Secure Data Erasure: How To Permanently Delete Data Without Recovery? Is Factory Reset Really Work and Safe?

Secure Data Erasure: How To Permanently Delete Data Without Recovery? Is Factory Reset Really Work and Safe? 9

The use of online platforms and social media have insignificantly increased. We can see many individuals as well as organizations incorporating communication tools and office supplies, such as computers, notebook, smartphone, and tablet into their daily use to help facilitate communications, exchange of information, and online transactions.

Important data are created and kept in these equipment whether it be names, addresses, phone numbers, photos, as well as other personal information. If these information are leaked the damage can prove to be very costly to the owner.

The main reasons behind leaked information are caused by the owner’s mistake in destroying the data on their devices. Many owners assume that clearing their devices by using factory reset is enough. Another common mistake by owner is thinking that devices which can no longer be turned on is safe.

With these two mistakes owners are likely to sell their old devices to shops, without knowing that their data can still be recovered.

What are the NIST 800-88 Guidelines?

One of the most widely used data sanitization standards by many authorities and organizations is “NIST 800-88” or “National Institute of Standards and Technology”. It is the U.S. government published document that provides methodical guidance when it comes to erasing data from electronic storage media. The goal is to effectively sanitize media so that any and all data is irretrievable once the data or data storage device reaches its end-of-life.

NIST 800-88 is widely known for its data sanitization categories of Clear, Purge and Destroy. It can be used with various types of electronic devices.

The objective is to comply with the guidelines in managing a wide range of storage media, including but not limited to government agencies and big organizations.

And, for this reason, various agencies including private companies adhere to  these guidelines to deal with the security management of information in the equipment after use or until its end-of-life  such as computers, notebooks, HDDs, smartphones, tablets, tapes, USB, and many other storage devices.

You May Also Like

Secure Data Erasure: How To Permanently Delete Data Without Recovery? Is Factory Reset Really Work and Safe? 1
ITAD
Data lifecycle management (DLM) - a solution to increase an efficiency in data management according to the Person Data Protection Act (PDPA) 2
An employee of a Japan-based information equipment recycling company sold hard drives in an internet auction 3
What is ‘ITAD’ or IT Asset Disposal? What is the best solution for unused computers and how to maximize benefits from them? 4
The Personal Data Protection Act has been postponed to be next year. How to be compliant with PDPA requirements? How to prepare your company and you IT Department to welcome the New Data Privacy Law? 5
COVID-19: Closing company, how to deal with obsoleted computer? IT Asset Disposal is your solution. Bangkok and Worldwide service. 6
COVID-19: Working measure of ADD to overcome this state of emergency 7
Data Privacy Implementation Seminar PDPA / GDPR / How to collect, transfer and dispose of data. Good training for your DPO (Data Protection Officer) 8