Weapons of mass data destruction

What's the best way of securely disposing of your enterprise's sensitive data? Davey Winder investigates...

There's more to IT security than protecting the valuable data an enterprise obtains, uses and stores. How you dispose of it when the hardware it's sitting on reaches end-of-life should be a major concern too.

These days, only a fool thinks clicking 'delete' is enough to wipe data from a hard drive or that a quick disk reformat will do the trick. Smashing the drives with a hammer isn't a smart move either. So how should the enterprise tackle this problem, and what are the best weapons of data destruction? IT Pro has been investigating.

End-of-life errors

When NHS Surrey was fined 200,000 by the Information Commissioner's Office (ICO) last year for unwittingly releasing data on 3,000 patients to the general public, the enterprise should have sat up and paid attention.

Advertisement - Article continues below

The organisation had switched from an approved IT equipment disposal firm to another company that offered to destroy its data for free. To make money from the deal, the latter company retains any proceeds from the subsequent sale of the hardware.

It all went wrong for NHS Surrey, according to the ICO, when it failed to put in place any contractual governance over the security of that data disposal.

For example, the data protection watchdog said NHS Surrey should have carried out a proper risk assessment and put in place a written agreement with the provider stating the hard drives would be physically destroyed. Furthermore, it said certificates containing the serial numbers of each drive that had been destroyed should have been issued too.

These days, only a fool thinks clicking 'delete' is enough to wipe data from a hard drive or that a quick disk reformat will do the trick.

"[It should have] taken reasonable steps to ensure compliance with those measures, such as effectively monitoring the destruction process and maintaining audit trails and inventory logs of hard drives destroyed by the company based on the serial numbers in the destruction certificates for each individual drive," the ICO said.

Now this may sound a tad harsh on NHS Surrey who, after all, did have written assurances from the company concerned that the data would be securely disposed of. However, the Data Protection Act (DPA) clearly states data controllers have to take appropriate technical and organisational measures against unauthorised or unlawful processing of personal data.

The DPA specifically requires 'outsourced processors', which includes anyone disposing of equipment containing data covered by the Act, provide sufficient guarantees to meet the technical and organisational measures bit mentioned previously.

It would appear the third party in the NHS case was crushing the hard drives before selling on the computers in the belief this constituted securely disposing of the data held upon them. The fact purchasers were able to find data on them would suggest not all drives were removed and crushed. But, even if they were, it would have been no guarantee the data was actually permanently erased.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019