Data Protection And Privacy
Your privacy is essential for our company. Data Solutions commits to protect and preserve your privacy as well as confidentiality of your data, both business and private.
Privacy and confidentiality of data is primarily protected by law. Data Solutions provides to its clients a range of additional mechanisms formed to their specific needs. The most important is Data Confidentiality Agreement. This agreement could be signed with any client, any time. In each case Data Solutions Laboratory acts as if this agreement has been signed and verified.
Even though many eminent individuals and companies have already shown trust to our Laboratory, we fully understand the need for detailed display of security mode and level of confidentiality.
Application of safety procedures and data protection starts with media reception in security in the premises of our company or an authorized representative. Operational methods are applied up to 5 days after the client take over the data and devices and confirm the correctness of the data and complete the work. 5 days after taking over all data are being destroyed from disks in the Laboratory applying DoD methods.
Every serious company that is engaged in data recovery respects strict methods of protecting the data of its clients. We business on the Serbian market since 2003, thousands of disks have passed through our Laboratory so far. There is no such thing as “accidental” loss of client’s data or devices in data recovery business. We simply won’t allow that to happen.
- Customer data are protected within the company as follows:
- Authorization within the Laboratory
- Physical protection
- Encryption
- Destruction
Only our lab technicians have access to data and only they are responsible for the authenticity and consistency of customer data. As the only local company in this field, Data Solutions Laboratory since its incorporation has been providing services to many companies, banks and institutions. You may find reference list of some customer that put their trust in us.
We are the first and only company in this region dealing in computer forensics. As the only full-service provider (data recovery and computer forensics) in this field, our experts have been participating in numerous investigation procedures.
If the above said is not detailed enough for you, please download our Personal Protection Policy and Data Protection Policy.
RECOMMENDED
Transcend StoreJet 1TB USB 3.0
19.08.2015.TRANSCEND STOREJET (USB 3.0) – SHOCK RESISTANT?! GENERAL CHARACTERISTICS: Brand (Manufacturer): Transcend Model: 25H3P Capacity: 500GB, 750GB, 1TB, 1,5TB Interface: USB 2.0/3.0 Data transfer rate: USB 2.0 – do 480Mb/s USB 3.0 – do 5Gb/s Dimensions: 130.8 x 80.8 x 21.7 mm Weight: 216g (500GB/750GB/1TB) 256g (1.5TB) Price: from 7.000RSD (500GB) from 8.000RSD (750GB) from […]
more >>The latest from the blog
28.09.2015.Forensic specialists may encounter different protection systems for data access. The most common and simple system of protection is compressing archives by a password. At present, ZIP and RAR are two most commonly used archive managers. Russian archive manager (RAR) has a stronger encryption mechanism (AES-128 standard) which implies 128 bits encryption. This archive manger […]
more >>