What causes data damage?

These are some common causes of data damage, but more often than not, we know neither what caused the data damage nor when the data damage occurred.

  1. Power surge or drop out. You will not see the lights dim or the screen flicker, but a little surge just trashed your hard drive. Have a good uninterruptible power supply for everything in your network that uses electricity.
  2. Computer crash or abnormal shut down. We know what happens when we trip over the power cord and the power goes down or when we suddenly we see the famous Blue Screen. Work with your IT professional(s) to create a stable network and train your users.
  3. Insufficient Resources. A Resource is anything that enables transfer of data within a computer or across a network. What is sufficient varies from second to second. Use more than the minimum system requirements; use the maximum when economical. Resources include:
    1. Random Access Memory (RAM) and Virtual Memory in the server and workstations.
    2. Clock Speed of the server and workstations.
    3. Network Interface Cards in the server and workstations.
    4. Switch or Router that receives data from the server and sends it to the workstations.
    5. Network Cables that connect the computers.
  4. Other causes. More often than not, we do not know what causes data damage and cannot trouble shoot the root cause.

Sign up for our EasyBiz Newsletter

Stay up to date with the latest payroll & HR trends

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.