Products and Solutions
EMA®
 EMA® Mail
 EMA® Cyber Defense
 EMA® Print
 EMA® Scan
 EMA® File
 EMA® Voice
EMA® for SAP Solutions
 SAP Metadata
 SAP Live Migration
 SAP Scan
 S/4 HANA Relief
ARTEC SMART Integration Tools
 SMART Link
 API/SDK
Firegate VPN
eDiscovery Solutions
Case Management
VSTOR® Vault
 Product Details
 Object Storage
ARTEC Cloud Solutions
 Cloud Models
 Managed Services
 Microsoft 365
Topics
Advantages
Mailserver migration
Microsoft 365 tips
EMA® is Easy to Use
Data Formats
Protect Your Investment
Comprehensive Archiving
Storage Technology
Data Security Concept
Protection Against Cyber Attacks
Big Data - Knowledge is Power
Features
Overview
Software Architecture
Single Sign-On
Four-Eye-Principle
Folder Synchronization
Encryption
User Access
Full-Text Search
Backup and Recovery
ANA Server
Trusted EMA®
Hot Standby
Digital Signatures
Attributes and Metadata
Department archives/Linking
Federated Search
Retroactive Archiving
WAN Synchronization
EMA® DeDup Server
EMA® App
Outlook extension
Good to Know
Legally Compliant Archiving
Protecting Personal Information
Why WORM Is No Solution
Problems with certifications
Stubbing - (Not) A Solution
Who Uses EMA®?
Why Bother with Archiving
Benefits of an Appliance
Dealing with private e-mails
Laws and Regulations
Overview of the Most Important Regulations
General Data Protection Regulation (DSGVO)
Right to be "forgotten"
News
News
Events and Webinars
Press Releases
Press Review
Partners
Resellers
Distributors
Partner Program
Partner Portal
ARTEC Product Trainings
ARTEC Promotional Program
ARTEC Expert Network
Services & Support
Consulting Services
Technical Consulting
Software Development
Software Subscription & Warranty
Product Support
Downloads
About ARTEC
Company History
Visions
Green responsibility
Where to Find Us
Job Openings
Terms and Conditions
Protected Trademarks and Patents
References
Information for Investors
Privacy Policy
Corporate Information

WORM as an alternative for manipulation security?

When it comes to the topics of manipulation security and storage of sensitive information, WORM storage systems are still frequently recommended today. These are special storage media that can only be written to once. The approach sounds plausible at first glance. However, it contains some stumbling blocks in terms of data protection law. It is not only since the introduction of the DSGVO that corresponding specifications have made it necessary to be able to delete certain information from documents, PDFs, e-mails, chats or telephone calls if necessary.

This may be the case, for example, in the context of the "right to be forgotten" or in the case of private e-mails from employees. And this regardless of whether the information in question is on paper or digitally on a file server, laptop or in an archive. Requirements that are not technically feasible with pure WORM solutions.

Digital signature in combination with sophisticated storage technology

To protect against manipulation, it is therefore advisable to clearly identify archive data by means of digital signatures and to protect it by means of encryption. In this way, it can be technically ensured that the data is not changed unnoticed. In addition, to prevent careless deletion, this protection can be combined with "SOFTWORM technology". This allows you to easily comply with all legal regulations. However, it is recommended to be careful that this function is controlled by the archive. In this way, unnecessary dependencies can be avoided.

With our solution, we rely on "Trusted EMA®", an IT architecture that makes subsequent data manipulation impossible and thus even exceeds the strict WORM concepts on both the hardware and software sides. In EMA, not only every incoming and outgoing document is secured and encrypted in its original format, but also the entire file system. Due to the innovative concept, which is bound to the individual appliance in each case, data can only be viewed and restored by the creator of the archive: Access can only be made with exactly the same EMA hardware or associated hardware that was used to set up the dataset. This works securely: whether the appliance is running in the cloud or on-premises! No matter which storage system your data ultimately ends up on, our security model ensures that it is always protected against malicious access by unauthorized parties.

Manipulation and changes are thus not possible and valid data protection laws can be easily fulfilled. To top it all off, an independent third party, our so-called ANA server, signs each document that is imported into the archive.

Would you like to learn more about EMA's SOFTWORM approach? We look forward to hearing from you.