data security

A minimum list of requirements that any data-security solution should meet:


  • Must be fully automated, requiring effectively no user intervention, yet be as user-friendly as possible.
  • Must not require an unacceptably long period of operation.
  • Must ensure no critical data remain on the device.
  • Must guarantee complete recovery of appropriate data whenever and wherever required.
  • Must ensure that no data can ever be accessed by a third party.
  • Must not rely on Wi-Fi connectivity nor permit possible corruption of data.

 

Personal data held by a second party must never be able to fall into the possession of a third party
without the express permission of the original person(s) to whom the data relate.


CyberStor meets all the above requirements and more
.