Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
🎓

Purpose

Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements. 

👥

Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents

(question) Initial considerations

  • Should my data be preserved or archived, rather than deleted?

Expandtitle


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel4
outlinefalse
styledefault
excludePurpose|Audience|On this page|Search|Additional help|Related articles
typelist
printablefalse

Initial considerations

Data retention; preservation or archiving.

  • Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.

Administrative data

Expandtitle

Research data

\uD83D\uDCD8 What can I do?

(error)

Consult ethics protocols and other agreements.

  • Is your data or your obligation to securely delete it covered by other binding documents or contracts?

Human ethics or animal use protocol.

Agreements (Data sharing [DSA], material sharing [MTA], etc.)

Determine your data's classification.

  • Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.


What can I do?

For confidential, sensitive, restricted, or regulated data (Level 3 or 4)

Note
title

Data is unrecoverable only if stored on an encrypted device. Encrypt my devices or data

Expand

data and devices

Windows

Expandtitle

MacOS

Expandtitle

Linux

Expandtitle

Cross-platform

Expandtitle

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Expandtitle

Physical data

  • Commercial shredding.

    • Ensure that you receive a Certificate of Destruction for your records.

(warning)

For non-sensitive, non-public data (Level 2)

Note

Data could be recovered with difficulty.

Expand
title

Windows

Expandtitle

MacOS

expand
title

Linux

Expandtitle

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Expandtitle

Physical data

  • Office or commercial shredding.

(tick)

For public data (Level 1)

title
Note

Data could be recovered with little difficulty.

Expand

Windows

Expandtitle

MacOS

Expandtitle

Linux

Expandtitle

Cloud services

  • Delete file within platform; wait for recovery period to

expire 
  • expire.

Expandtitle

Physical data

  • Recycle and/or shred, if appropriate.

🔍

Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article

✉️

Additional help

Expandtitle

General

https://

uoft-infosec-cf.atlassian.net

handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/

Additional

Contact+

help#%F0%9F%9B%A1%EF%B8%8F

us#Information-

Information-

Security-(IS)

Expandtitle

https://handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/Contact+us#Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/

\uD83D\uDCCB
 Related

Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" )