Privacy and Security at A2Z VFX

Security & handling of client footage

Protecting your plates, project files, and metadata is core to how we work. Below is how we approach security and confidentiality from ingest through delivery—including options we can extend when your show or facility has extra requirements.

Compliance & NDA

We follow NDA and confidentiality terms end-to-end—from first ingest through archival or deletion per your contract. Where you supply a facility security checklist or vendor questionnaire, we complete it against our actual practices.

Data protection

To help protect your project data and any personal information we process from unauthorized access or misuse, we apply the following:

  • Role-based access. Information is available only to team members who need it to do their job on your show—no open directories or optional browsing of client material.
  • Security practices. We follow strong practices for cybersecurity, account access, and network hygiene, and we adjust tooling as risks and vendor guidance evolve.
  • Training & confidentiality. Staff are trained on data protection, client confidentiality, and production-specific rules when your facility or contract requires them.
  • Subprocessors & vendors. Where we use third-party services (for example cloud storage or transfer), we review their privacy and security posture and keep written confirmation aligned with how we actually use their tools.

Secure work environment

Work is performed on dedicated systems with full disk encryption enabled. Devices are password-protected and auto-locked, with active endpoint security to reduce risk from malware and unauthorized local access.

Access control

Project files are limited to authorized production staff on a need-to-know basis. Third-party or external access is not used unless you have explicitly approved it in writing (for example, a named vendor or client review portal).

Secure file transfer & storage

Footage lives in private, access-restricted storage. When we share files, we use expiring, secure links—not long-lived public URLs or open directories. We can align with your preferred studio transfer tools where required.

Encryption, backups & retention

Data is protected in transit and at rest with encryption appropriate to the pipeline in use. We maintain regular backups to guard against accidental loss, with retention scoped to project agreements.

Preview security

Review and approval renders can include watermarks (for example, show code, recipient identifier, or timestamp) when you need extra traceability for internal or client reviews.

No unauthorized sharing

Project media is not moved through consumer messaging apps, personal email, or other ad-hoc channels that bypass your agreed transfer path.

If you have specific security requirements, preferred transfer tools, or studio-mandated workflows, tell us during onboarding—we are happy to align with them.

We look forward to working together.

Contact us about security