Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
🎓

Purpose

Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements. 

👥

Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel
3
4
include
outlinefalse
indent
styledefault
excludePurpose
,Audience
|Audience|On this page|Search|Additional help|Related articles
typelist
class
printablefalse

(question)Initial considerations

💽Data retention; preservation or archiving.

  • Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.

Administrative data

Research data

🏛️ Consult ethics protocols and other agreements.

  • Is your data or your obligation to securely delete it covered by other binding documents or contracts?

Human ethics or animal use protocol.

Agreements (Data sharing [DSA], material sharing [MTA], etc.)

🔢Determine your data's classification.

  • Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.


\uD83D\uDCD8 What What can I do?

(error)For confidential, sensitive, restricted, or regulated data (Level 3 or 4)

Panel
panelIconIdatlassian-warning
panelIcon:warning:
bgColor#FFFAE6
Note

Data is unrecoverable only if stored on an encrypted device. Encrypt data and devices

Windows

MacOS

Linux

Cross-platform

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

(warning)For non-sensitive, non-public data (Level 2)

Note

Data could be recovered with difficulty.

Windows

MacOS

Linux

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

  • Office or commercial shredding.

(tick)For public data (Level 1)

Note

Data could be recovered with little difficulty.

Windows

MacOS

Linux

Cloud services

  • Delete file within platform; wait for recovery period to expire.

Physical data

  • Recycle and/or shred, if appropriate.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


✉️Additional help

👥General

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8Fus#Information-Information-Security-(IS)

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)

🔬Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" )