Menu

Filter by
content
PONT Data&Privacy

0

Safely erasing data: the why, what and how

We all tend to keep a lot of data because the information may be useful in the future. But storing large amounts of data is not effective, and sometimes even violates laws and regulations. How do you securely delete exactly the information that is no longer needed?

February 5, 2025

 
For many organizations, it is easy to store large amounts of data. But there is a downside to large-scale information storage. You can't see the forest for the trees, and privacy and security risks also arise. It is therefore important to delete any information that is no longer needed - responsibly and securely.
 

Three reasons to get serious about data removal

Information disposal is an important part of information security. For example, ISO 27001 describes data deletion as a preventive management measure. It involves the organization deleting data that is stored in systems and devices but is no longer needed.
 
Even for organizations not pursuing ISO certification, there are good reasons to work on data removal.
 
  • An important goal of information removal is to reduce the risk of unwanted disclosure of sensitive information. You want to prevent (sensitive) data from ending up in the hands of unauthorized individuals such as cybercriminals.
  • In addition, organizations face legal obligations around data storage, such as contractual agreements and the requirements of laws and regulations. For example, the General Regulation Data Protection Act (AVG) requires organizations to securely delete personal data once it is no longer relevant.
  • Further, the improper removal of information can lead to a data breach. With all its consequences. Think of a fine from the regulator and reputational damage.

Five techniques for securely erasing information

The safe disposal of information means that the deleted data cannot be reconstructed, read or recovered. This is important for digital information, but also for information that is on paper.
 
Common techniques for securely erasing digital information:
  • Data Overwriting: data are overwritten with other information to render the original - partially or completely unreadable.
  • Degaussing: information stored on hard drives is erased with a process that uses strong magnetic fields.
  • Cryptographic deletion: encrypted information is rendered unusable by destroying the keys.
Common techniques for securely disposing of information on paper:
  • Shredding: paper documents are shredded beyond repair.
  • Incineration: paper documents are burned completely.

Five best practices

ISO 27001 requires (in measure A.8.10) that organizations take measures to control and record how information is disposed of.
 
From the experience of ISO 27001, best practices can be derived that are relevant to all organizations that take privacy and security seriously:
 
  • Create policies and procedures about information disposal. Consider topics such as: when data should be deleted; what techniques are used to delete information (digital and print); who is responsible for data deletion; and how practices are documented and monitored.

  • Use reliable techniques to erase information. When transferring information, choose certified software. Use strict procedures to erase data from devices such as hard drives. Select a certified service provider to have paper documents and unused hardware destroyed.

  • Pay attention to obsolete hardware. Storage media, such as hard drives, USB sticks and tapes, should be securely destroyed when no longer in use. Shredding, for example, is an option for the complete destruction of a hard drive.

  • Control the disposal of information. It is important to document and monitor the work processes for the removal and destruction of information. This is possible through, for example, logging of data deletion, periodic audits of established procedures, and checks on the accuracy and completeness with which information is deleted.

  • Ensure employee awareness. Employees play a key role in the proper handling of data deletion. Therefore, educate employees on why information should be deleted and what they can do about it. Practical advice might include regularly cleaning out the e-mail box, periodically emptying the digital recycle garbage can, and always shredding paper documents.

L2P

Share article

Comments

Leave a comment

You must be logged in to post a comment.