A minimum list of requirements that any data-security solution should meet:
- Must be fully automated, requiring effectively no user intervention, yet be as user-friendly as possible.
- Must not require an unacceptably long period of operation.
- Must ensure no critical data remain on the device.
- Must guarantee complete recovery of appropriate data whenever and wherever required.
- Must ensure that no data can ever be accessed by a third party.
- Must not rely on Wi-Fi connectivity nor permit possible corruption of data.
Personal data held by a second party must never be able to fall into the possession of a third
party
without the express permission of the original person(s) to whom the data relate.
CyberStor meets all the above requirements and more.