Inheriti®
  • 👋Introduction to Inheriti®
  • 💁How it Works
  • ⚒️Requirements
  • 📚Glossary
  • Getting Started
    • 💻Editions
    • 🪪SafeID
    • 🛡️Protection Plans
      • Data Backup Plan
      • Digital Inheritance Plan
    • 🧩Plan Shares
    • 🧑Beneficiaries
    • ⏰Activation Methods
      • Plan Triggers
      • Dead Man Switches (DMS)
    • 🔑SafeKey
      • SafeKey Pro
      • SafeKey Mobile
    • ⛓️Blockchain
      • vechain
      • Ethereum
      • Optimism
    • 🗳️Inheriti® Vault
    • 💳Payment Methods
    • ✨Merging
  • User Guides
    • 🗃️Data Backup Plans
      • Create Backup
      • Merge Backup
    • ⚰️Digital Inheritance Plans
      • Create Inheritance
      • Merge Inheritance
  • Earn Utility Rewards
    • 🔮SHA Safe Nodes
    • 🤝Affiliate Program
  • Technical
    • 🕸️Secure Share Distribution Protocol (SSDP)
    • 🛡️Security Barometer
    • ✅Ownership Verification
    • 🪙SHA Token Utility
  • About
    • Company
    • Patents
    • Trademarks
    • Audits
    • Changelog
      • Inheriti® 2.0
        • Inheriti® 2.2
        • Inheriti® 2.1.2
        • Inheriti® 2.1.1
        • Inheriti® 2.1
      • Inheriti® 1.0
    • Merchandise
Powered by GitBook
On this page
  • Ideal for
  • Use when
  1. Getting Started
  2. Protection Plans

Data Backup Plan

Backup Plans allow users to create decentralized backups of their digital data, offering a secure environment for information storage and protection.

PreviousProtection PlansNextDigital Inheritance Plan

Last updated 1 year ago

A Data Backup Plan is a protection plan meant for those desiring to make a "decentralized backup" of their digital data, alone, or together with other shareholders. The data that can be protected with a Data Backup Plan is the same as with a Digital Inheritance Plan, but its plan properties are different.

This plan type allows for flexibility in managing and protecting sensitive information, making it ideal for those who wish to maintain control over their digital assets, either individually or in collaboration with trusted partners.

Ideal for

Users who need to safeguard active data that is frequently accessed and updated, such as personal information, business data, and operational details.

Use when

You want to ensure ongoing access to critical data in the face of potential data loss incidents, such as hardware failure, cyberattacks, or accidental deletion.

🛡️