Compromised Data (Theft) Protection Mode

 

Protection of the information and data in a Crimestar RMS database is critically important.  While we stress the need to perform regular backups and create off-site archives, there is another type of data protection that must often be addressed. With the increasing problem of identity theft and the responsibility to keep private information private, all reasonable efforts should be taken to prevent the compromise of the sensitive information and data that resides within a Crimestar RMS database.  By design, many Crimestar customers routinely use the synchronization program to deploy laptops in the field.    If a laptop (or any other computer) holding a Crimestar RMS database, were to be stolen, the thief would have countless names, addresses, dates of birth, phone numbers and possibly social security numbers.  In addition to obvious measures to protect the data such as physically protecting the computer (locking cars doors and windows) and password protecting the entire computer at the operating system or bios level, the Professional Edition of Crimestar RMS software can be configured to automatically and quickly destroy the entire Crimestar RMS database after 3 failed log in attempts.  To activate (or deactivate) this feature contact Crimestar Technical Support for instructions.

 

While this is not fool proof protection (nothing is) an unsuspecting thief who runs Crimestar RMS, and attempts to log in to the program will only have 3 tries to do so successfully before all the data is quickly destroyed.  This automatic data destruction security feature is very unforgiving and nondiscriminatory so use it wisely!  Once the data is destroyed it can not be undeleted or un-done and the database will need to be recovered from a system backup or re-synchronized with another department computer's database.