Backup/Causes of data loss

Causes of data loss include device failure, software bugs, software lock-in, and human error.

Hardware failure
The magnetic head that floats close to a hard disk's metal platters could crash onto it, the spinning motor's lubrication could wear down, a manufacturing defect could lead to early defect, or a storage controller could malfunction due to a voltage spike caused by a malfunctioning power supply or a lightning strike.

Since RAID storage systems are more complicated, they have more points of vulnerability, such as a malfunctioning controller that could damage data even if the individual drives are working well, or a drive failure poking holes over the entire data stored on the system due to lack of redundancy drives.

This happens because RAID systems typically stripe data across drives to multiply sequential transfer rates, since it allows the individual drives to work in parallel. This performance benefit comes at the cost of vulnerability to data loss, thus requires redundancy drives (or "pairity drives") so the user can swap out a defective drive, and data can be automatically restored on a functional drive. If affordable, RAID network attached storage is for convenient quick access to a large pool of data, but a separate cold storage copy that is rarely touched should be kept if the goal is long-term archival.

The complexity of RAID storage systems also makes it more susceptible to maintenance errors.

Software bugs
Users have reported parts of their mobile phones' internal storage to becoming inaccessible, folders disappearing during a move, bogus software updates rendering devices inoperable, faulty colourspace conversion causing the operating system to crash in perpetuity, and all contents of their internal storage being deleted.

Data stored on the memory card is less likely to get lost, since a memory card can be ejected and read externally, as well as being recoverable to some extent using forensic software.

Should a failure such as a system crash or exhausted disk space occur while a file is being written to, the file might be truncated (partially cut off) or blanked. If the file is still opened in the program (for example, text editor), it can be saved on a different device or partition to prevent loss.

Another way to prevent it is creating revisions in separate files by occasionally changing the file name while saving. This can be an incremental number or time stamp.

Malicious software
Malicious software, also known as malware, might damage your data while executing its payload. While early malware usually caused damage to entertain their creators, more modern malware known as ramsomware encrypts files and then demands a payment for decrypting the files.

If your data has been encrypted by ramsomware and you have no backup, the chance of getting it varies depending on the program. For more recent versions of ramsomware, there may be no chance of getting it back without paying the ramsom. Even then, you are not guaranteed to regain access to your files given that an anonymous cybercriminal gets to decide whether your files will be decrypted.

Consider storing very important data on write-once media such as recordable optical discs (CD-R, DVD±R, BD-R), given that data on those media is inviolable by malware.

Partition management
Partition management is a highly risky task.

Before partitions on a data storage device are modified, a full-disk image backup should be taken, since any interruption in the process could destroy the file systems, making the files inaccessible. A full-disk image backup allows for recovery by writing the partitions in their state before the partitioning back to the device.

File system repair tools
Tools such as check disk on Windows and file system consistency check on Linux intend to repair problems with a file system that could arise after writing to disk was interrupted, which could, for example, lead to inconsistencies between the files and the space marked as used. On Windows, CHKDSK also renames and relocates files with names containing characters Windows considers invalid such as colons and question marks that might have been created on a Linux-based operating system.

It is recommended to renew the backup before running such tools, since they are not guaranteed to repair a file system successfully and might cause collateral damage. File system repair can be thought of as a digital surgery. Similarly to partition management, an interruption in the process can lead to enormous damage.

However, on journaled file systems such as NTFS (default on Windows and widely pre-formatted on external drives) and ext4 (default on Linux) and UDF (optical discs), file system checking is usually not needed after a power interruption, and when it is, it is more reliable than on old-fashioned file systems such as FAT32 that lack a journal.

Human error
Human errors that can lead to data loss include the deletion of files and folders that one thinks are already backed up but are not, mistyping a command, choosing a wrong device for writing a disk image to, and dropping a device from a height or into liquid.

A damaged touch screen of a smartphone after a drop might be insensitive to touch, making it impossible access files. Even when the smartphone is connected to a desktop/laptop computer through a USB cable or wirelessly, the file transfer typically needs to be activated on the phone first, which is impossible if the touch screen is unresponsive.

Before working with sensitive tools such as  and , it is recommended to renew the backup and to unplug any momentarily unneeded external storage devices to protect them from overwriting accidents.

Avoid working with sensitive tools when tired. Fatigue and sleepiness increase the chance of accidents occuring.

On defective devices, data stored on a memory card is likely retrievable externally, therefore storing data on a modular memory card protects against data loss. The most popular memory card format in portable devices is MicroSD.

Human error is also a risk to cloud storage services, albeit smaller than the risk of data loss on local data storage managed by an individual with little experience in using computers. For example, Amazon claims their "Glacier" service is "99.99999999999% durable". That is 99 followed by eleven nines, meaning the chance for data loss is claimed to be one in a hundred billion. Even if this claim were true from a technical point of view, which is very unlikely, it does still not take into account that an angry employee could memory-hole data. Though unlikely, it can be safely assumed to be likelier than a hundred billionth.

Vulnerable storage location
Some people make the mistake of treating the internal storage of their computer or mobile phone as a permanent archive.

There is nothing wrong about having redundant copies of files on such devices, and it is useful if accessed frequently. However, without an independent cold data backup, files stored on a device's internal storage are at risk of loss from any failure that would make the computer inoperable, ranging from malware, bogus updates, to component failure.

Some vendors of computers and smartphones let the user remotely erase their device if linked from an account, which is intended for use after physical theft. However, this leads to a risk of data being erased through a compromised account.

Bad user interface design
Bad user interface design such as the ability to delete photos through a side-swiping gesture on some mobile photo viewers, or the ability to delete history items with a press of the " delete " key without confirmation on the Firefox web browser could cause the inadvertent deletion of data.

Software lock-in
People might habitually store data inside a locked-in location such as a mobile phone application's internal data, thinking it will always be there. In reality, access to that data could be denied with little warning through a software update that removes a feature, or a software bug.

If data is stored in a locked-in location from where it can not easily be ported and is only accessible through specific software, the data will at most only be accessible for the lifespan of the one device it is stored on.

If an app is dependent on an online service, the unavailability or discontinuation of that service could make user data inaccessible, if the app is poorly designed to refuse starting if no connection to the service provider can be established.

Instances of software lock-in include:


 * Some mobile browsers like Samsung Internet for Android (earlier known as "S Browser") lock saved pages away in the  directory, from where they can not be backed up or copied to other devices, except with root access, which is locked behind the bootloader by default, and unlocking that typically involves a full device erasure.
 * In April 2019, software support for the "software as a service" Telekom Entertain 303 Media Receiver, a digital television apparatus, was deprecated. Since the operating system is software as a service, it stopped working as well, making recordings stored on the hard disk inaccessible. The USB port of the device could not be used for recording or file transfer, and the operating system could also not read USB sticks with existing media. It has no use beyond a 0.5A charger. Data on the device's hard disk was stored in a proprietary format.

The device was introduced in 2011, so people would lose up to eight years of recordings. But since data could not be moved anywhere else from the built-in 500 GB HDD of the device, people were forced to delete recordings anyway to be able to record new footage.

Overreliance on online services
While storing data both in an online service and locally reduces the risk of data loss compared to storing it only locally, people who have stored data into online services have repeatedly made the mistake of not retaining a local copy, which lead to them losing access to their data.

For example, people uploaded home videos on YouTube without locally retaining the original files. Due to the possibility of videos being removed and accounts being terminated in error, and the difficulty of reaching a YouTube employee for review, a local copy of such videos should be kept.

Another example is that Google frequently locks user accounts and demands users to disclose their phone number to regain access. In Germany, it is mandatory since July 2017 to identify oneself to obtain a mobile phone number. Other countries have introduced similar laws over time. So Google holds accounts hostage until one provides personally identifiable information. Internet companies have disrespected users' privacy by using mobile phone numbers for commercial purposes in the past.

An online platform might change its business model, resulting in a purge of prior data. For example, in 2022, Vimeo planned suspending accounts whose videos consumed excessive bandwidth.

Among the largest data loss disasters on Internet social networking services occurred on MySpace. The majority of audio tracks uploaded to the site were lost, reportedly due to a maintenance error. The music tracks were listed but unplayable, with the earliest reports of tracks being unplayable dating back to December 2017. Initially, the site's developers reported trying to solve the problem, presumably to delay an uproar, but later came to acknowledge that the data was permanently lost. The incident was dubbed a "datapocalypse", a portmanteau from "data" and "apocalypse". Even after the web site spontaneously removed the user blogging feature along with existing user blogs without announcement in 2013, nearly five years earlier, some people were still not compelled enough to back up their data locally, resulting in them losing it.

Cloud storage providers usually close long unused accounts to clear disk space for new users. Cloud storage is for short-term convenience, not archival. Exceptions are dedicated paid services with this stated purpose. However, due to lack of control, even those do not replace a local copy.

Synchronization of bad data
A safe backup is independent from its source device. If a backup is automatically synchronized and there is no error detection mechanism, there is a risk of damaged data being synchronized.

Loss of access credentials
Data in encrypted archive files or file systems or on a cloud service is at risk of loss if the access credential, commonly a password, is lost. This is unlikely to happen over a short time span, but significantly likelier in absence in the long term.

As mentioned above, cloud storage providers purge long inactive accounts, meaning by the time one forgets the credentials to a long unused cloud account, it might not exist anymore.

Loss and theft
Portable devices such as mobile phones that store data can be lost or stolen.

This risk is higher during trips, where one might, for example, leave a bag with personal belongings unattended in a crowded area.

The loss of data from such an occurance can be minimized by backing data up to a storage device left at the base (such as a hotel or rented appartment), and synchronized to a cloud storage service if the mobile data plan allows for it.

Although less likely, data could be lost to home burglary as well, especially when stored on the internal storage of expensive devices that are attractive to burglars due to their resale value. Data can only be protected from burglary by storing a copy in a separate location.

Natural disasters
In some locations of the world, people may have to be considerate about natural disasters. For example, a flood disaster could soak a basement, destroying all data storage except for optical discs. This can be prevented using water-tight bags or containers. A basement however is the least vulnerable to an earthquake due to being supported by the surrounding earth. An earthquake mainly targets the top of a house, which could be completely destroyed if the house collapses.