Best Practices for Data Destruction

by | Best Practices, Technology

Data destruction is the process of destroying data stored on tapes, hard disks, flash drives, and all other storage devices. The purpose is to delete the data and make it completely unreadable so that no one else can access your personal information. People may simply delete the data on their devices by emptying the recycle bin. This only marks the data on the drive as “available” so when someone installs new programs or saves files, the information of the new data will take the place of your “deleted” files. The one sure-fire way to make sure your information is permanently deleted is to use a data destruction company.

 

MAINTAIN COMPLIANCE DURING DESTRUCTION METHODS

Currently, in the United States, there are 32 states that have their own data disposal regulations. Any business involved with the European Union must also follow the General Data Protection Regulations (GDPR). In regard to data destruction, technicians must maintain a chain of reports throughout the destruction process. Some of these compliance credentials include SSAE 18 Type II security certification, ensuring your data is secure throughout the process.

 

THE PROS AND CONS OF DIFFERENT DATA DESTRUCTION METHODS

A recent IDG research survey among 200 U.S.-based IT leaders found they are keenly aware of the risks associated with the inappropriate disposal of end-of-life IT equipment. Their top concerns include loss or theft of customer or patron information; damage to the organization’s reputation; loss or theft of intellectual property; punitive fines; and criminal charges. Despite these concerns, there is a great deal of confusion over how to erase properly the data on end-of-life IT assets. 

Failure to properly destroy the data on end-of-life IT assets can lead to serious breaches of data protection and privacy policies, compliance problems, and added costs. There are three main options for data destruction: 1) Overwriting,  2) Degaussing, and 3) Physical Destruction.

 

OVERWRITING

Overwriting involves writing new data on top of old. The process is analogous to recording over an old VHS tape. Because this process erases the old material and renders anything left completely unreadable, this form of data destruction is also called data wiping.

When data is overwritten, a pattern of 1’s and 0’s is written over the original information. Sometimes a random pattern is used but a set pattern can also be used which allows for later verification that the drive was wiped by detecting the set pattern. Overwriting data once is enough for most situations. However, for high-security applications, multiple wipes may be required. This provides an extra level of assurance that the old data is destroyed.

On the downside, it takes a long time to overwrite an entire high-capacity drive. This process might not be able to sanitize data from inaccessible regions such as host protected areas. Overwriting might require a separate license for every hard drive, and the process is ineffective without good quality assurance processes. Another factor to consider is that overwriting works only when the storage media is not damaged and is still writable.

 

Erase, wipe & overwrite data, metadata & empty space on disk

 

 

 

 

DEGAUSSING

Degaussing uses a high-powered magnet to disrupt the magnetic field of the storage medium and destroy the data in the process. When applied to magnetic storage media such as hard disks, magnetic tape, or floppy disks, degaussing can quickly and effectively purge an entire storage medium.

While degaussing can be an effective method of data destruction, it has two major disadvantages. First, degaussing renders the hard drive inoperable by physically disrupting the delicate interconnected mechanisms of the drive – thus destroying any potential end-of-life value. Second, there is no way to ensure all data is destroyed. Because degaussing renders a drive inoperable, there’s no way to run the drive to verify the data is gone. The effectiveness of degaussing can also depend on the density of drives. Finally, it should be noted that degaussing does not eradicate data from non-magnetic media such as Solid State Devices and CD’s.

DegaussingPHYSICAL DESTRUCTION

If you don’t need to reuse hard drives, physical destruction is a possible data destruction option. Organizations can physically destroy data in a number of ways – including shredding, drilling, melting, or any other method that renders physical storage media unusable and unreadable.

There can be problems with physical destruction. First, it is prone to human error and manipulation. There is no reliable way to audit the physical destruction process. Second, most methods of physical destruction leave large portions of the drive platter intact, even if the drive is inoperable.

Data could still be recovered using forensic methods in such cases. Only pulverizing the disk to particles ensures the data is irrecoverable. Lastly, since physical destruction renders media unreadable, it also prevents them from being wiped and remarketed. This means that there is no longer the opportunity to recover any end-of-life value that these assets may potentially hold.

 

How to delete a hard disk

 

 

CONCLUSION

The best method of data destruction depends upon the type of media, the sensitivity of the data, and the end-of-life value of the assets. Many firms attempt to perform data destruction in-house. That’s not typically a good use of internal time and resources. Most IT asset disposition firms have the expertise and scale to perform data destruction on a much more cost-effective basis.

Network Doctor’s Secure IT Asset Disposition solution helps companies ensure that their IT assets are properly destroyed, recycled, or repurposed for maximum value — using secure logistics and chain-of-custody methods to ensure compliance, security, and sustainability.

IT Security Tips

Did you know?

Did you know?

How important is computer and cyber security? Let’s take a look at some facts to put it in perspective. Did you know...

Two-factor what?

Two-factor what?

Two-factor authentication (2FA for short), sometimes called multi-factor authentication, is a system in which you must...

Lie, lie, lie!

Lie, lie, lie!

Social engineering is big business. What is it? Figuring out who you are and then using that information to make money...