0% found this document useful (0 votes)
100 views6 pages

Best Practices in Disposal of Computers and Electronic Storage Media

This document provides guidelines for properly disposing of or repurposing computers and storage media to prevent sensitive information from being accessed. It explains that simply deleting files does not fully remove the data and that specialized software or physical destruction is needed. The guidelines recommend sanitizing hard drives and disks using software, degaussing tapes, and physically destroying non-erasable media. Proper disposal helps prevent confidential data theft and privacy breaches.

Uploaded by

mona234
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views6 pages

Best Practices in Disposal of Computers and Electronic Storage Media

This document provides guidelines for properly disposing of or repurposing computers and storage media to prevent sensitive information from being accessed. It explains that simply deleting files does not fully remove the data and that specialized software or physical destruction is needed. The guidelines recommend sanitizing hard drives and disks using software, degaussing tapes, and physically destroying non-erasable media. Proper disposal helps prevent confidential data theft and privacy breaches.

Uploaded by

mona234
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Libraries, Computing & Technology

Best Practices in
Disposal of Computers
and Electronic Storage
Media

Guidelines for end users and computer


support personnel to follow when
disposing of computers or storage media
that may contain sensitive information

11/23/05
..
..
..
..
..

Best Practices in Disposal of


Computers and Electronic
Storage Media

Guidelines for end users and computer


support personnel to follow when disposing of
computers or storage media that may contain
sensitive information

Overview

At some point in the life cycle of a computer its owner will decide to
dispose of the equipment. When this occurs, it is important to take action
to ensure that confidential or sensitive information is not revealed to the
eventual recipient of the equipment. The same issues apply to storage
media such as optical disks, backup tapes, etc. This document describes
best practices to follow prior to disposal of equipment or media.

This document explains the issues and gives an overview of steps you
should take. For specific instructions and examples, please see the MSU
computing knowledge base article number 6567 (Go to help.msu.edu and
enter the article number in the search box.).

The Problem

Many users of computers believe that if they delete a file from their
computer no one can retrieve it. In one study, researchers at MIT acquired
100 hard drives on the used market and found confidential information

2
such as social security numbers and health records on a large percentage
of the devices.

Virtually any computer – laptop, desktop, or server – in use at MSU may


at some time contain confidential or sensitive information. Some
computers may house huge amounts of such information. It is therefore
prudent to thoroughly sanitize computer hard drives and other storage
devices before disposal or repurposing.

The same concerns apply to backup and archival media such as CD-R,
CD-RW, DVD-R, DVD-RAM, ZIP drives, other backup tapes – any
media that might contain confidential or sensitive information. When an
individual or unit at MSU disposes of backup or archival media the
information should be “scrubbed” or the media destroyed.

Records Retention

Before “scrubbing” or destroying a hard drive or other form of storage, be


sure to retain copies of any institutional data as required by federal or state
law, contract, or MSU policy. University Archives provides guidance on
university records retention policies on their Web site at
http://www.msu.edu/unit/msuarhc .

This document pertains to electronic storage media – primarily digital


media. Similar concerns apply to paper records and to analog media such
as audio cassette tapes, video tapes, etc. Units should be aware of and
respect both records retention and privacy considerations no matter what
format or media is involved.

Deletion Is Not Destruction

Many do not realize that operating system file deletion commands do not
physically remove data from hard drives and other storage devices.
Instead, file deletion merely marks the area of the hard drive as available
for re-use.

“Disk doctor” or forensic detection tools can allow someone to retrieve


information previously stored on the hard drive even after it is invisible to
the computer’s operating system. Failure to understand this has proved
embarrassing and costly to Fortune 1000 companies, to governments, to
universities, and to individuals.

Specifically:

• Deleting a file in the operating system does not remove the file. In
Windows by default the file goes into the Recycle Bin where it
may be trivially retrieved.

3
..
..
.. •
.. Even after the file is removed from the Recycle Bin, traces of it
.. remain on the hard drive.

• Even an operating system “Format” operation does not fully erase


information on a hard drive.

• Deleting an e-mail message from the In-box and emptying the


trash bin or deleted items may not physically remove it from the
hard drive.

• Deleting a record from a database may not remove all traces of the
information.

• Even if data is thoroughly deleted from a primary storage device


such as a hard drive, copies or traces may remain on backup tapes,
CD-R or other optical disks, or portable media such as flash
(“thumb”) drives.

Data or traces of data may remain in many places:

• The Web browser cache, which may hold many megabytes of Web
pages viewed.

• Any password management tools, whether Web browser or other


software.

• Any temporary storage.

• Embedded within documents. For instance, Microsoft Word keeps


historical information as documents are edited. That information
can be retrieved even if the Word application does not display it.

Thus, it is prudent to ensure that there is no possibility that sensitive


information remains accessible when equipment or media is disposed:

• Whenever a computer is disposed or reassigned, the hard drive


should be “sanitized,” removing all data.

• Whenever any storage media are disposed, all data should be


removed, or the media destroyed.

Disposal versus Repurposing

When equipment becomes obsolete, units may choose several courses of


action at Michigan State University.

• Send the equipment to MSU Surplus for sale or other disposal.

4
• Reassign the equipment for some other purpose. For instance, a
laptop computer might be reassigned to a graduate student or a
retired faculty member.

Whether the equipment is sent to Surplus or repurposed, it is prudent to


ensure that the hard drive contains no sensitive information. For instance,
suppose a computer was used by an administrative assistant in the
business office to handle personnel transactions. Rather than try to
ascertain whether the computer might house sensitive information, the
prudent course is to totally sanitize the hard drive.

Sanitizing Hard Drives and Backup Tapes

Specialized software is available to “sanitize” (or scrub, or wipe clean) a


hard drive before it is disposed or repurposed. This software makes
several passes over the entire surface area of every platter of the hard
drive, in compliance with standards set by the U.S. Department of
Defense.

See the MSU computing knowledge base article 6567 for examples and
instructions.

Magnetic tapes can be erased using a degaussing device, which


randomizes the magnetic patterns on the media, rendering it unreadable.

Destroying Storage Media

Some media cannot be sanitized. For instance, a CD-R permanently


retains the data initially written to it. Physical destruction is the only
solution. For CD-R discs and other optical media, some shredders on the
market are able to destroy the disc in a fashion similar to shredding paper.

For particularly sensitive information, it is prudent to physically destroy


the media, even if it could be sanitized or degaussed. For instance, if you
have a server hard drive or RAID array or backup tapes that house social
security numbers or health information, you may wish to physically
destroy the device or media.

Exercise caution when physically destroying media. For instance, before


breaking a compact disc, be sure you are wearing protective eyewear.

“Accidental Disposal” – Loss or Theft

If a computer – or a device such as a thumb drive – is lost or stolen, any


information on the device can fall into the hands of someone who may
harvest confidential information for identity theft.

5
..
..
.. one case, a major university had a laptop computer stolen with
In ..
..
confidential information, including social security numbers, on the hard
drive. This occurred despite a university policy that prohibits the storage
of confidential information on portable devices.

The prudent course is to never store confidential information on portable


devices.

Daily Safeguards

Some computers – desktop, laptop, or server – are used daily to process


sensitive information. When such computers are disposed or repurposed,
the steps discussed in this memo should be followed. But it is also
prudent to take steps every day:

• Acquire, install, and use software that cleans known areas of


vulnerability, such as the browser cache, temporary files, the
Recycle Bin, etc.

• Log out of secure applications when not in use.

• Employ a screen saver with password protection and configure it to


employ a short timeout period.

• Turn the computer off when not in use.

• Do not leave passwords written down in a place near the computer.

• Do not store confidential or sensitive information on portable


devices such as laptops or thumb drives.

• Whenever possible, encrypt sensitive information on any medium


on which it is stored.

You might also like