Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
🎓 Purpose
Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements.
👥Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
|
Initial considerations
Data retention; preservation or archiving.
Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.
Administrative data
Research data
Consult ethics protocols and other agreements.
Is your data or your obligation to securely delete it covered by other binding documents or contracts?
Human ethics or animal use protocol.
Ethics/use protocols will need to specify for how long your data is to be retained, if it will be deposited into a long-term solution, and how it will be securely deleted.
If you are unsure about your obligations, please contact the relevant ethics unit.
Agreements (Data sharing [DSA], material sharing [MTA], etc.)
Research contracts and agreements can include language around how data can be retained or how it should be deleted upon the conclusion of the contract, agreement, or project.
Contact the relevant contract and agreements office regarding sponsor or data provider requirements.
Determine your data's classification.
Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.
\uD83D\uDCD8 What What can I do?
For confidential, sensitive, restricted, or regulated data (Level 3 or 4)
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note | ||||||
Data is unrecoverable only if stored on an encrypted device. Encrypt data and devices |
Windows
Delete a file
Sanitize a device
See Cross-platform options.
MacOS
Delete a file
Sanitize a device
https://support.apple.com/en-ca/guide/disk-utility/dskutl14079/mac
Choose “most secure” under “security options”
Linux
Delete a file
Sanitize a device
Cross-platform
Sanitize a device
Your motherboard or drive manufacturer might provide a proprietary sanitization utility.
Cloud services
Contact provider regarding secure data deletion pipeline.
Physical data
Commercial shredding. Contact your local IT group for recommendations: https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Additional+help#%F0%9F%96%A5%EF%B8%8F-Information-Technology-(IT)
Ensure that you receive a Certificate of Destruction for your records.
For non-sensitive, non-public data (Level 2)
Note |
---|
Data could be recovered with difficulty. |
Windows
Delete a file
Delete all data from a device
Do not perform a “quick format”.
MacOS
Delete a file
Delete file and empty Trash .
Delete all data from a device
https://support.apple.com/en-ca/guide/disk-utility/dskutl14079/mac
Do not select “fastest” under “security options”.
Linux
Delete a file
Delete all data from a device
Cloud services
Contact provider regarding secure data deletion pipeline.
Physical data
Office or commercial shredding.
For public data (Level 1)
Note |
---|
Data could be recovered with little difficulty. |
Windows
Delete a file
Delete file and empty Recycle Bin.
Delete all data from a device
MacOS
Delete a file
Delete file and empty Trash .
Delete all data from a device
Linux
Delete a file
Delete file
Delete all data from a device
Cloud services
Delete file within platform; wait for recovery period to expire.
Physical data
Recycle and/or shred, if appropriate.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
General
Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related Related articles
Filter by label (Content by label) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|