Educause Security Discussion mailing list archives

Re: Data Sanitization


From: "Stanclift, Michael" <michael.stanclift () ROCKHURST EDU>
Date: Tue, 7 Apr 2009 14:00:45 -0500

Typically we use DBAN with DoD quick on any drives, and shred CDs and tapes. We've physically destroyed a few hard 
drives before by taking them apart and going at them with hammers, but that's is rare we have to do that.

Michael Stanclift
Network Analyst
Rockhurst University

http://help.rockhurst.edu<http://help.rockhurst.edu/>
(816) 501-4231

From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Kamnab 
Keo
Sent: Tuesday, April 07, 2009 1:42 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Data Sanitization

We are trying to get a good feel of what methods other institutions are using to sanitize electronic storage devices 
(Hard disk drives, USB flash drives, CD, DVD, tapes).  We are particularly interested if you are using a degausser, 
hard drive bending machine or some other physical destruction methods (drilling holes in the disk drive, hammers, drive 
shredder).

One of our primary concerns is implementing a sanitizing process so that we can verify that data is adequately 
eliminated.  For example, with a degaussing machine we would have to connect the disk drive to a computer in order to 
verify that it is no longer usable after the degaussing process.  Has anyone experienced a failed degausser?

Your feedback is greatly appreciated

Kamnab Keo
IT Risk Management Analyst
Virginia Commonwealth University

VCU Information Security - http://infosecurity.vcu.edu/
Information Security News, Tips & More - http://www.twitter.com/vcuinfosec

Don't be a phishing victim - VCU and other reputable organizations will never use email to request that you reply with 
your password, Social Security number or confidential personal information. For more details visit 
http://infosecurity.vcu.edu/phishing.html.


Current thread: