In-depth

Weapons of mass data destruction

What's the best way of securely disposing of your enterprise's sensitive data? Davey Winder investigates...

There's more to IT security than protecting the valuable data an enterprise obtains, uses and stores. How you dispose of it when the hardware it's sitting on reaches end-of-life should be a major concern too.

These days, only a fool thinks clicking 'delete' is enough to wipe data from a hard drive or that a quick disk reformat will do the trick. Smashing the drives with a hammer isn't a smart move either. So how should the enterprise tackle this problem, and what are the best weapons of data destruction? IT Pro has been investigating.

End-of-life errors

When NHS Surrey was fined 200,000 by the Information Commissioner's Office (ICO) last year for unwittingly releasing data on 3,000 patients to the general public, the enterprise should have sat up and paid attention.

The organisation had switched from an approved IT equipment disposal firm to another company that offered to destroy its data for free. To make money from the deal, the latter company retains any proceeds from the subsequent sale of the hardware.

It all went wrong for NHS Surrey, according to the ICO, when it failed to put in place any contractual governance over the security of that data disposal.

For example, the data protection watchdog said NHS Surrey should have carried out a proper risk assessment and put in place a written agreement with the provider stating the hard drives would be physically destroyed. Furthermore, it said certificates containing the serial numbers of each drive that had been destroyed should have been issued too.

These days, only a fool thinks clicking 'delete' is enough to wipe data from a hard drive or that a quick disk reformat will do the trick.

"[It should have] taken reasonable steps to ensure compliance with those measures, such as effectively monitoring the destruction process and maintaining audit trails and inventory logs of hard drives destroyed by the company based on the serial numbers in the destruction certificates for each individual drive," the ICO said.

Now this may sound a tad harsh on NHS Surrey who, after all, did have written assurances from the company concerned that the data would be securely disposed of. However, the Data Protection Act (DPA) clearly states data controllers have to take appropriate technical and organisational measures against unauthorised or unlawful processing of personal data.

The DPA specifically requires 'outsourced processors', which includes anyone disposing of equipment containing data covered by the Act, provide sufficient guarantees to meet the technical and organisational measures bit mentioned previously.

It would appear the third party in the NHS case was crushing the hard drives before selling on the computers in the belief this constituted securely disposing of the data held upon them. The fact purchasers were able to find data on them would suggest not all drives were removed and crushed. But, even if they were, it would have been no guarantee the data was actually permanently erased.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020