Data destruction is a term which has become increasingly used in today's modern technological world. Similar to physical possessions, data or information is a crucial aspect of daily modern business, whether publicly or privately operated.
Data is sensitive information that is significant to the business, it may contain proprietary information or may relate directly to members of the public. Failure to fully destroy such data prior to decommissioning of I. T. equipment may inadvertently result in the data entering the public domain. Such inadvertent disclosures may have an adverse impact upon a company or public body, leading to negative media coverage, prosecution, brand damage, loss ofrevenueand unforeseen internal running costs.
When it comes to selecting ways to destroy data, organizations have a short menu. There are three main options: Overwriting, which is covering up old data with information; Degaussing, which erases the magnetic field of the storage media; and Physical Destruction, which employs techniques such as disk shredding. Each of these techniques has benefits and drawbacks, experts say.
Enterprise clients generally have a pretty good idea of how to deal with data destruction and this practice has been relatively consistent over a period of years. Still, some organizations, particularly SME's, need more education about data destruction.
Companies must follow all the regulations , laws and policies in relation to data destruction to comply with legal standards. Every company needs to educate their employees on data destruction policy. Companies need to be in compliance with the industry standards for their policy. Data should be completely destroyed and inaccessible.
Types of Data Destruction
Following are some of the types of data destruction adopted by companies:
1: Non Physical:
a: Binary Wiping or Purging
b: Secure Erase (Hard Disk)
c: Enhanced Secure Erase (Hard Disk)
d: Degaussing (some tape based media)
2: Physical:
a: Degaussing (Hard Disks and Some Tapes)
b: Shredding
c: Granulating
d: Crushing
Data Destruction in Australia
To help protect individuals and organisations from privacy and data breaches, new amendments to the Privacy Protection Act 1988 have been enacted. On 12th March 2014 the Office of Australian Information Commissioner (OAIC) began enforcing a harmonised set of 13 Australian Privacy Principles (APP's) , with harsh penalties for data and privacy breaches.
Devices such as mobile phones and network equipment are items often overlooked as sources of data breaches. Devices that may contain confidential or private information which may result in a data or privacy breach if not properly disposed of include:
Computers & LaptopsMobile Phones & TabletsServers and Network EquipmentExternal Hard DrivesUSB thumb drivesCD's and DVD'sPrinters & Copy Machines
Rcube's Role in Data Destruction
RCube Solutions provides complete solutions for all security and destruction requirements, ensuring all data is 100% irretrievable.
Rcube Solutions adopts the following methods for data destruction:
MOBILE AND OFFSITE MEDIA SHREDDING
Degaussing and/or Shredding of HDDs, SSDs and other storage devicesProof of Destruction (Serial number Scanning and Asset Reporting)Certificate of DestructionGPS Tracked Vehicles
DOD STANDARD 1,3 OR 7 PASS DATA WIPING
Highest Standard Military Grade data wiping solutionCertificate of Destruction for each assetPost Wipe (Assets removed for reuse, recycling or destruction as client decides)Zero cost for reusable assets
For more information about how Rcube Solutions can help you with data destruction, contact us @ 1300 879 192.
YOU ARE READING
What is Data Destruction??
Kısa HikayeWhat is Data Destruction?? Data destruction is a term which has become increasingly used in today's modern technological world. Similar to physical possessions, data or information is a crucial aspect of daily modern business, whether publicly or pr...