PC Disposal
PC Disposal Guidelines |
|
When you wish to dispose of a computer (desktop, laptop, or server), you must first remove all the data (sensitive or otherwise) that is on it. Southern University Property Management will not accept a machine for disposal unless you confirm that this process has taken place.
Hard drive "sanitization" is important for two reasons. First, you do not want the next user of the system to have access to sensitive information (like research data, student info, financial data or patient information); and second, you do not want people to have unauthorized access to licensed software, such as Microsoft Word. Even Personal Digital Assistants, like Palm devices, should be reset, so that all data and programs are wiped from them. |
|
However, merely using the "delete" command or dragging items to the trash does not remove the data from the disk. There are many, widely available programs that can restore data deleted in this manner. A plain "format" command is somewhat better, but a determined person could still access sensitive data. Some operating systems offer a "format and zero out all data" command, which is better, and is sufficient for machines which are just being moved around within the University. The easiest and most secure way to remove the data is to use a "wiping" program that not only deletes the data, but also overwrites each sector with garbage data multiple times. Be aware that the process will take some time (potentially hours if the drive is very large, or if the processor is slow). If you do choose to do the cleanup yourself, you will need the following: |
|
1. A software program to wipe the disk and overwrite it with data. Some tools you could use are:
|
|
**NOTE: To obtain a copy of Wipedrive software visit or contact the IT Security Office. | |
2. A disk or CD to boot the computer from before you run the tool, so that you can sanitize the whole drive. Make sure that the tool you use has a feature to wipe the whole drive, not just empty space. This is the only way to make sure that all files, settings, license keys, etc. are removed. There are many tools that can perform this function, so if you are unsure about whether a particular tool is sufficient, check with the TNS Network Security Services. |