- English
- Français
- Deutsch
- Contact us
- Docs
- Login
Active version 1.0 | Updated 03 September 2025
Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider performs a wipe on the data in accordance with NIST 800-88. This wipe is done immediately before reuse.
All projects, except those hosted on FR-3, utilize encrypted volumes. The encryption key is destroyed when the volume is released back to the provider, which adds another layer of protection.
Media destruction is handled via our backend providers. When the provider decommissions media it undergoes destruction as outlined in NIST 800-88.
Active version 1.0 | Updated 03 September 2025
Join our monthly newsletter
Compliant and validated