Security and Data Remenance

Security and Data Remenance

At Cato Digital, customer trust is our top priority. Maintaining customer trust is an ongoing commitment. We strive to inform you of the privacy and data security policies, practices, and technologies we’ve put in place.

Ownership and Access

As a customer, you own your data, and you select which Cato Metal Services can process, store, and host your data. We do not access or use your data for any purpose, unless at your direction. We do not use your data or derive information from it for marketing or advertising.

For more details, see:

Data Remenance

After an instance is deregistered and returned to Cato, we go through a data remanence scrubbing process that involves multiple passes on the storage following industry standard practices (such as by DoD 5220 specification).

Because accessing data remnants after data has been erased requires physical access to the storage, when any storage media is at its end-of-life and is decommissioned from service we physically destroy the media.

Network Security

You provide all internet security for your instances. We recommend installing host IDS and firewalls to protect your hosts, such as using fail2ban.

Host Security

You are responsible for your operating system security. We recommend you keep services patched and updated as frequently as possible.

 
Cato Digital

Ready to get started?

View available application or storage servers. Get Started
Cato Digital ™, and © Cato Digital, inc  | Terms | Privacy