Skip to main content

Archives data protection

Learn how your data security is ensured with a zero-trust, fully automated archiving process

Updated yesterday

At Ideals, your data's security is our highest priority. We apply a strict zero-trust approach when preparing archives, ensuring no employee can access your sensitive information at any stage.

USB archive process

Below you may find an overview of what happens after placing a USB archive order.

Automated archive creation

Once the order is submitted by the project administrator, our system automatically generates a password-protected archive of your data.

This process is entirely automated and secure – no employees have access to the data or the archive's password.

Recording to USB

Our dedicated Data Recording Team receives only the encrypted, password-protected archive.

The archive is securely copied to a USB drive that is protected from editing.

The team then verifies data integrity by checking that the checksum (a kind of digital fingerprint) of the archive matches between the system and the USB. It's done to ensure that the USB archive you receive is exactly what was generated, with no changes during transfer.

Secure password delivery

The password needed to decrypt the archive is never revealed to any employee.

Passwords and decryption instructions are sent automatically by email, directly to the USB package recipients and order submitter if needed.

Downloadable archive process

Same as with the USB drives, once the project administrator submits a request to create a downloadable archive, our system automatically generates a password-protected archive of your data.

Once the archive is ready, it can be found on the Archives page along with its password. The downloading and password are available only to the order submitter and archive recipients specified by the administrator.

Key takeaways

  • Employee data access: Ideals employees never view or access your unencrypted data or passwords at any stage.

  • Zero-trust architecture: the processes are automated and compartmentalized. No single person has end-to-end access.

  • End-to-end encryption: archives are password-protected as soon as they're created. Only specified recipients get the password.

Did this answer your question?