Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

🎓 Purpose

Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements. 

👥 Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


🔖 Contents

Table of Contents
minLevel1
maxLevel3
include
outlinefalse
indent
styledefault
excludePurpose|Audience|Contents|Search|Additional help|Related articles
typelist
class
printablefalse

(question) Initial considerations

💽Data retention; preservation or archiving.

  • Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.

Administrative data

Research data

🏛️ Consult ethics protocols and other agreements.

  • Is your data or your obligation to securely delete it covered by other binding documents or contracts?

Human ethics or animal use protocol.

Agreements (Data sharing [DSA], material sharing [MTA], etc.)

🔢Determine your data's classification.

  • Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.


\uD83D\uDCD8 What can I do?

(error)For confidential, sensitive, restricted, or regulated data (Level 3 or 4)

Panel
panelIconIdatlassian-warning
panelIcon:warning:
bgColor#FFFAE6

Data is unrecoverable only if stored on an encrypted device. Encrypt data and devices

Windows

MacOS

Linux

Cross-platform

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

(warning)For non-sensitive, non-public data (Level 2)

Note

Data could be recovered with difficulty.

Windows

MacOS

Linux

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

  • Office or commercial shredding.

(tick)For public data (Level 1)

Note

Data could be recovered with little difficulty.

Windows

MacOS

Linux

Cloud services

  • Delete file within platform; wait for recovery period to expire.

Physical data

  • Recycle and/or shred, if appropriate.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


✉️ Additional help

👥General

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%9B%A1%EF%B8%8F-Information-Security-(IS)

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%96%A5%EF%B8%8F-Information-Technology-(IT)

🔬Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" )