Securely Destroying Electronic and Paper Records

University of Florida Privacy Policy and Security Policy requires the secure destruction of paper and electronic records and media containing Restricted Data. Note that destruction of Primary Records are subject to UF Records Retention requirements, and must follow the UF process for Disposal of Records. Secondary Records may be destroyed as soon as they become obsolete, superseded or administrative value is lost (OSA).

Different media types require different destruction methods which also vary by the intended re-use of the media. Be aware that deleting a file, even using a method described below, will not remove other copies of the file, including duplicates or backups on the same drive, copies on other media, and copies stored in backup systems or drives.

Media that will be re-used within the same unit can either be Cleared or Purged.

Media that will be transferred to another unit, disposed of, or otherwise removed from control of the unit can either be Purged or Destroyed.

Purge and Destroy methods are acceptable when Clear is specified, and Destroy is acceptable when Purge is specified.

Media typeClearPurgeDestroyNotes
PaperNAShred, pulverize or incinerateUse either a cross-cut shredder, or use a certified shredding service
Individual Files stored on a hard driveOverwrite using a secure erase utilityNAHeidi Eraser, Windows ‘sdelete
Individual files stored on an encrypted hard drive or encrypted flash driveNormal OS file delete is sufficientNAMust be encrypted according to the Mobile Computing and Storage Devices Standard.
CD (including R and RW) and DVD (including R and RW)NAIncinerate or shred 
Mobile phones, smartphones, tabletsUse the ‘Erase All Content’ featureShred or incinerateVerify with manufacturer that the feature securely erases data or performs a complete Cryptographic Erase (all storage is encrypted and the erase function destroys the encryption key). Apple iOS and most versions of Android support secure erase.
Magnetic tape, floppy disks, ZIP disksOverwrite dataDegaussShred or incinerate 
Magnetic hard drivesSingle-pass overwriteATA Sanitize, ATA Secure Erase, SCSI Sanitize or degaussShred or incinerateIdeally, use a utility from the disk manufacturer, such as Corsair SSD ToolboxCrucial Storage ExecutiveDell Data Wipe,  Intel Memory and Storage ToolSamsung Magician Software, Western Digital Dashboard. If not available, use a Single-pass overwrite using utility such as Heidi Eraser. ATA Sanitize and Secure Erase supported by HDDErase or hdparm. Secure Encrypted Drives may be cleared or purged using Cryptographic Erase.
Damaged or non-functional magnetic hard drivesNADegaussShred or incinerate 
ATA Solid State DrivesSingle-pass overwrite or ATA Secure EraseATA Secure Erase or Cryptographic Erase Shred, pulverize or incinerateIdeally, use a utility from the disk manufacturer, such as Corsair SSD ToolboxCrucial Storage ExecutiveDell Data Wipe,  Intel Memory and Storage ToolSamsung Magician Software, Western Digital Dashboard. If not available, use ATA Sanitize and Secure Erase supported by HDDErase or hdparm. Secure Encrypted Drives may be cleared or purged using Cryptographic Erase.
 Flash-based removable media (USB flash drives, SD cards, etc)Multi-pass overwritemanufacturer supported Purge functionality, or destroy.  

References:

UF Information Privacy Policies and Procedures

UF Records Management

UF Media Sanitization Standard

NIST SP800-88