Visit www.barracudasecurity.com

Legend

Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED

Monday, November 07, 2005

CALIFORNIA DELETING DATA FOR COMLIANCE'S SAKENewsFactor Network - Enterprise - Deleting Data for Compliance's SakeNovember 7, 2005 7:36AM

When normal deletion methods like the Recycle Bin or the delete command are used, the computer's operating system, for the sake of speed, creates an illusion that data has been deleted. In fact, it merely earmarks that region of a disk or drive as being available for new data to overwrite the old data.

Maintaining privacy in the era of digital information requires work on a number of fronts, whether fending off spyware, protecting important files with encryption or configuring a Wi-Fi hot spot to keep interlopers off a wireless network.
But one basic privacy measure is easily overlooked: proper data destruction.

Deleting confidential data completely is essential when donating or selling old computers, and it can also help maintain privacy on computers that may end up lost or stolen. And for businesses looking for ways to comply with the security requirements of laws like the Sarbanes-Oxley Act, a sound policy on data control and destruction is crucial.

When normal deletion methods like the Recycle Bin or the delete command are used, the computer's operating system, for the sake of speed, creates an illusion that data has been deleted. In fact, it merely earmarks that region of a disk or drive as being available for new data to overwrite the old data. Until that overwriting occurs, the old data can be retrieved with undelete programs and tools used by data recovery labs and law enforcement agencies.

But there are several options for securely eliminating data from hard disks, USB flash drives and other storage media. These programs overwrite data with meaningless characters to render it unrecoverable with current techniques. Some of the programs can overwrite entire drives, while others can single out individual files or other information saved by a computer's operating system or programs like Web browsers. Shredding machines that can destroy diskettes, CDs and DVDs are also available.

BLOG EDITOR Note: CONTINUED at weblink..............


No comments: