CERT mailing list archives

ST18-005: Proper Disposal of Electronic Devices


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Tue, 30 Oct 2018 06:19:59 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:



ST18-005: Proper Disposal of Electronic Devices [ https://www.us-cert.gov/ncas/tips/ST18-005 ] 10/30/2018 06:52 AM EDT 
Original release date: October 30, 2018

 

Why is it important to dispose of electronic devices safely?

In addition to effectively securing sensitive information on electronic devices, it is important to follow best 
practices for electronic device disposal. Computers, smartphones, and cameras allow you to keep a great deal of 
information at your fingertips, but when you dispose of, donate, or recycle a device you may inadvertently disclose 
sensitive information which could be exploited by cyber criminals.

Types of electronic devices include:


  * *Computers, Smartphones, and Tablets*  electronic devices that can automatically store and process data; most 
contain a central processing unit and memory, and use an operating system that runs programs and applications. 
  * *Digital Media*  these electronic devices create, store, and play digital content. Digital media devices include 
items like digital cameras and media players. 
  * *External Hardware and Peripheral Devices*  hardware devices that provide input and output for computers, such as 
printers, monitors, and external hard drives; these devices contain permanently stored digital characters. 
  * *Gaming Consoles*  electronic, digital, or computer devices that output a video signal or visual image to display a 
video game. 

What are some effective methods for removing data from your device?

There are a variety of methods for permanently erasing data from your devices (also called sanitizing). Because methods 
of sanitization vary according to device, it is important to use the method that applies to that particular device.

Methods for sanitization include:


  * *Backing Up Data. *Saving your data to another device or a second location (e.g., an external hard drive or the 
cloud) can help you recover your data if your device is stolen. Options for digital storage include cloud data 
services, CDs, DVDs, and removable flash drives or removable hard drives (see ST08-001 Using Caution with USB Drives [ 
https://www.us-cert.gov/ncas/tips/ST08-001 ] and ST04-020 Protecting Portable Devices: Data Security [ 
https://www.us-cert.gov/ncas/tips/ST04-020 ] for more information). Backing up your data can also help you identify 
exactly what information a thief may have been able to access. 
  * *Deleting Data. *Removing data from your device can be one method of sanitization. When you delete files from a 
devicealthough the files may appear to have been removeddata remains on the media even after a delete or format command 
is executed. Do not rely solely on the deletion method you routinely use, such as moving a file to the trash or recycle 
bin or selecting delete from the menu. Even if you empty the trash, the deleted files are still on device and can be 
retrieved. Permanent data deletion requires several steps. 
  * *Computers.* Use a disk cleaning software designed to permanently remove the data stored on a computer hard drive 
to prevent the possibility of recovery. 
  * "Secure erase." This is a set of commands in the firmware of most computer hard drives. If you select a program 
that runs the secure erase command set, it will erase the data by overwriting all areas of the hard drive. 
  * "Disk wiping." This is a utility that erases sensitive information on hard drives and securely wipes flash drives 
and secure digital cards. 

  * *Smartphones and Tablets.* Ensure that all data is removed from your device by performing a hard reset. This will 
return the device to its original factory settings. Each device has a different hard reset procedure, but most 
smartphones and tablets can be reset through their settings. In addition, physically remove the memory card and the 
subscriber identity module card, if your device has one. 
  * *Digital Cameras, Media Players, and Gaming Consoles. *Perform a standard factory reset (i.e., a hard reset) and 
physically remove the hard drive or memory card. 
  * *Office Equipment (e.g., copiers, printers, fax machines, multifunction devices). *Remove any memory cards from the 
equipment. Perform a full manufacture reset to restore the equipment to its factory default. 

  * *Overwriting.* Another method of sanitization is to delete sensitive information and write new binary data over it. 
Using random data instead of easily identifiable patterns makes it harder for attackers to discover the original 
information underneath. Since data stored on a computer is written in binary codestrings of 0s and 1sone method of 
overwriting is to zero-fill a hard disk and select programs that use all zeros in the last layer. Users should 
overwrite the entire hard disk and add multiple layers of new data (three to seven passes of new binary data) to 
prevent attackers from obtaining the original data. 
  * "Cipher.exe" is a built-in command-line tool in Microsoft Windows operating systems that can be used to encrypt or 
decrypt data on New Technology File System drives. This tool also securely deletes data by overwriting it. 
  * "Clearing" is a level of media sanitation that does not allow information to be retrieved by data, disk, or file 
recovery utilities. The National Institute of Standards and Technology (NIST) notes that devices must be resistant to 
keystroke recovery attempts from standard input devices (e.g., a keyboard or mouse) and from data scavenging tools. 

  * *Destroying. *Physical destruction of a device is the ultimate way to prevent others from retrieving your 
information. Specialized services are available that will disintegrate, burn, melt, or pulverize your computer drive 
and other devices. These sanitization methods are designed to completely destroy the media and are typically carried 
out at an outsourced metal destruction or licensed incineration facility. If you choose not to use a service, you can 
destroy your hard drive by driving nails or drilling holes into the device yourself. The remaining physical pieces of 
the drive must be small enough (at least 1/125 inches) that your information cannot be reconstructed from them. There 
are also hardware devices available that erase CDs and DVDs by destroying their surface. 
  * "Magnetic Media Degaussers." Degaussers expose devices to strong magnetic fields that remove the data that is 
magnetically stored on traditional magnetic media. 
  * "Solid-State Destruction." The destruction of all data storage chip memory by crushing, shredding, or 
disintegration is called solid-state destruction. Solid-State Drives should be destroyed with devices that are 
specifically engineered for this purpose. 
  * "CD and DVD Destruction." Many office and home paper shredders can shred CDs and DVDs (be sure to check that the 
shredder you are using can shred CDs and DVDs before attempting this method). 

For more information, see the NIST Special Publication 800-88 Guidelines for Media Sanitization [ 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf ].

How can you safely dispose of out-of-date electronic devices?

Electronic waste (sometimes called e-waste [ 
https://www.epa.gov/international-cooperation/cleaning-electronic-waste-e-waste ]) is a term used to describe 
electronics that are nearing the end of their useful life and are discarded, donated, or recycled. Although donating 
and recycling electronic devices conserves natural resources, you may still choose to dispose of e-waste by contacting 
your local landfill and requesting a designated e-waste drop off location. Be aware that although there are many 
options for disposal, it is your responsibility to ensure that the location chosen is reputable and certified. Visit 
the Environmental Protection Agencys (EPA) Electronics Donation and Recycling webpage [ 
https://www.epa.gov/recycle/electronics-donation-and-recycling ] for additional information on donating and recycling 
electronics. For information on recycling regulations and facilities in your state, visit the EPA Regulations, 
Initiatives, and Research on Electronics Stewardship webpage [ 
https://www.epa.gov/smm-electronics/regulations-initiatives-and-research-electronics-stewardship ].

________________________________________________________________________

Authors:________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: