation to safeguard privacy.

Security Levels

Physical Security

Our data centers are located in Germany. Our hosting provider, Hetzner Online takes superior measures that provide physical safety of the hardware.

For instance, data center parks are protected from fire and natural disasters. Only authorized personnel can access via electronic access control terminals with a transponder key or admission card. Data parks are under 24/7 surveillance and are equipped with diesel power generators for autonomous mode.

Network Security

Help Desk Migration network security team protects your data against the most sophisticated electronic attacks. We use the best and proven practices of network security.

Help Desk Migration offers the following preventive measures:

  • Network firewalls;
  • DDoS preventions;
  • Network posture assessment.

Application Security Layer

  • Firewalls are in place exposing only the necessary ports through the internet and between different servers.
  • We validate all requests to ensure the security on the application level.
  • Help Desk Migration transmits data from the visitor's browser to our system using HTTPS.

The data in transfer is encrypted by SSL protocol and ciphers.

Data location

All data Help Desk Migration collects is stored electronically in Germany on the Hetzer Online data center. The data can only be accessed by an authorized staff of Help Desk Migration. No outside sources are allowed to connect to the database.

Security Audits

On a regular basis, we scan all systems to prevent any vulnerabilities. The software is constantly updated, so all connections to the previous version are limited, logged and checked.

We absolutely comply with your confidentiality and guarantee that all your help desk data is 100% secure before, during, and after migration procedure. We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.

Data access and authentication

Only authorized tech engineers at Help Desk Migration have access to the source code, can work on custom migrations and solve support cases on demand of the support staff. Different engineers have different access rights depending on their job requirements. All engineers have their own credentials as well as some parts of the software can only be reached from specific IPs.

Why does Help Desk Migration need specific permissions to perform the migration?

Help Desk Migration asks for these permissions to connect with your current and new help desk systems. After establishing the connection, we can access and transition the data. Without these permissions the help desk migration is impossible.

Certification & Compliance


Help Desk Migration is compliant with the requirements of the General Data Protection Regulation. You can learn more information by visiting this page.

ISO/IEC 27001:2013

Help Desk Migration datacenters are compliant with ISO/IEC 27001:2013 since our hosting provider, Hetzner Online, has achieved this certificate.


Help Desk Migration uses 2Checkout and PayPro to accept payments. Both providers are certified PCI Level 1 Service Providers, the most stringent level of certification available in the payments industry. You can verify this by checking 2checkout’s fraud protection policy and PayPro’s compliance page.

Note, that we do not store or process any of your payment data.

How to report a security vulnerability?

If you believe you’ve found a security vulnerability in our data migration tool, please contact us at support@help-desk-migration.com. Also, include the following to help investigate the case:

  • Description of the location and potential impact of the vulnerability;
  • A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and screen captures are all helpful to us).

Need more details or have any questions?

If you have any questions or suggestions, please send them to support@help-desk-migration.com.

Book a Call
— %s