Home > APEX > Cyber & Data Protection > White Papers > Dell APEX Cyber Recovery Services – Security Guide > Data security
Customers keep control and ownership of their data and are solely responsible for their data stored in the Service. Customers control what data is going into and out of the Service. Sensitive data must be protected, and risks of data leakage and damage must be minimized. Security best practices should be followed for all phases of the Data Security Lifecycle, as illustrated in Figure 3.
Data handling and controls should ideally reflect internal standards and policies. Major considerations include data classification, data retention, and data disposal.
Dell does not inspect, approve, or monitor the data that customers deploy to the vault. Dell does not claim data ownership over any customer information that is stored in the Service.