data confidentiality.

At Kotar Data Recovery, we are aware that in today’s world, privacy is
more important than ever.
Data security and confidentiality is and always has been, the biggest
priority within our company. Therefore, there is nothing more
important to us than keeping your data completely confidential and
secure.

We regularly work with customers who range from individuals and
businesses, from small to those listed on the Fortune 500, to
government agencies, hospitals, forensic companies, etc., all of whom
have highly sensitive data. We apply the same data safety policy and
implement the same security measures for every single data recovery
case. Sometimes, additional measures have to be taken to guarantee
that the customers' data is kept completely private and secure. In
special cases, we need to work with a company’s legal department to
address any specific needs they may have and possibly sign their
non-disclosure agreements.
We are willing to work within any reasonable requirements that may
need to be met so that our customers can rest assured that their data
will remain 100% secured and confidential throughout the recovery
process.

To keep your data safe, none of our data recovery servers are
networked in any way, which guarantees that there can not be a data
security breach within our network. This means none of your
information will ever be shared peer-to-peer or by network intrusion.

We have a strict non-disclosure agreement and all of our employees
comply with this agreement.

We also make sure that only the engineer working on your data recovery
case has access to your data during the data recovery process. You
don’t have to worry about them looking through your information
because we can not actually see your data. During most of the recovery
process, your drive is being imaged. During this imaging process, we
can view the layout of your data on your media. But since we work on
the low data level, this means that we actually can not see the data.
We can only see the sectors and the raw data associated with each
sector. We do not use a graphical user interface which would allow us
to view the information on a hard drive.

Once the imaging process is complete, we will know which areas of the
drive couldn’t be read. We will then make a final pass over those
unreadable areas to try and read as much data as possible. Then we
will tree up the directory to make sure that the file structure is
intact. After that is finished, we then mount the cloned disk to our
recovery server and begin transferring the image to the destination
drive that will be given to you. It's not until the end when we are
copying the data over to the destination drive, that only Robert Kotar
(the CEO and owner) has access to the data exclusively to verify that
the data has been successfully recovered. He may open a few files,
randomly spread out throughout the drive, just to make sure that the
files are indeed intact.

We hold on to the cloned copy until the customer confirms the
recovered data is ok. At that point, we securely and completely delete
all the data for safety and security purposes.

At Kotar Data Recovery, we have been successfully recovering data for
thousands of clients since 1999 with a strong commitment to security
and confidentiality. We greatly respect our clients' privacy and we
guarantee that your data will remain absolutely secure and
confidential throughout our data recovery process.

data confidentiality.jpg
Previous
Previous

data protection.

Next
Next

when do you need a data recovery specialist.