1202 Data Security of Endpoint Devices - Devices must be securely disposed of

Prev Next

Data Security of Endpoint Devices - Devices must be securely disposed of

While SecureDoc performs an invaluable service ensuring that data is protected by encryption, and that user access to SecureDoc-protected devices is locked down and governed by permitting only specific users to authenticate at Pre-Boot, there are other risks that any security-conscious organization should be aware of and include in its overall security design.

Devices must be securely disposed of

In a situation where you want to dispose a device, you must make sure that the sensitive information in that device is completely sanitized and cannot be retrieved. You may use any data sanitization tool that is HMG IS5 Wipe Method compliant (click link at left to access this information).

Note 1: The NSA-approved method for data destruction on a Solid State Drive (SSD), flash drives, hybrid drive, etc., is by grinding such devices into a fine powder.

Note 2: The US Department of Defense-approved method for traditional (spinning platter) hard drives is to perform a secure erase, which consists of a 7x overpass of random data.