{"id":278,"date":"2025-11-27T14:04:32","date_gmt":"2025-11-27T19:04:32","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/?post_type=chapter&#038;p=278"},"modified":"2026-03-01T23:25:13","modified_gmt":"2026-03-02T04:25:13","slug":"destroy-data","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/destroy-data\/","title":{"raw":"Destroy Data","rendered":"Destroy Data"},"content":{"raw":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/working-remotely\/\">Previous Lesson<\/a><\/h4>\r\n<h4><img class=\"wp-image-792 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-289x300.jpg\" alt=\"\" width=\"1110\" height=\"1152\" \/><\/h4>\r\n<h4>Lesson 15 of 18<\/h4>\r\n<h3>Ensure that data you no longer need to retain is securely destroyed.<\/h3>\r\nConventional file deletion (sending something to the recycle bin or trash on your computer) does not delete the file in a way that prevents it from being recovered using software tools.\r\n<h3><strong>Some ways to securely delete files include:<\/strong><\/h3>\r\n<ul>\r\n \t<li>Use a software tool made for that purpose, such as Eraser for Windows or Permanent Eraser for Macs.<\/li>\r\n \t<li>Delete encryption keys so that encrypted data cannot be recovered.<\/li>\r\n \t<li>Physically destroy the medium (i.e., through disintegration, shredding, pulverizing or incineration).<\/li>\r\n \t<li>Degauss the storage media to disturb its magnetic alignment.<\/li>\r\n<\/ul>\r\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/activity-4-1-reflection\/\">Next Lesson<\/a><\/h4>","rendered":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/working-remotely\/\">Previous Lesson<\/a><\/h4>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-792 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-289x300.jpg\" alt=\"\" width=\"1110\" height=\"1152\" srcset=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-289x300.jpg 289w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-988x1024.jpg 988w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-768x796.jpg 768w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-65x67.jpg 65w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-225x233.jpg 225w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9-350x363.jpg 350w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/11\/1-9.jpg 1302w\" sizes=\"auto, (max-width: 1110px) 100vw, 1110px\" \/><\/h4>\n<h4>Lesson 15 of 18<\/h4>\n<h3>Ensure that data you no longer need to retain is securely destroyed.<\/h3>\n<p>Conventional file deletion (sending something to the recycle bin or trash on your computer) does not delete the file in a way that prevents it from being recovered using software tools.<\/p>\n<h3><strong>Some ways to securely delete files include:<\/strong><\/h3>\n<ul>\n<li>Use a software tool made for that purpose, such as Eraser for Windows or Permanent Eraser for Macs.<\/li>\n<li>Delete encryption keys so that encrypted data cannot be recovered.<\/li>\n<li>Physically destroy the medium (i.e., through disintegration, shredding, pulverizing or incineration).<\/li>\n<li>Degauss the storage media to disturb its magnetic alignment.<\/li>\n<\/ul>\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/activity-4-1-reflection\/\">Next Lesson<\/a><\/h4>\n","protected":false},"author":2543,"menu_order":15,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-278","chapter","type-chapter","status-publish","hentry"],"part":248,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/users\/2543"}],"version-history":[{"count":5,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/278\/revisions"}],"predecessor-version":[{"id":793,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/278\/revisions\/793"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/parts\/248"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/278\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapter-type?post=278"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/contributor?post=278"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/license?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}